Cleartext logocleartext_
daily briefing

Cleartext – April 21, 2026

Tuesday, April 21, 2026·8:27

Cleartext – April 21, 2026
8:27·5.1 MB

Enjoy the show? Subscribe to never miss an episode.

show notes

Cleartext – April 21, 2026

Daily cybersecurity briefing for CISOs and security leaders.

🎧 Listen to this episode

Episode Summary

Today's episode covers 8 stories across 5 topic areas, including: KelpDAO suffers $290 million heist tied to Lazarus hackers; ZionSiphon Malware Targets Water Infrastructure Systems; Adversaries hijacked AI security tools at 90+ organizations. The next wave has write access to the firewall.

Stories Covered

🌍 Geopolitical

KelpDAO suffers $290 million heist tied to Lazarus hackers

BleepingComputer · Apr 20 · Relevance: ████████░░ 8/10

Why it matters to CISOs: The largest crypto heist of 2026 attributed to North Korea's Lazarus group underscores the persistent nation-state threat to financial infrastructure and the need for enhanced controls around DeFi and cryptocurrency custody operations.

  • $290 million stolen from KelpDAO DeFi project, the largest crypto heist of 2026
  • Attack attributed to North Korean state-sponsored Lazarus group
  • Incident impacted multiple prominent crypto platforms

📖 Read full article

ZionSiphon Malware Targets Water Infrastructure Systems

Infosecurity Magazine · Apr 20 · Relevance: ████████░░ 8/10

Why it matters to CISOs: Dedicated OT malware targeting water systems with sabotage capabilities represents an escalation in critical infrastructure threats that CISOs overseeing utilities or ICS environments must factor into their threat models.

  • ZionSiphon is new malware specifically targeting OT water infrastructure systems
  • Includes both sabotage and ICS scanning capabilities
  • Represents growing sophistication of attacks against critical infrastructure

📖 Read full article

📡 Macro Trends

Adversaries hijacked AI security tools at 90+ organizations. The next wave has write access to the firewall

VentureBeat Security · Apr 21 · Relevance: █████████░ 9/10

Why it matters to CISOs: Autonomous SOC agents with write access to firewalls, IAM, and endpoints represent an existential governance gap—CISOs deploying agentic security tools must implement privilege boundaries and abuse monitoring before adversaries exploit these capabilities.

  • Adversaries injected malicious prompts into legitimate AI security tools at 90+ organizations in 2025, stealing credentials
  • Next-gen autonomous SOC agents shipping now have write access to rewrite firewall rules, modify IAM policies, and quarantine endpoints
  • Compromised agent actions appear as authorized API calls, making them invisible to EDR

📖 Read full article

🔓 Data Breach

Vercel’s security breach started with malware disguised as Roblox cheats

CyberScoop · Apr 20 · Relevance: ████████░░ 8/10

Why it matters to CISOs: This breach illustrates the cascading risk of third-party AI tool integrations with overly privileged OAuth tokens—a pattern CISOs must audit across their SaaS ecosystems immediately.

  • Vercel breach originated from compromise of Context.ai, a third-party AI tool used by a Vercel employee
  • Attack started with Lumma Stealer malware disguised as Roblox cheats on the employee's personal device
  • Stolen OAuth tokens enabled lateral movement into Vercel's internal systems and customer credential theft

📖 Read full article

Former ransomware negotiator pleads guilty to BlackCat attacks

BleepingComputer · Apr 21 · Relevance: ███████░░░ 7/10

Why it matters to CISOs: An insider from a cybersecurity IR firm conducting ransomware attacks is a worst-case insider threat scenario—CISOs should reassess vetting processes and access controls for third-party incident responders.

  • Angelo Martino, 41, former employee of IR firm DigitalMint, pleaded guilty to conducting BlackCat/ALPHV ransomware attacks
  • Targeted U.S. companies using insider knowledge from his role as ransomware negotiator
  • Attacks occurred in 2023

📖 Read full article

⚖️ Governance & Policy

Maritime Cybersecurity Rules Make Waves

BankInfoSecurity · Apr 21 · Relevance: ███████░░░ 7/10

Why it matters to CISOs: New Coast Guard cybersecurity rules imposing OT security standards on ports and commercial vessels signal expanding regulatory scope that CISOs in logistics, shipping, and critical infrastructure must prepare for.

  • U.S. Coast Guard rule imposes cybersecurity standards on OT systems in ports and larger U.S.-flagged commercial vessels
  • Regulation driven by geopolitical anxiety about shipping as a weak target
  • Expected to supercharge the maritime cybersecurity market

📖 Read full article

The FTC’s AI portfolio is about to get bigger

CyberScoop · Apr 20 · Relevance: ███████░░░ 7/10

Why it matters to CISOs: FTC expanding enforcement into AI-generated deepfakes and voice cloning scams signals new compliance obligations for organizations deploying or being targeted by AI-generated content.

  • FTC preparing to enforce key parts of new law against sexual deepfakes
  • Commission searching for ways to block AI-driven voice clone scamming
  • Expanding AI regulatory enforcement portfolio

📖 Read full article

🚨 Critical Vulnerability

CISA flags another Cisco Catalyst SD-WAN Manager bug as exploited (CVE-2026-20133)

Help Net Security · Apr 21 · Relevance: ████████░░ 8/10

Why it matters to CISOs: Three Cisco Catalyst SD-WAN Manager vulnerabilities now confirmed as actively exploited makes this an emergency patching priority for any enterprise running SD-WAN infrastructure.

  • CISA added CVE-2026-20133 plus two other Cisco SD-WAN Manager flaws to KEV catalog
  • Three separate Cisco Catalyst SD-WAN Manager vulnerabilities now confirmed actively exploited
  • Federal agencies given 4-day deadline to patch; enterprises should treat with equal urgency

📖 Read full article


Further Reading


Full Transcript

Click to expand full episode transcript

Jordan: Ninety organizations had their AI security tools hijacked. Every one of those tools could only read data. The next generation shipping right now can rewrite your firewall rules. Think about that for a second.

Alex: Welcome to Cleartext. I'm Alex Chen. It's Tuesday, April 21st, 2026. Today we're covering the largest crypto heist of the year and what it means for your financial infrastructure exposure, a new class of OT malware targeting water systems, the autonomous SOC agent governance problem that nobody has solved yet, a breach that started with Roblox cheats on a personal device and ended inside a major cloud platform, and an insider threat scenario straight out of a CISO's worst nightmares. Plus Cisco SD-WAN patching that should already be in your queue. Let's get into it.

Jordan: Let's start with Lazarus, because $290 million doesn't happen in a vacuum. KelpDAO, a DeFi project, lost that amount over the weekend. CISA-level attribution to North Korea's Lazarus group. This is now the largest crypto heist of 2026, and we're only four months in. For context, Lazarus has been systematically dismantling crypto platforms for years to fund Pyongyang's weapons programs. This isn't opportunistic crime. This is state-directed financial warfare with a very specific spending category at the end of it.

Alex: And the board implication here is real even if your organization has nothing to do with DeFi directly. If you hold crypto on the balance sheet, if you custody digital assets for clients, if you have any counterparty exposure to platforms in this ecosystem, you need to model Lazarus as a live threat to your financial operations, not just a headline risk. The sophistication of these operations has grown substantially. We're not talking about phishing a junior employee. These are coordinated multi-vector attacks against smart contract logic, key management, and bridge infrastructure.

Jordan: The thing that concerns me most is that Lazarus has demonstrated a willingness to adapt faster than the defensive community can publish mitigations. They identify the class of vulnerability, they burn it across multiple targets before detection improves, then they pivot. DeFi custody controls need to be treated with the same rigor as SWIFT access controls. Full stop.

Alex: Let's stay in the critical infrastructure lane for a moment because ZionSiphon deserves serious attention. New malware, purpose-built for OT water infrastructure. It has both sabotage capabilities and ICS scanning built in. That combination is significant because it suggests reconnaissance followed by deliberate physical impact as the operational design. This isn't ransomware looking for a payout. This is designed to break things.

Jordan: The ICS scanning component is what tells you about intent. An attacker building a tool with that capability is doing target development inside the network. They want to understand the process control environment before they pull the trigger on sabotage. Attribution is still developing, but the capability profile is consistent with nation-state investment. If you're a CISO at a utility, a water authority, or any industrial operator, this goes straight into your threat model update for Q2.

Alex: Now to the story Jordan opened with, because this one has genuinely large implications for how we're deploying AI in security operations. The VentureBeat reporting documents adversaries using prompt injection against legitimate AI security tools at more than ninety organizations in 2025. Credentials stolen, cryptocurrency taken. Every compromised tool in that wave was read-only. The generation of autonomous SOC agents shipping today is not.

Jordan: We're talking about agents that can rewrite firewall rules, modify IAM policies, quarantine endpoints. And here's the governance nightmare embedded in that: when a compromised agent takes an action, it looks like an authorized API call. Your EDR doesn't flag it. Your SIEM sees expected behavior. The attacker isn't logging in, they're just steering a trusted process that already has the keys.

Alex: This is the conversation I'd be having with my board right now if I were still in the seat. Because the pitch for these tools is compelling. Faster response, twenty-four seven autonomy, analyst capacity expansion. All real benefits. But you cannot deploy write-access autonomy into your security infrastructure without privilege boundaries, scope constraints, and abuse monitoring that are just as rigorous as what you'd apply to a privileged human account. The accountability question also matters. When an agent rewrites a firewall rule based on a poisoned prompt and that causes an outage or a breach, who owns that?

Jordan: My take: any vendor shipping autonomous SOC agents with write access who cannot show you a coherent answer to that question doesn't ship yet. Treat agentic security tools as privileged accounts, audit their actions, and stage write access behind human approval gates until you have confidence in the abuse detection layer.

Alex: Shifting to the Vercel breach, and this is a case study in supply chain risk that every CISO should walk their team through. The attack chain here is almost elegant in how mundane it starts. An employee's personal device. Lumma Stealer malware disguised as Roblox cheat software. That malware harvested OAuth tokens for Context.ai, a third-party AI tool integrated into Vercel's environment. Those tokens had far more privilege than they needed, and lateral movement into Vercel's internal systems followed.

Jordan: The personal device element is important. You don't control what your employees do on personal hardware. But you can control what OAuth tokens issued to third-party integrations are permitted to access and do. This is fundamentally a least-privilege failure at the integration layer.

Alex: This is the audit I'd be running today. Go look at every third-party SaaS integration in your environment. Pull the OAuth scopes. Ask whether each one genuinely requires the access it was granted. My bet is you'll find tokens with read and write access to production systems that were approved during a fifteen-minute vendor onboarding conversation two years ago and never reviewed since.

Jordan: On to Angelo Martino. Former ransomware negotiator at DigitalMint, pleaded guilty to running BlackCat attacks against U.S. companies while working in incident response. He used insider knowledge of victim behavior, negotiation dynamics, and organizational vulnerabilities from his professional role to conduct attacks. If you have a more damaging insider threat scenario in the IR space, I haven't heard it.

Alex: The vetting implication is real. When you bring in a third-party IR firm, you are granting them significant access to your most sensitive systems during your most vulnerable moment. Background checks, reference validation, and access scoping for external responders need to be part of your IR retainer agreement, not an afterthought during the breach. This case is going to be referenced in IR vendor due diligence conversations for years.

Jordan: Quick hits before we get to the outlook. Cisco SD-WAN: CISA has now flagged three separate Catalyst SD-WAN Manager vulnerabilities as actively exploited. CVE-2026-20133 is the latest. Federal agencies got a four-day deadline. You should treat it identically. If you're running SD-WAN infrastructure and you haven't patched these, this is your interruption. Do it today.

Alex: Two regulatory signals worth flagging. The Coast Guard's new OT security rules for ports and commercial vessels are live, and they represent exactly the kind of sector-specific regulatory expansion we've been watching spread from financial services into critical infrastructure verticals. If you have maritime or logistics exposure, get your compliance team reading the rule. And the FTC is expanding its AI enforcement portfolio into deepfakes and voice clone scams. That's not primarily a technical security problem, it's a fraud and brand integrity problem, but it lands on the CISO's desk in organizations where those functions aren't clearly separated.

Jordan: The week's theme, if you're looking for one, is this: trust is being systematically weaponized. Trusted tools, trusted partners, trusted agents. Lazarus trusted as a financial actor, an IR negotiator trusted as a defender, AI tools trusted as security infrastructure, OAuth tokens trusted as authorized access. The attack surface isn't just technical anymore. It's every relationship and delegation in your environment.

Alex: The question for CISOs this week is: what have you trusted that you haven't audited in the last twelve months? Where have you extended privilege, whether to a human, a tool, or a vendor, without a periodic review mechanism? That list is your risk register in a different format.

Jordan: And on the AI agent question specifically: we're at an inflection point. The governance frameworks don't exist yet. The vendors are moving fast. If you're deploying autonomous agents with write access into security operations before you have that framework in place, you are running an experiment with your production environment as the test case.

Alex: That's Cleartext for Tuesday, April 21st. We'll be back tomorrow. If today's episode was useful, share it with someone in your leadership chain who needs to hear the AI agent conversation. Stay sharp.


Cleartext is an automated daily podcast for CISOs and security leaders. Generated 2026-04-21.

Sources are pulled from: CyberScoop, The Record, SecurityWeek, Krebs on Security, Dark Reading, Cybersecurity Dive, BleepingComputer, Wired, Ars Technica, TechCrunch, Help Net Security, VentureBeat, Risky Business News, The Hacker News, CISA, and BankInfoSecurity.