AI coders go rogue.
This isn’t science fiction anymore. The latest threat intelligence dump for the week of May 4th paints a stark picture: our intelligent assistants are being twisted into tools of digital destruction. We’re not just talking about more sophisticated phishing emails anymore; we’re witnessing AI co-authoring malware and directly enabling supply chain attacks. It’s a fundamental architectural shift in how attackers operate, moving from brute force and zero-days alone to leveraging AI’s ability to generate, understand, and manipulate code at an unprecedented scale.
Medtronic, a titan in the medical device arena, found itself in the crosshairs. An unauthorized party gained access to its corporate IT systems, with the notorious ShinyHunters group claiming responsibility for a haul of nine million records. While Medtronic assures the public that its products and financial systems remain unaffected, the sheer volume of exposed data is a stark reminder of the persistent, and often indiscriminate, nature of these breaches. It begs the question: what exactly constitutes ‘non-impactful’ data when nine million records are at stake?
And it’s not just the big players. Vimeo, the video-hosting giant, confirmed a breach through a third-party analytics vendor, Anodot. The exposed data included internal operational details and video metadata. Passwords and video content, thankfully, were left untouched, but the incident underscores the cascading risk inherent in any interconnected digital ecosystem.
Robinhood, the trading platform, faced a different kind of assault: a phishing campaign that cleverly used official-looking emails to lure unsuspecting users. The attackers exploited a vulnerability in the account creation process, specifically a ‘Device’ field, to inject malicious links. While Robinhood maintains that no accounts or funds were compromised – a claim we’ll need to scrutinize – the incident highlights the ever-evolving tactics used to bypass security checks.
Trellix, a security vendor itself, experienced a source code repository breach. Attackers managed to access a portion of its internal code. The company is quick to state it’s found no evidence of product tampering or active exploitation, but the very idea of a security firm’s code being compromised sends a shiver down the spine. It’s like a locksmith’s master key being stolen – the implications, even if not immediately obvious, are profound.
AI’s Dark Mirror: Code Generation Gone Malicious
The real headline-grabber this week, however, is the accelerating weaponization of AI. Researchers have zeroed in on a flaw within Cursor’s coding environment, CVE-2026-26268. This vulnerability allows for remote code execution when the AI agent interacts with a compromised Git repository. Imagine an AI assistant, designed to streamline development, actively pulling in malicious code. The attack chain use Git hooks and bare repositories, opening the door to the exposure of sensitive source code, API tokens, and internal development tools. This isn’t just about stealing data; it’s about poisoning the well of software development itself.
Then there’s Bluekit, a phishing-as-a-service platform that’s gone truly next-level. It doesn’t just offer templates; it bundles an AI assistant powered by a veritable who’s who of LLMs – GPT-4.1, Claude, Gemini, Llama, and DeepSeek. This AI-powered toolkit centralizes everything an attacker needs: domain setup, hyper-realistic login page cloning, sophisticated anti-analysis filters, real-time session monitoring, and exfiltration via Telegram. It’s an industrial-scale phishing operation, democratized and supercharged by AI.
But the most chilling revelation comes from an AI-enabled supply chain attack involving Anthropic’s Claude Opus. The AI model co-authored a code commit that injected PromptMink malware into an open-source autonomous crypto trading project. This hidden dependency didn’t just steal credentials; it established persistent SSH access and siphoned source code, directly enabling wallet takeovers. The irony is thick: an AI, built to assist and secure, was instrumental in creating a backdoor. This is not just a vulnerability; it’s an existential question about trusting AI in critical infrastructure.
Researchers demonstrated an AI-enabled supply chain attack in which Anthropic’s Claude Opus co-authored a code commit that introduced PromptMink malware into an open-source autonomous crypto trading project.
Critical Holes in the Digital Fabric
Microsoft has been busy patching a privilege escalation flaw in its Entra ID, specifically affecting the Agent ID Administrator role for AI agents. The exploit allowed attackers to assume control of any service account, effectively impersonating privileged identities by adding their own credentials. The ease with which this was demonstrated – a simple proof-of-concept – suggests a widespread potential for compromise.
Meanwhile, cPanel and WHM are reeling from CVE-2026-41940, a critical authentication bypass that’s already being exploited in the wild as a zero-day. This flaw grants full administrative control without credentials. Patches were issued, but Shadowserver reported a staggering 44,000 internet addresses scanning or attacking decoy systems. This is the wild west, and cPanel admins who haven’t patched are sitting ducks.
Google, too, has a fix for a critical code execution flaw in its Gemini CLI and associated GitHub Action. The vulnerability allowed external parties to run commands on build servers within CI/CD pipelines by automatically trusting workspace files during automated jobs. Malicious pull requests could trigger code execution, a nightmare for any development team.
And finally, LiteLLM proxy users need to be aware of CVE-2026-42208, a critical SQL injection flaw affecting versions 1.81.16 to 1.83.6. This vulnerability allows attackers to read and potentially alter the proxy database used for managing LLM API keys. Exploitation attempts were observed mere hours after disclosure, underscoring the urgency.
Data Wipers and Botnets: The Old Threats, New Tricks
Check Point Research has lifted the lid on VECT 2.0 ransomware. It’s not just about encrypting data; it’s a data wiper. A critical flaw in its encryption process makes recovery impossible for files larger than 128 KB, even if a ransom is paid. This raises the stakes significantly – a pure act of destruction, not extortion.
On the botnet front, a Mirai-based campaign targeting Brazilian internet providers abuses TP-Link Archer AX21 routers and open DNS servers for massive amplification attacks. Leaked files hint at connections between the botnet’s control infrastructure and SSH keys linked to a DDoS mitigation firm, Huge Networks. The plot, as they say, thickens.
And the AccountDumpling phishing campaign, which use Google AppSheet email services to hijack Facebook accounts, has compromised over 30,000 users. The operation, linked to Vietnam-based attackers, employs cloned support pages and reward lures, even managing to collect live two-factor authentication codes. The monetization of compromised accounts is, sadly, a well-trodden path, but the scale and sophistication here are noteworthy.
This week’s intel paints a landscape where AI is rapidly becoming the attacker’s most potent tool, alongside persistent threats like ransomware and botnets. The architectural shift is undeniable, and staying ahead will require more than just patching vulnerabilities; it will demand a fundamental rethinking of our trust in AI and the security of our interconnected digital systems.