Security Highlights Of The Day [03/03/26]
OAuth Redirection Abuse Enables Phishing and Malware Delivery
Microsoft observed phishing campaigns abusing OAuth’s by design redirection mechanisms to target government and public sector organizations. Attackers leveraged silent OAuth authentication flows and intentionally invalid scopes to redirect victims to attacker controlled infrastructure without stealing tokens. Microsoft Defender detected malicious activity across email, identity, and endpoint signals, and Microsoft Entra disabled the identified OAuth applications. Related OAuth abuse activity remains ongoing and requires continued monitoring.
Source: Microsoft Security Blog
Web Based Indirect Prompt Injection Observed Targeting AI Agents
Researchers documented real world cases of indirect prompt injection where attackers embed hidden instructions into website content later processed by large language models and AI agents. Instead of directly interacting with the model, adversaries exploit features such as webpage summarization and automated content analysis, causing the AI system to unknowingly execute malicious prompts. The potential impact scales with the sensitivity and privileges of the affected AI environment.
Source: Unit 42
Amazon Confirms Drone Strikes Damaged AWS Data Centers in Middle East
Amazon confirmed that three AWS data centers in the United Arab Emirates and one in Bahrain were damaged by drone strikes, resulting in a significant outage impacting multiple cloud services. The disruption affected the AWS Middle East UAE region ME CENTRAL 1 and the AWS Middle East Bahrain region ME SOUTH 1, with services still experiencing impact following the incident.
Source: BleepingComputer
SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
The threat cluster SloppyLemming has been linked to attacks against government entities and critical infrastructure operators in Pakistan and Bangladesh. The campaign used two separate infection chains to deploy the BurrowShell malware and a Rust based keylogger. Researchers noted that the use of Rust represents an evolution in the actor’s tooling compared to earlier campaigns relying on more traditional frameworks.
Source: The Hacker News
Google Confirms Exploitation of Qualcomm Android Component Vulnerability
Google disclosed that CVE 2026 21385, a high severity vulnerability affecting an open source Qualcomm component used in Android devices, has been exploited in the wild. The flaw involves a buffer over read in the graphics component and is described as memory corruption linked to an integer overflow. The issue was reported in December 2025 and customers were notified in early February 2026.
Source: The Hacker News