Tageszusammenfassung - 13.05.2026

End-of-Day report

Timeframe: Dienstag 12-05-2026 18:00 - Mittwoch 13-05-2026 18:00 Handler: Guenes Holler Co-Handler: n/a

News

Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation

A threat actor with affiliations to China has been linked to a "multi-wave intrusion" targeting an unnamed Azerbaijani oil and gas company between late December 2025 and late February 2026, marking an expansion of its targeting.

https://thehackernews.com/2026/05/azerbaijani-energy-firm-hit-by-repeated.html

Angriff umgeht BitLocker mittels Windows Recovery Environment

BitLocker soll vertrauliche Daten auch vor physischen Angriffen schützen. Die Windows Recovery Environment hebelt den Schutz aus.

https://www.heise.de/news/Angriff-umgeht-BitLocker-mittels-Windows-Recovery-Environment-11292642.html

Datenpanne bei Best Western Hotels: Hacker konnten monatelang Buchungsdaten abgreifen

Angreifer konnten sich wohl rund ein halbes Jahr lang ungestört im System von Best Western Hotels umsehen und Daten der Hotelgäste ausleiten.

https://www.golem.de/news/best-western-hotels-hacker-konnten-monatelang-auf-buchungsdaten-zugreifen-2605-208637.html

RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded

RubyGems, the standard package manager for the Ruby programming language, has temporarily paused account sign ups following what has been described as a "major malicious attack."

https://thehackernews.com/2026/05/rubygems-suspends-new-signups-after.html

Thus Spoke-The Gentlemen

The Gentlemen ransomware-as-a-service (RaaS) operation is a relatively new group that emerged around mid-2025. Its operators advertise the service across multiple underground forums, promoting their ransomware platform and inviting penetration testers and other technically skilled actors to join as affiliates.

https://research.checkpoint.com/2026/thus-spoke-the-gentlemen/

Claude Code RCE: Exploiting Deeplink Handlers via Settings Injection

Of course I took a peek at the Claude Code source.

https://0day.click/recipe/2026-05-12-cc-rce/

Vulnerabilities

Patchday Microsoft: Kritische DNS-Client-Lücke bedroht Windows

Microsoft hat wichtige Sicherheitsupdates für unter anderem Azure, Edge, Office und Windows veröffentlicht. Viele Lücken wurden mit KI-Agenten entdeckt.

https://www.heise.de/news/Patchday-Microsoft-Kritische-DNS-Client-Luecke-bedroht-Windows-11292506.html

Patchday: Adobe schließt mehr als 50 Lücken in After Effects & Co.

Wichtige Sicherheitsupdates reparieren diverse Adobe-Anwendungen. Bislang gibt es keine Berichte zu laufenden Attacken.

https://heise.de/-11292536

Fortinet stopft elf Sicherheitslücken in mehreren Produkten

Fortinet hat zum -Patch-Dienstag- elf Sicherheitsflicken konzertiert veröffentlicht. Zwei der Lecks gelten als kritisch.

https://heise.de/-11292861

1,000,000 WordPress Sites Affected by Arbitrary File Read and SQL Injection Vulnerabilities in Avada Builder WordPress Plugin

On March 21st, 2026, we received a submission for an Arbitrary File Read and an SQL Injection vulnerability in Avada Builder, a WordPress plugin with an estimated 1,000,000 active installations.The post 1,000,000 WordPress Sites Affected by Arbitrary File Read and SQL Injection Vulnerabilities in Avada Builder WordPress Plugin appeared first on Wordfence.

https://www.wordfence.com/blog/2026/05/1000000-wordpress-sites-affected-by-arbitrary-file-read-and-sql-injection-vulnerabilities-in-avada-builder-wordpress-plugin/

New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution

Exim has released security updates to address a severe security issue affecting certain configurations that could enable memory corruption and potential code execution.

https://thehackernews.com/2026/05/new-exim-bdat-vulnerability-exposes.html

LWN Security updates for Wednesday

https://lwn.net/Articles/1072596/

NCSC-2026-0147 [1.00] [M/H] Kwetsbaarheden verholpen in Siemens-producten

https://advisories.ncsc.nl/advisory?id=NCSC-2026-0147

FortiGuard Labs: Improper access control on API endpoints

https://fortiguard.fortinet.com/psirt/FG-IR-26-128

FortiGuard Labs: Incorrect global authorization

https://fortiguard.fortinet.com/psirt/FG-IR-26-136

FortiGuard Labs: Out-of-bounds access in CAPWAP daemon

https://fortiguard.fortinet.com/psirt/FG-IR-26-123