The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has escalated its warnings by adding five actively exploited security vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. The flaws impact products from Apple, Craft CMS, and Laravel Livewire. Federal agencies are now under a binding directive to remediate these vulnerabilities by April 3, 2026. This action underscores the immediate threat these bugs pose, as they are being leveraged in real-world attacks by advanced threat actors.
The inclusion of three Apple vulnerabilities is directly linked to an iOS exploit kit dubbed "DarkSword." Reports from Google Threat Intelligence Group, iVerify, and Lookout detail how this kit weaponizes these flaws, alongside three other bugs, to deploy sophisticated malware families like GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER for comprehensive data theft. Separately, CVE-2025-32432, a flaw in Craft CMS, has been exploited as a zero-day since February 2025, according to Orange Cyberdefense SensePost. The intrusion set tracked as Mimo (or Hezb) has used it to deploy cryptocurrency miners and residential proxyware. The final flaw, CVE-2025-54068 in Laravel Livewire, was recently flagged by the Ctrl-Alt-Intel Threat Research team as being exploited by the Iranian state-sponsored group MuddyWater, also known as Boggy Serpens.
The activities of MuddyWater highlight a significant and evolving threat. In a recent analysis, Palo Alto Networks Unit 42 detailed the group's persistent targeting of diplomatic entities and critical infrastructure sectors—including energy, maritime, and finance—across the Middle East and other strategic global regions. While social engineering remains a core tactic, Unit 42 notes the group is rapidly advancing its technological capabilities. Their arsenal now includes AI-enhanced malware implants designed with anti-analysis techniques for long-term persistence, creating a more potent and stealthy threat profile.
To manage its extensive operations, Boggy Serpens utilizes a custom, web-based orchestration platform to support large-scale social engineering campaigns. This combination of human-centric deception and rapidly developed, sophisticated tools makes them a formidable adversary. CISA's KEV listing serves as a critical alert for all organizations, not just federal agencies, to prioritize patching these specific vulnerabilities. The mandated deadline provides a clear timeline, but given the active exploitation, security teams are advised to remediate these issues urgently to prevent compromise by these well-resourced and persistent threat groups.



