Home / Episodes / May 13, 2026
Episode show notesMay 13's Top Cyber News NOW! - Ep 1131
At a glance
Eight critical threat stories dominated the day: Instructure paid a major ransom after being breached twice in two weeks by Shiny Hunters; the Shy Holuade supply chain campaign hit 170+ npm and PyPI packages with persistence malware; OpenAI launched Daybreak for AI-powered vulnerability scanning; EU countries exported surveillance tech to human rights abusers; Android gained intrusion logging for forensics; Apple and Google shipped cross-platform encrypted RCS; West Pharmaceutical is still recovering from a global ransomware shutdown; and Ruby Gems suspended signups after a malicious package spam campaign.
Stories covered
What's the Instructure Canvas ransom deal with Shiny Hunters mean for incident response?
What happened: Instructure (Canvas owner) reached a settlement with Shiny Hunters after the group breached the platform twice in two weeks, allegedly destroying stolen data and removing Instructure from its leak site. Financial terms remain undisclosed, but the settlement included assurances no customer extortion would occur.
Why it matters: This is a high-profile public case where a major edtech vendor chose to pay. It provides a concrete talking point to engage leadership on incident response tabletop exercises and ransom decision-making, especially since Instructure is a publicly traded, ~$700M revenue business—meaning the ransom was likely $25–30M (typical 3–7% of annual revenue).
What to do: Schedule a 30-minute tabletop with leadership framed as "process improvement." Walk through the scenario: initial breach notification, second breach, proof-of-compromise with extortion demand, two-day deadline. Identify decision-making workflows and communication chains before crisis hits.
How are 170+ npm and PyPI packages spreading the Shy Holuade supply chain malware?
What happened: The Shy Holuade campaign (linked to Team PCP, active since September 2025) compromised valid OpenID Connect tokens and published dozens of malicious packages across npm (TanStack, Minstal AI, Open Search, UiPath) and PyPI. The info stealer malware persists via VS Code and Claude Code auto-run hooks and implements geofencing to avoid execution in Russia, Iran, or Israel.
Why it matters: This targets developers and CI/CD pipelines directly. The malware uses cryptographically valid tokens, making packages appear legitimate. Compromised dependencies can auto-execute in development environments, exfiltrating GitHub secrets and developer credentials at scale.
What to do: Cross-reference your dependencies against Andoro Labs' published IOC list (170+ affected package names available). Rotate GitHub and package manager tokens. Enable 2FA on GitHub, npm, PyPI, and all CI/CD systems immediately. Audit VS Code and Claude Code extensions and auto-run configurations. Coordinate with engineering and DevOps on supply chain visibility.
What does OpenAI's Daybreak vulnerability detection tool mean for GRC teams?
What happened: OpenAI announced Daybreak, an AI-powered vulnerability scanner using GPT-5.5 models to create threat models, identify vulnerabilities in code repos, test them in sandboxes, and propose mitigations. It's in early access; general availability not yet announced.
Why it matters: Vulnerability management has historically been a painful, low-agency function—analysts find bugs but lack authority to fix them. Daybreak promises to automate detection and patch validation, but automated patching carries operational risk and could destabilize production systems without careful orchestration.
What to do: Monitor for general availability. Do not enable fully automated patching. Use Daybreak to accelerate detection and validation workflows, then route patches through your change control process. Frame this in job interviews as evidence you understand the shift toward AI-assisted defense against AI-assisted exploitation.
Why are EU member states exporting surveillance tech to human rights abusers?
What happened: Human Rights Watch obtained FOIA data showing Bulgaria, Czech Republic, Denmark, Finland, and Poland exported surveillance technologies to 20+ countries with documented records of repressing journalists and activists. France, Germany, Greece, Italy, and Spain refused to disclose export data.
Why it matters: Spyware commands $1M+ per install with massive margins. When financial incentives meet weak oversight, surveillance tools reach authoritarian regimes that use them to identify and silence dissidents, LGBTQ+ individuals, and civil society. Egypt has documented history of using phone tracking to hunt LGBTQ+ people on dating apps.
What to do: Monitor for now. This is policy and export control enforcement—not a direct technical threat. If you work in defense, government, or critical infrastructure, be aware that your adversaries may have access to commercial spyware with deep device access capabilities.
What does Android's intrusion logging feature do for forensics?
What happened: Google, in partnership with Amnesty International, launched intrusion logging for Android Advanced Protection mode (Android 16, Pixel devices only). The feature generates forensic logs recording device unlocks, physical access, and spyware installation/removal for incident investigation.
Why it matters: Forensic detection of advanced spyware has historically been difficult. This is a direct countermeasure to surveillance tech exports and state-sponsored phone hacking. It shifts the forensic burden toward defenders.
What to do: If you support Android users in at-risk regions (journalists, activists, civil society), recommend Android 16 Pixel devices with Advanced Protection enabled. Preserve intrusion logs as part of forensic response. Monitor for Apple to release similar capabilities on iOS.
When will Apple and Google's encrypted RCS messaging roll out broadly?
What happened: Apple and Google announced a beta rollout of end-to-end encrypted RCS (Rich Communication Services) per the GSM Association's Universal Profile 3.0 standard. Available on iOS 18.5 and latest Google Messages; encrypted threads show a lock icon. Requires carrier activation and is enabled by default.
Why it matters: Until now, iMessage-to-iMessage and Android-to-Android were encrypted, but cross-platform SMS/RCS was not. This closes a long-standing confidentiality gap in mainstream mobile messaging. However, this does not protect against SIM swaps, stingrays, or social engineering via text.
What to do: Monitor for now. Encryption in transit is good, but establish a security communication policy for sensitive data. Encourage use of Signal for classified discussions. Remember that SMS/RCS can still be used for phishing and social engineering—encryption alone does not prevent those attacks.
How is West Pharmaceutical recovering from a global ransomware shutdown?
What happened: West Pharmaceutical Services (pharmaceutical contract manufacturer, $3B annual revenue) suffered a ransomware attack on May 4th, triggering a proactive shutdown of on-premises infrastructure globally. As of this recording, core systems at some locations have restarted, but full restore timeline is unknown. No ransom group has claimed responsibility.
Why it matters: Manufacturing is a hot target. Ransomware encrypted files across the organization, forcing a global business halt. Recovery depends on backup restoration order and system dependencies—a process that can take 12–18 hours for large ERP systems. No group claiming credit may indicate ransom payment.
What to do: If you work in manufacturing or pharma, use this as a tabletop scenario: "All systems encrypted globally. Backup restore is available. In what order do we restore?" Map dependencies between facilities and systems. Test backup restore time estimates now, not during an incident. Clarify decision authority and communication chains for ransomware response.
Why did Ruby Gems suspend account signups after a malicious package spam campaign?
What happened: Ruby Gems, the standard package manager for Ruby, suspended new account signups after a coordinated attack published 120+ malicious packages targeting the registry itself. Bot accounts have been blocked; Ruby Gems has cleaned up the published payloads but continues mitigation.
Why it matters: If you have Ruby in your environment and pulled dependencies during the attack window, your code may now contain active malware. This is not just a signup issue—it's an active code supply chain compromise affecting existing installations.
What to do: Search your build logs and dependency lock files for any Ruby package pulls from the attack window. Cross-reference against the published malicious package list (search "Ruby Gems malicious packages"). Audit Ruby environments for unexpected processes or persistence. Rotate any credentials or secrets that may have been exfiltrated.
Key takeaways
- Ransom settlements are now mainstream news. Instructure's deal with Shiny Hunters is a high-profile case that justifies tabletop exercises and leadership engagement on incident response decision-making.
- Supply chain malware is evolving fast. Shy Holuade uses valid tokens and geofencing; 170+ packages hit npm/PyPI simultaneously. 2FA and token rotation are no longer optional.
- AI-powered vulnerability detection is here. OpenAI's Daybreak signals a shift toward automated finding and validation, but human oversight of patching remains critical—fully automated patching will break things.
- Surveillance tech exports are documented but ongoing. EU countries selling spyware to authoritarian regimes is a policy failure with real consequences for activists and dissidents; Android's intrusion logging is a technical counter.
- Manufacturing ransomware recovery depends on system dependencies. West Pharma's global shutdown illustrates why backup restoration order and system interdependencies must be mapped and tested before crisis.
Topics covered
Want the live experience? The Daily Cyber Threat Brief airs live every weekday at 5am PT / 8am ET on YouTube. 400+ practitioners join the chat in real time.