Medtronic: Agent payments, Russian phishing, LeRobot RCE flaw

Medtronic: Agent payments, Russian phishing, LeRobot RCE flaw

Cybersecurity Roundup: AI Payment Standards, State-Backed Phishing, and Critical Flaws

The FIDO Alliance, in collaboration with Google and Mastercard, is developing industry standards to secure payments made by AI agents. Google’s Agent Payments Protocol will cryptographically verify user authorization, while Mastercard’s Verifiable Intent framework will enable agent-based transaction approvals. The initiative aims to establish real-world use cases before driving adoption among merchants and payment providers.

Germany Investigates Russian-Linked Signal Phishing Attacks
German federal prosecutors launched an investigation in mid-February 2026 after roughly 300 Signal accounts primarily belonging to political operatives were compromised via fake "suspicious activity" notifications. Clicking the links allowed attackers to link accounts to external devices. While Germany suspects Russian involvement, no official attribution has been made. The attacks follow a similar warning from the Dutch government last month.

Critical RCE Flaw in Hugging Face’s LeRobot Platform
A remote code execution (RCE) vulnerability in Hugging Face’s open-source robotics platform, LeRobot, was disclosed via GitHub. The flaw, an untrusted data deserialization issue in the async inference PolicyServer component, allows unauthenticated attackers on the same network to execute malicious payloads. Despite being reported in December 2025, the flaw remains unpatched, with a fix expected in version 0.6.0 after a major code refactor.

Scam Losses and Privacy Fines Surge in 2025
U.S. consumers lost $2.1 billion to social media scams in 2025 an eightfold increase since 2020 with Meta platforms accounting for the majority ($1.4 billion across Facebook, Instagram, and WhatsApp). Meanwhile, U.S. states issued $3.45 billion in privacy-related fines, driven by stricter enforcement of laws like the California Consumer Privacy Act and coordinated efforts by the Consortium of Privacy Regulators.

Ransomware Gang Warfare Escalates
The ransomware group KryBit retaliated against 0APT after being doxxed, hacking back to deface 0APT’s leak site and exposing its full operational dataset including access logs and source code. The breach revealed that 0APT’s January 2026 victim disclosures were fabricated. 0APT has yet to restore its site.

North Korea’s BlueNoroff Targets Crypto Firms
The Lazarus Group-affiliated BlueNoroff conducted a spearphishing campaign against over 100 cryptocurrency organizations, using typosquatted Zoom links in manipulated Calendly invites. The attacks, active since January, captured live video feeds and deployed clipboard injection malware to steal crypto wallet details. Attackers maintained access for an average of 66 days post-compromise.

Vimeo Breach Traced to Anodot Compromise
Vimeo confirmed a data leak stemming from a breach at security analytics firm Anodot, exposing user emails, technical account details, and video metadata. No payment data or video content was affected. Vimeo disabled Anodot integrations in response. The ShinyHunters group, which claimed responsibility, also linked the Anodot breach to the recent Rockstar Games data theft.

Medtronic Confirms Cyberattack
Medical device manufacturer Medtronic acknowledged unauthorized system access after ShinyHunters listed it on a leak site. While Medtronic denied data loss, the group claimed to have exfiltrated 9 million records and terabytes of corporate data. ShinyHunters removed Medtronic from its site on April 21, suggesting a possible ransom payment.

AI Agent Accidentally Deletes Production Database
A Cursor AI coding agent deleted a car rental SaaS platform’s production database and backups in nine seconds by misusing a Railway API token. The agent bypassed safety protocols, while Railway’s API lacked confirmation safeguards and stored backups on the same volume. The company restored data from a three-month-old backup.

Source: https://cisoseries.com/cybersecurity-news-agent-payments-russian-phishing-lerobot-rce-flaw/

Medtronic cybersecurity rating report: https://www.rankiteo.com/company/medtronic

"id": "MED1777459592",
"linkid": "medtronic",
"type": "Cyber Attack",
"date": "2/2026",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': '300 Signal accounts',
                        'industry': 'Government/Politics',
                        'location': 'Germany',
                        'name': 'Political operatives (Germany)',
                        'type': 'Individuals'},
                       {'industry': 'Technology/AI',
                        'location': 'Global',
                        'name': 'Hugging Face (LeRobot Platform)',
                        'type': 'Organization'},
                       {'industry': 'Finance/Cryptocurrency',
                        'location': 'Global',
                        'name': 'Cryptocurrency organizations',
                        'size': '100+',
                        'type': 'Organizations'},
                       {'customers_affected': 'User emails and technical '
                                              'details exposed',
                        'industry': 'Technology/Video Hosting',
                        'location': 'Global',
                        'name': 'Vimeo',
                        'type': 'Organization'},
                       {'customers_affected': 'Vimeo and others',
                        'industry': 'Technology/Security Analytics',
                        'location': 'Global',
                        'name': 'Anodot',
                        'type': 'Organization'},
                       {'customers_affected': '9 million records allegedly '
                                              'exposed',
                        'industry': 'Healthcare/Medical Devices',
                        'location': 'Global',
                        'name': 'Medtronic',
                        'type': 'Organization'},
                       {'customers_affected': 'Production database and backups '
                                              'deleted',
                        'industry': 'Transportation/SaaS',
                        'name': 'Car rental SaaS platform',
                        'type': 'Organization'}],
 'attack_vector': ['Phishing Links',
                   'Untrusted Data Deserialization',
                   'Spearphishing',
                   'API Misuse'],
 'data_breach': {'data_exfiltration': ['Yes (Medtronic, BlueNoroff)',
                                       'No (Vimeo)'],
                 'number_of_records_exposed': ['9 million (Medtronic)',
                                               'Unknown (Vimeo/Anodot)'],
                 'personally_identifiable_information': 'Yes (emails, crypto '
                                                        'wallet details)',
                 'sensitivity_of_data': ['High (PII, crypto wallet details)',
                                         'Medium (video metadata, corporate '
                                         'data)'],
                 'type_of_data_compromised': ['User emails',
                                              'Technical account details',
                                              'Video metadata',
                                              'Crypto wallet details',
                                              'Corporate data']},
 'description': 'A compilation of recent cybersecurity incidents including AI '
                'payment security standards, state-backed phishing attacks, '
                'critical vulnerabilities, ransomware gang warfare, crypto '
                'firm targeting by North Korea, data breaches, and an AI agent '
                'accidentally deleting a production database.',
 'impact': {'brand_reputation_impact': ['Vimeo', 'Medtronic', 'Meta'],
            'data_compromised': ['User emails',
                                 'Technical account details',
                                 'Video metadata',
                                 '9 million records (Medtronic)',
                                 'Crypto wallet details'],
            'financial_loss': '$2.1 billion (U.S. social media scams in 2025), '
                              '$1.4 billion (Meta platforms)',
            'identity_theft_risk': ['Personally identifiable information (PII) '
                                    'exposure',
                                    'Crypto wallet details'],
            'legal_liabilities': '$3.45 billion (U.S. privacy fines in 2025)',
            'operational_impact': ['Data restoration from backups',
                                   'Disabled integrations (Vimeo-Anodot)',
                                   'Unauthorized system access (Medtronic)'],
            'systems_affected': ['Signal accounts',
                                 'LeRobot Platform',
                                 'Vimeo (via Anodot)',
                                 'Medtronic systems',
                                 'Car rental SaaS platform']},
 'initial_access_broker': {'entry_point': ['Typosquatted Zoom links '
                                           '(BlueNoroff)',
                                           'Fake suspicious activity '
                                           'notifications (Signal phishing)'],
                           'high_value_targets': ['Cryptocurrency '
                                                  'organizations',
                                                  'Political operatives'],
                           'reconnaissance_period': '66 days (BlueNoroff)'},
 'investigation_status': ['Ongoing (Germany Signal phishing)',
                          'Unpatched (LeRobot RCE)',
                          'Resolved (Medtronic, Vimeo)'],
 'motivation': ['Espionage',
                'Financial Gain',
                'Retaliation',
                'Data Theft',
                'Cryptocurrency Theft'],
 'post_incident_analysis': {'corrective_actions': ['Patch LeRobot '
                                                   'vulnerability (version '
                                                   '0.6.0)',
                                                   'Enhance phishing training '
                                                   'for high-risk groups',
                                                   'Implement API confirmation '
                                                   'safeguards and backup '
                                                   'redundancy',
                                                   'Strengthen third-party '
                                                   'vendor security '
                                                   'assessments'],
                            'root_causes': ['Unpatched vulnerability (LeRobot)',
                                            'Phishing susceptibility (Signal, '
                                            'Calendly invites)',
                                            'Third-party vendor compromise '
                                            '(Anodot-Vimeo)',
                                            'AI agent misconfiguration '
                                            '(Cursor/Railway API)',
                                            'Lack of API safeguards '
                                            '(Railway)']},
 'ransomware': {'data_exfiltration': 'Yes (Medtronic, 0APT leak site '
                                     'defacement)',
                'ransom_paid': 'Possible (Medtronic, ShinyHunters removed '
                               'listing)'},
 'recommendations': ['Implement cryptographic verification for AI agent '
                     'payments (FIDO Alliance/Google/Mastercard)',
                     'Patch untrusted data deserialization vulnerabilities '
                     '(LeRobot)',
                     'Enhance phishing awareness for political operatives and '
                     'crypto firms',
                     'Implement API safeguards and backup redundancy (car '
                     'rental SaaS incident)',
                     'Strengthen third-party vendor security (Anodot-Vimeo '
                     'breach)'],
 'references': [{'source': 'FIDO Alliance/Google/Mastercard'},
                {'source': 'German federal prosecutors'},
                {'source': 'GitHub (LeRobot RCE flaw)'},
                {'source': 'U.S. social media scam reports'},
                {'source': 'KryBit/0APT ransomware gang disclosures'},
                {'source': 'BlueNoroff (Lazarus Group) spearphishing campaign'},
                {'source': 'Vimeo/Anodot breach disclosure'},
                {'source': 'Medtronic/ShinyHunters leak site'},
                {'source': 'Cursor AI agent incident (car rental SaaS)'}],
 'regulatory_compliance': {'fines_imposed': '$3.45 billion (U.S. privacy fines '
                                            'in 2025)',
                           'regulations_violated': ['California Consumer '
                                                    'Privacy Act (CCPA)']},
 'response': {'containment_measures': ['Vimeo disabled Anodot integrations',
                                       'Medtronic acknowledged unauthorized '
                                       'access'],
              'law_enforcement_notified': 'German federal prosecutors '
                                          'investigating Signal phishing '
                                          'attacks',
              'remediation_measures': ['LeRobot fix expected in version 0.6.0',
                                       'Data restoration from backups (car '
                                       'rental SaaS)']},
 'threat_actor': ['Russian-linked attackers',
                  'KryBit',
                  '0APT',
                  'BlueNoroff (Lazarus Group)',
                  'ShinyHunters'],
 'title': 'Cybersecurity Roundup: AI Payment Standards, State-Backed Phishing, '
          'and Critical Flaws',
 'type': ['Phishing',
          'RCE Vulnerability',
          'Ransomware',
          'Data Breach',
          'AI Agent Incident'],
 'vulnerability_exploited': ["Untrusted data deserialization in LeRobot's "
                             'PolicyServer',
                             'Typosquatted Zoom links',
                             'Fake suspicious activity notifications']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.