Intelligence Insights: March 2026 banner image
Blog

Intelligence Insights: March 2026

By Bridewell CSIRT 7 April 2026 7 min read

Daniel Whitcombe, Threat Intelligence Analyst | Alex Jones, Junior Threat Intelligence Analyst | Joshua Penny, Senior Threat Intelligence Analyst | Nathan Richards, Threat Intelligence Analyst


The Bridewell Threat-Led Approach

Bridewell’s managed security services are built upon a proactive, threat-led defence strategy. Moving beyond reactive monitoring, we actively track adversary infrastructure and tradecraft. By seamlessly integrating Cyber Threat Intelligence (CTI), Incident Response (IR), and Managed Detection and Response (MDR), we ensure our clients remain ahead of the evolving threat landscape.

In a landscape defined by rapid adaptation, knowing what is attacking you is just as critical as knowing how. This month’s Threat Insights leverages data from Bridewell’s global MDR and Incident Response engagements to expose the top malicious infrastructure of March 2026. We go beyond the headlines to provide actionable detection guidance on the month's threat insights, equipping your team with the foresight to stay one step ahead.

Top 5 Malicious Infrastructure Threats Tracked

Threat NameCategoryMarch VolumeMonthly Trend
SliverExploitation Framework1137▼Decreasing
Cerberus-AndroidRemote Access Trojan (RAT)328▲ Rising
BurpVulnerability Scanner260▲ Rising
Cobalt StrikeExploitation Framework143▲ Rising
MetasploitExploitation Framework67▼Decreasing


Threat Detection Insights - March

Handala

This month, Bridewell CTI has been conducting focused research into the detection of, and defensive measures against, activity associated with the Handala group. Handala is a high‑profile pro‑Palestinian hacktivist persona that emerged in late 2023, branded around the symbolic figure of “Handala”. While the group publicly presents itself as a decentralised, ideologically driven collective, multiple security assessments link Handala to Iran’s Ministry of Intelligence and Security (MOIS), commonly aligning it with the state‑affiliated threat actor Void Manticore.

Handala’s operations are best understood as state‑backed psychological warfare, designed to disguise strategic Iranian cyber operations as a grassroots digital uprising. The group prioritises high‑impact disruption and reputational damage over financial gain, with campaigns dominated by destructive activity such as wiper operations, combined with public hack‑and‑leak activity and doxing via platforms including its RedWanted site.

Activity observed in March 2026 highlights a clear expansion towards Western commercial organisations, particularly US‑based firms perceived to have links to Israel. This shift was illustrated by the March 2026 cyber incident affecting global medical technology firm Stryker, which caused widespread disruption to its Microsoft environment through the abuse of legitimate cloud management tooling.

The Stryker incident demonstrates Handala’s strategic preference for weaponising native administrative tooling rather than deploying bespoke malware at scale. By abusing privileged credentials and cloud management platforms such as Microsoft Intune, Handala can achieve rapid, global impact while significantly constraining traditional detection and response timelines.

Community Detection Opportunities

MDE_KQL_Handala_Remote_VSS_Copy
// Detects remote WMI-based activity associated with credential theft or destructive operations
DeviceProcessEvents
| where Timestamp > ago(24h)
| where InitiatingProcessFileName =~ "wmiprvse.exe"
| where FileName in~ ("cmd.exe", "powershell.exe", "pwsh.exe")
| where ProcessCommandLine has_any (
    "VolumeShadowCopy",
    "GLOBALROOT",
    "config\\system",
    "config\\sam",
    "handala.bat"
)
| extend ActionType = case(
    ProcessCommandLine has_any ("copy", "reg save", "reg export"), "Credential/Data Theft",
    ProcessCommandLine has_any ("del", "rmdir", "erase", "vssadmin delete"), "Data Destruction",
    "Generic Unauthorized WMI Execution"
)
| project Timestamp, DeviceName, AccountName, ActionType, FileName, ProcessCommandLine, InitiatingProcessFileName
            
MDE_KQL_DeviceProcessEvents_Handala_PS_Wiper_Execution
// Detects destructive PowerShell-based wiper activity
DeviceProcessEvents
| where Timestamp > ago(24h)
| where (FileName in~ ("powershell.exe", "pwsh.exe", "powershell_ise.exe")
    or ProcessCommandLine has_any ("powershell", "pwsh"))
| where ProcessCommandLine has_all ("Remove-Item", "-Recurse", "-Force")
    or ProcessCommandLine has_any ("Format-Volume", "Clear-Disk", "cipher /w", "ZeroShred", "BiBiWiper")
| summarize FirstSeen=min(Timestamp), LastSeen=max(Timestamp), CommandCount=count()
    by DeviceName, AccountName, ProcessCommandLine, InitiatingProcessFileName
            

Axios npm Package Supply Chain Compromise

March 2026 also saw a notable software supply chain compromise involving the widely used npm package Axios. Threat actors compromised a maintainer account and published malicious versions directly to the npm registry, introducing a rogue dependency executed at install time via npm lifecycle scripts.

The payload provided cross‑platform remote access across Windows, macOS, and Linux environments. While the malicious versions were available only briefly, the scale at which Axios is consumed significantly amplifies downstream risk. Attribution analysis increasingly links this activity to a North Korea‑aligned threat cluster.

Community Detection Opportunities

MDE_DeviceFileEvents_NPMSupplyChainCompromise_Axios_SuspiciousBATScriptDrop
DeviceFileEvents
| where ActionType in~ ("FileCreated", "FileDeleted", "FileRenamed")
| where FileName endswith ".bat"
| where FolderPath matches regex @'(?i)^[a-z]:\\ProgramData\\$'
| where InitiatingProcessFileName in~ (
    "powershell.exe","cmd.exe","node.exe","npm.exe","python.exe","mshta.exe"
)
| project Timestamp, ActionType, DeviceName, FileName, FolderPath, InitiatingProcessCommandLine
            
MDE_DeviceProcessEvents_NPMSupplyChainCompromise_Axios_MasqueradedPowerShellBinary
DeviceProcessEvents
| where
    (ProcessCommandLine has_any ("copy","move")
        and ProcessCommandLine has_all ("powershell","wt.exe","ProgramData"))
    or FolderPath =~ @"c:\programdata\wt.exe"
| project Timestamp, DeviceName, AccountName, FileName, FolderPath, ProcessCommandLine
            

Bridewell CSIRT Detection Rules & Analytics

The following detection content was generated through our managed threat intelligence, threat hunting, and detection and response (MDR) services. The content automatically protects our customers from known and emerging threats.

Detection Analytic ConceptCategory
MDE_KQL_DeviceProcessEvents_ADRecon_Script_ExecutionExecution, Discovery, Defense Evasion & Credential Harvesting
MDE_KQL_Device_ProcessEvents_ADRecon_CommandLineExecution, Discovery, Defense Evasion & Credential Harvesting
MDE_KQL_DeviceNetworkEvents_LDAP_ReconExecution, Discovery, Defense Evasion & Credential Harvesting
MDE_KQL_DeviceProcessEvents_NetBird_ExecutionLateral Movement
MDE_KQL_DeviceNetworkEvents_Netbird_ShellScriptLateral Movement
MDE_KQL_DeviceProcessEvents_Handala_batImpact
MDE_KQL_DeviceNetworkEvents_Handala_Storjshare_Mega_Payload_hostingCommand and Control
YARA_Handala_PowerShell_WiperImpact
MDE_DeviceNetworkEvents_NPMSupplyChainCompromise_Axios_SuspiciousNetworkEventsInitial Access, Execution, Command and Control
SEN_AWSVPCFlow_NPMSupplyChainCompromise_Axios_MaliciousNetworkConnectionsInitial Access, Command and Control
MDE_DeviceFileEvents_NPMSupplyChainCompromise_Axios_TempFileDropDefense Evasion, Execution
MDE_DeviceProcessEvents_NPMSupplyChainCompromise_Axios_ScriptExecutionInitial Access, Execution
MDE_DeviceNetworkEvents_NPMSupplyChainCompromise_Axios_MaliciousNetworkConnectionsCommand and Control
MDE_DeviceProcessEvents_NPMSupplyChainCompromise_Axios_IOCHuntInitial Access
MDE_DeviceFileEvents_NPMSupplyChainCompromise_Axios_MaliciousDependancyInitial Access, Defense Evasion

Stop Reacting. Start Hunting.

Bridewell’s threat-led MDR service combines world-class analysts with proprietary intelligence to protect your critical infrastructure and assets 24/7.

bridewell-logo

Bridewell CSIRT

Cyber Security Incident Response Team

Real-world incident response insights from our cyber security experts.