AI Skill Malware and the Record-Breaking 31Tbps DDoS [Prime Cyber Insights]

This episode of Prime Cyber Insights explores the rapidly expanding threat surface of 2026, where attackers are increasingly abusing trusted ecosystems and automated workflows. We break down the security concerns surrounding OpenClaw and its new VirusTotal partnership, the discovery of over 1,000 malicious 'claw' packages on registries, and the critical 'meta-context injection' vulnerability in DockerDash. The team also analyzes the record-breaking 31.4 Tbps DDoS attack by the AISURU botnet and the Lotus Blossom supply chain attack targeting Notepad++ users. Finally, we examine high-profile breaches at the Dutch Data Protection Authority and the European Commission, alongside a shocking $66 million physical 'wrench attack' on a crypto holder in Arizona, illustrating how digital risks are manifesting in the physical world.

[00:00] Chad Thompson: Welcome to the briefing. We are tracking a really critical shift in the threat landscape this week,
[00:05] Chad Thompson: a shift where attackers are no longer just breaking down doors, but they are poisoning the very
[00:11] Chad Thompson: ecosystems we trust. Joining us today is Chad Thompson, who brings a systems-level perspective
[00:16] Chad Thompson: on AI, automation, and security, blending technical depth and creative insight from both
[00:22] Chad Thompson: engineering and music production. Chad, it is great to have you with us.
[00:26] Chad Thompson: It is a pleasure to be here, Aaron.
[00:29] Chad Thompson: The complexity we are seeing in these automated workflows is creating some fascinating, if dangerous, signal noise.
[00:37] Chad Thompson: When you have these highly interconnected systems talking to each other, the opportunities for interference and malicious insertion grow exponentially.
[00:48] Chad Thompson: It's about finding the gaps in the rhythm of the data.
[00:51] Aaron Cole: The noise is definitely getting loud, Chad.
[00:55] Aaron Cole: We have to start with OpenClaw.
[00:57] Aaron Cole: Wait, what?
[00:58] Aaron Cole: Their new partnership with VirusTotal to scan skills on ClawHub
[01:02] Aaron Cole: is a direct response to a massive influx of malicious claw packages on NPM and PIPI.
[01:09] Aaron Cole: We are talking about over a thousand discovered just this month.
[01:14] Aaron Cole: Erin, it feels like the local first AI revolution is hitting a wall of ecosystem manipulation
[01:19] Aaron Cole: before it even matures.
[01:21] Aaron Cole: We are also seeing Docker Dash vulnerabilities, where AI assistants are being tricked into executing metadata labels as runnable instructions.
[01:31] Chad Thompson: I mean, it is a fundamental trust problem, Lauren.
[01:34] Chad Thompson: While we watch the AI layer, the infrastructure is getting hammered.
[01:38] Chad Thompson: Cloudflare just reported a record-shattering 31.4 terabit per second DDoS attack from the Isuru botnet.
[01:46] Chad Thompson: At the same time, Lotus Blossom has been quietly redirecting Notepad++ update traffic to distribute the Chrysalis backdoor for months.
[01:56] Chad Thompson: They are targeting the distribution points that touch everyone from hobbyists to enterprise devs.
[02:01] Chad Thompson: That Notepad++ hit is a classic engineering failure in update verification.
[02:06] Chad Thompson: But the Docker-metacontext injection is much more subtle.
[02:10] Chad Thompson: It is about the inability of the system to distinguish between informational data and executable commands.
[02:17] Chad Thompson: It is why Microsoft is now scrambling to develop scanners that can find hidden backdoors in open-weight models by looking for shifts in how a model pays attention to a prompt.
[02:32] Chad Thompson: If the attention shifts to a hidden trigger, you've got a problem.
[02:37] Aaron Cole: That's notable. The stakes for that research couldn't be higher because the Watchers themselves are currently being hit.
[02:45] Aaron Cole: The Dutch Data Protection Authority and the Council for the Judiciary just confirmed they were popped by Ivante Zero Days in late January.
[02:53] Aaron Cole: Even the European Commission is investigating a breach of their mobile device management back-end.
[02:59] Aaron Cole: If the agencies in charge of NIS2 and the Cyber Resilience Act are vulnerable,
[03:05] Aaron Cole: it signals a systemic gap in edge device security across the continent.
[03:09] Lauren Mitchell: And that gap is leading to real-world violence.
[03:12] Lauren Mitchell: Two teenagers were just arrested in Scottsdale for a $66 million crypto theft attempt.
[03:18] Lauren Mitchell: They were being extorted by actors on Signal and used 3D printed guns to restrain victims
[03:24] Lauren Mitchell: in their own homes.
[03:25] Lauren Mitchell: This isn't just code anymore, Lauren.
[03:28] Lauren Mitchell: 2025 was the biggest year on record for these wrench attacks.
[03:31] Lauren Mitchell: And 2026 is starting just as aggressively.
[03:35] Lauren Mitchell: The digital and physical threats are merging.
[03:39] Chad Thompson: It is the ultimate system bypass, Aaron.
[03:43] Chad Thompson: When the digital defenses are too strong or the encryption is too robust,
[03:47] Chad Thompson: attackers move to the human endpoint with physical force.
[03:50] Chad Thompson: Whether it is an A-I agent leaking data via prompt injection
[03:55] Chad Thompson: or a physical extortion plot in a living room,
[04:00] Chad Thompson: The common thread is the exploitation of high-privileged access points through whatever means necessary.
[04:06] Aaron Cole: That is the primary takeaway from this week.
[04:09] Aaron Cole: Exposure is outbalancing visibility.
[04:12] Aaron Cole: We are moving from fixing individual software flaws to having to defend entire integration chains from start to finish.
[04:21] Aaron Cole: Aaron, it's a huge shift.
[04:23] Aaron Cole: Thank you for the insights, Chad.
[04:25] Chad Thompson: We will be back next week with more on the evolving threat surface.
[04:29] Chad Thompson: For a deeper look at the data behind the iSERU botnet and the Lotus Blossom redirects,
[04:34] Chad Thompson: visit pci.neurlnewscast.com for the full breakdown.
[04:39] Chad Thompson: This has been Prime Cyber Insights.
[04:41] Chad Thompson: Neural Newscast is AI-assisted, human-reviewed.
[04:45] Chad Thompson: View our AI transparency policy at neuralnewscast.com.

AI Skill Malware and the Record-Breaking 31Tbps DDoS [Prime Cyber Insights]
Broadcast by