CRITICAL 2 min read 30 Mar 2026

AI Orchestration Framework Vulnerabilities and Field-Confirmed AI-Generated Malware

A cluster of 7 orchestration framework CVEs (up to CVSS 9.8) demands immediate infrastructure patching, while active ransomware groups deploy the first field-confirmed LLM-generated malware.

Key findings
01
AI Orchestration Framework: CVE Cluster (CVE-2026-32924, 32975, 33573)
HIGH
[High] A critical cluster of seven vulnerabilities (CVE-2026-32924, 32975, 33573, among others) has been disclosed affecting the orchestration framework versions prior to 2026.3.12.
02
Field-Confirmed AI-Generated Malware: Slopoly
HIGH
[High] The first documented case of LLM-generated malware in active ransomware operations has been confirmed. The "Slopoly" PowerShell backdoor, deployed by the Hive0163 ransomware group, exhibits structural characteristics indicative of AI-assisted creation, including highly consistent comment density, specific token entropy patterns, and automated logic flow.
03
Handala Group Targets NHS Supply Chain
HIGH
[High] The Iran-linked Handala hacktivist group has successfully compromised Stryker Medical, a critical supplier for NHS England. The data-wiping attack has disrupted the supply of essential surgical equipment, leaving hospitals with approximately two weeks of critical stock.
04
Update: F5 BIG-IP CVE-2025-53521
HIGH
[High] The F5 BIG-IP vulnerability (CVE-2025-53521) has been reclassified from a Denial of Service (DoS) condition to a Critical Remote Code Execution (RCE) flaw. It has been officially added to the CISA Known Exploited Vulnerabilities (KEV) catalogue effective 28 March 2026.
05
Update: Trivy CVE-2026-33634
HIGH
[High] The scale of the Trivy supply chain compromise (CVE-2026-33634) has been confirmed to involve over 1,000 victim organizations. Threat actors remain exceptionally aggressive in their extortion attempts against impacted entities.

AI Orchestration Framework Vulnerabilities and Field-Confirmed AI-Generated Malware

AI Orchestration Framework: CVE Cluster (CVE-2026-32924, 32975, 33573)

Confidence: High

A critical cluster of seven vulnerabilities (CVE-2026-32924, 32975, 33573, among others) has been disclosed affecting the orchestration framework versions prior to 2026.3.12. With CVSS scores reaching 9.8, these flaws enable unauthenticated authorization bypasses, reaction event misclassification (bypassing groupAllowFrom restrictions), and workspace boundary escapes.

The workspace boundary bypass (CVE-2026-33573, CVSS 8.8) is particularly severe, as it allows authenticated operators to escape workspace isolation and perform arbitrary file operations. Immediate patching to 2026.3.12+ is mandatory for all deployment environments.

Field-Confirmed AI-Generated Malware: Slopoly

Confidence: High

The first documented case of LLM-generated malware in active ransomware operations has been confirmed. The "Slopoly" PowerShell backdoor, deployed by the Hive0163 ransomware group, exhibits structural characteristics indicative of AI-assisted creation, including highly consistent comment density, specific token entropy patterns, and automated logic flow.

This malware is part of a sophisticated attack chain involving click-fix social engineering, NodeSnake delivery, and InterlockRAT beaconing. This finding transitions AI-generated malware from theoretical research to an operational reality for financially motivated threat actors, signaling a need for EDR solutions to adapt to non-human code structural patterns.

Handala Group Targets NHS Supply Chain

Confidence: High

The Iran-linked Handala hacktivist group has successfully compromised Stryker Medical, a critical supplier for NHS England. The data-wiping attack has disrupted the supply of essential surgical equipment, leaving hospitals with approximately two weeks of critical stock. This incident validates NCSC warnings regarding Middle Eastern threat actors targeting Western critical national infrastructure.

Update: F5 BIG-IP CVE-2025-53521

Confidence: High

The F5 BIG-IP vulnerability (CVE-2025-53521) has been reclassified from a Denial of Service (DoS) condition to a Critical Remote Code Execution (RCE) flaw. It has been officially added to the CISA Known Exploited Vulnerabilities (KEV) catalogue effective 28 March 2026.

Update: Trivy CVE-2026-33634

Confidence: High

The scale of the Trivy supply chain compromise (CVE-2026-33634) has been confirmed to involve over 1,000 victim organizations. Threat actors remain exceptionally aggressive in their extortion attempts against impacted entities.

Why This Matters

Infrastructure is no longer just vulnerable to human error; it is now facing an onslaught of AI-accelerated zero-day discovery and automated exploitation. The combination of foundational framework flaws (orchestration frameworks) and supply chain targeting (NHS/Stryker) indicates a shift toward high-impact, low-effort disruption of critical systems.

  • Recommended Actions
  • Patch orchestration framework instances to 2026.3.12 immediately.
  • Evaluate NHS supply chain exposure for UK-based clients.
  • Monitor EDR for structural anomalies consistent with LLM-generated code patterns (Slopoly).

All findings grounded in A13E intelligence sweeps through 06:30 UTC 30 March 2026.

ai-malwarecve-2025-53521cve-2026-32924cve-2026-33573cve-2026-33634handalaslopoly

Act on this brief

Map detection coverage gaps for the techniques above, or generate Sigma rules from the named CVEs.