Akira Breaches French Aerospace Supplier Gauthier Connectique; CamoLeak Vulnerability Targets GitHub Copilot
Akira Targets French Aerospace Supply Chain via Gauthier Connectique
Confidence: High
The Akira ransomware group has reportedly exfiltrated 42GB of sensitive data from Gauthier Connectique, a prominent French manufacturer of connectors for civilian and military aerospace applications. The stolen data is said to include blueprints and detailed financial records. This breach highlights the persistent focus of extortion groups on high-leverage industrial suppliers within European defence and aerospace sectors.
The loss of technical blueprints is concerning, as it may provide adversaries with insights into component specifications used in sensitive aerospace systems. Organisations operating within similar supply chains should anticipate continued interest from Akira and Qilin, both of whom have demonstrated a high tempo in European industrial targeting over the last 24 hours.
Qilin Ransomware Expands EU Industrial Victim List
Confidence: High
The Qilin ransomware group has added two additional European industrial victims to its disclosure site: A Roettgers (Germany) and Guerin Glass (France). These additions confirm a sustained campaign targeting manufacturing and industrial service sectors across the EU. The consistent focus on suppliers suggests a deliberate effort to disrupt or extract value from industrial supply chains rather than a sequence of one-off attacks.
CamoLeak: GitHub Copilot Chat Vulnerability Exfiltrates Source Code (CVE-2025-59145)
Confidence: High
A new vulnerability known as 'CamoLeak' (CVE-2025-59145) has been identified in GitHub Copilot Chat. Research shows that hidden markdown comments in untrusted repositories can trigger prompt-injection attacks when a developer interacts with the code. This flaw allows for the silent exfiltration of private source code and environment-variable API keys to attacker-controlled domains.
This finding is particularly relevant to organisations that have integrated AI assistants into their development workflows. It reinforces the danger of allowing AI tools to process untrusted or third-party code without rigorous context-isolation controls.
Update: Fortinet FortiClient EMS Public PoC Released (CVE-2026-35616)
Confidence: High
Update: A public Proof-of-Concept (PoC) exploit has been released for the critical vulnerability in Fortinet FortiClient EMS (CVE-2026-35616). This significantly increases the risk of opportunistic scanning and exploitation against unpatched management consoles.
Update: Smart Slider 3 Pro Clean Patch Released
Confidence: High
Update: A clean patch (v3.5.1.36) is now available for the backdoored Smart Slider 3 Pro plugin. Organisations should update immediately and perform a compromise assessment to identify any rogue administrator accounts created by the previous malicious build.
Update: parisneo/lollms XSS Fixed
Confidence: High
Update: The stored XSS vulnerability in parisneo/lollms (CVE-2026-1115) has been addressed in version 2.2.0. Users of the open-source LLM UI should update to the latest version to prevent potential session hijacking.
Why This Matters
The breach of Gauthier Connectique reminds us that the security of the aerospace supply chain is only as strong as its smallest component manufacturer. At the same time, vulnerabilities like CamoLeak demonstrate that AI-assisted productivity tools are introducing new, invisible attack vectors that bypass traditional code-review practices. The weaponisation of management software like FortiClient EMS further underscores the need for rapid patch cycles in the face of public exploit availability.
- Recommended Actions
- Aerospace Supply Chain: Suppliers in the aerospace and defence sectors should review Akira-associated Indicators of Compromise (IoCs) and strengthen identity-access controls.
- AI Tooling Policy: Implement strict policies for the use of AI assistants with untrusted code and monitor for 'CamoLeak' exfiltration patterns (CVE-2025-59145).
- Fortinet EMS Triage: Prioritise the patching of CVE-2026-35616 and monitor management logs for unauthorised certificate-bypass or header-spoofing attempts.
- Plugin Remediation: Update Smart Slider 3 Pro to v3.5.1.36 and audit WordPress/Joomla admin users for anomalies.
All findings grounded in A13E intelligence sweeps through 06:30 UTC 12 April 2026.