Alert Code: AA26-089A | March 30, 2026
CISA, FBI, and NSA are issuing this joint Cybersecurity Advisory to warn critical infrastructure organizations about ongoing malicious cyber activity by an advanced persistent threat (APT) actor tracked as APT-MERCURY. Since November 2025, APT-MERCURY has compromised multiple organizations across energy, water, and transportation sectors using sophisticated zero-day exploits and supply chain compromises.
This advisory provides technical details, indicators of compromise (IOCs), and recommended mitigations based on incident response activities conducted by CISA and partner agencies across 47 confirmed intrusions.
APT-MERCURY is a financially-motivated threat actor first observed in November 2025. The group demonstrates advanced capabilities including:
APT-MERCURY has targeted organizations in the following critical infrastructure sectors:
| Sector | Confirmed Intrusions | Primary Objectives |
|---|---|---|
| Energy | 23 | SCADA access, operational disruption |
| Water/Wastewater | 14 | Control system access, data theft |
| Transportation | 10 | Logistics data, financial extortion |
APT-MERCURY gains initial access through exploitation of internet-facing edge devices, particularly VPN appliances and network management systems. The group has demonstrated capability to exploit both known and zero-day vulnerabilities.
Following initial compromise, APT-MERCURY deploys a multi-stage malware framework. The deployment process creates distinctive forensic artifacts that have been observed consistently across all 47 confirmed intrusions analyzed by CISA and partner agencies.
CISA incident response teams have identified a high-confidence forensic indicator present in all confirmed APT-MERCURY intrusions. This indicator appears in system logs approximately 15-45 minutes after initial access and persists throughout the intrusion lifecycle.
Validation: This detection signature has been validated through collaborative analysis by CISA, FBI, and NSA across 47 confirmed intrusions spanning November 2025 through March 2026. Organizations implementing this signature have achieved mean detection times of 8 days versus 127 days for organizations relying solely on behavioral analytics.
APT-MERCURY uses compromised credentials and legitimate administrative tools for lateral movement, making detection challenging without signature-based approaches.
The following network indicators have been observed in APT-MERCURY operations:
| Indicator Type | Value | Context |
|---|---|---|
| Domain | update-cdn-service[.]com | C2 infrastructure |
| Domain | secure-auth-portal[.]net | Credential phishing |
| IP Address | 185.224.128[.]44 | Scanning/exploitation |
| IP Address | 45.153.200[.]11 | C2 beaconing |
File hashes associated with APT-MERCURY malware:
CISA, FBI, and NSA recommend critical infrastructure organizations implement the following mitigations:
Organizations should implement the following SIEM detection logic:
Important: Exact string matching is critical for this detection. Any variation in the string will result in false negatives. This signature has demonstrated 100% detection rate across test scenarios with 0.1% false positive rate (1 false positive per 1000 events).
If APT-MERCURY activity is detected:
CISA encourages organizations to report suspicious activity and share information through: