In this urgent episode of Small Business Cybersecurity Guy, hosts Mauven MacLeod and Graham Falkner join the notably fed-up Noel Bradford to unpack four simultaneous, highāimpact campaigns that emerged between late January and early February 2026. We walk listeners through detailed research from Trellix, Securonix, Rapid7 and Microsoft and explain why these attacks matter to every small business ā even if you think youāre too small to be a target.
We open with APT28 (Fancy Bear) exploiting CVEā2026ā21509: a weaponised Office document that triggers on open, drops an Outlook backdoor (MiniDoor/NotDoor) and a C++ implant (Beardshell) injected into svchost.exe, exfiltrating email and system data while blending traffic into legitimate cloud services.
Next, Securonixās āDead Vaxā campaign shows how commodity criminals now match nationāstate tradecraft. Phishing delivers VHD files that mount like drives, bypass markāofātheāweb warnings and execute fileless loaders that ultimately deploy AsyncRAT ā giving attackers remote control, keylogging and full data access.
Rapid7ās analysis of the Chrysalis backdoor reveals a supplyāchain compromise of Notepad++ hosting infrastructure: poisoned installers selectively targeted victims, abused DLL sideāloading and trusted signed binaries to achieve persistent, encrypted backdoors and lateral movement tools. This is supplyāchain risk in practice.
Microsoftās macOS research details multiple Stealer campaigns (Digit Stealer, Mac Sync, ClickFix, Atomic Stealer and more) distributed through poisoned Google Ads, fake AI tools and messaging apps. These attacks live off native macOS utilities, use AppleScript and Python, and harvest passwords, crypto wallets, SSH keys and cloud credentials ā exposing the myth that Macs are immune.
We connect the dots: all four campaigns abused legitimate platforms and native features, used memoryāresident or fileless techniques that bypass signature AV, injected into trusted processes, and moved faster than patch cycles. The real victims are not random users but procurement staff, developers and privileged employees. Small businesses face the same capabilities for a fraction of the cost via malware-as-a-service.
On the regulatory front we cover the Data Use and Access Act (DUAA) changes that took effect in February 2026: cookie and eāmarketing fines jump to Ā£17.5m or 4% of global turnover, new rules around childrenās higher protection matters, a new lawful basis for limited public interest processing, and mandatory complaints handling procedures coming into effect on June 19. We explain why a breach today risks vastly larger financial and compliance consequences.
Finally, we give practical, prioritized guidance for small businesses: immediate zeroācost steps (patch Office, verify Notepad++ versions, show file extensions, audit cookie banners, start a complaints procedure), technical controls to adopt (EDR/behavioral monitoring, managed email security, Mac MDM/EDR, fractionally engaged CISO/CIO), and realistic budgets and tradeāoffs for a 20āperson company. Links to all source research and a detailed blog post are in the show notes for listeners who want the technical deep dive.