AcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronisAcronis
Acronis
January 16, 2026

MSP cybersecurity news digest, January 12, 2026

ClickFix campaigns use fake BSOD screens to trick users into running malware, Newly disclosed Veeam issues highlight ongoing risks to backup infrastructure, and more. Here are the latest threats to MSP security.

Author: Acronis Threat Research Unit

On this page
ClickFix campaigns use fake BSOD screens to trick users into running malware
Credential theft fuels data breaches across ownCloud, Nextcloud and ShareFile Portals 
Missing extension namespaces in VS Code forks open the door to lookalike malware
Newly disclosed Veeam issues highlight ongoing risks to backup infrastructure
Trend Micro patches severe Apex Central vulnerabilities affecting onpremises installs

ClickFix campaigns use fake BSOD screens to trick users into running malware

ClickFix social-engineering campaigns presented users with fake Windows Blue Screen of Death or update screens that instructed them to execute commands that downloaded and ran malware.

The attack chain relies on user trust and manual action rather than exploitation of a software vulnerability, making it effective against untrained users.

These deceptive screens may deliver next-stage payloads that establish persistence or exfiltrate information once executed.

 

Credential theft fuels data breaches across ownCloud, Nextcloud and ShareFile Portals 

A threat actor offered corporate data stolen from ShareFile, Nextcloud and OwnCloud instances, likely obtained after attackers used infostealer-harvested credentials to access these services.

Stolen credentials permitted unauthorized cloud access, allowing extraction of sensitive documents and business data.

These compromises underscore how credential theft remains a core enabler of data breaches affecting cloud collaboration platforms.

 

Missing extension namespaces in VS Code forks open the door to lookalike malware

Multiple VS Code-based IDE forks surfaced a condition where recommended extensions were missing from OpenVSX, leaving namespaces available for attacker registration.

Attackers can weaponize this by publishing look-alike malicious extensions that users install based on trusted “recommendation” cues.

The security implication is a developer-tool supply-chain insertion point, potentially exposing credentials, source code and build environments.

 

Newly disclosed Veeam issues highlight ongoing risks to backup infrastructure

Updates addressed multiple Veeam Backup & Replication flaws, including issues that could enable remote code execution under certain role / parameter conditions.

Backup servers are frequently targeted because they provide direct leverage over recovery operations and are often reachable from privileged admin contexts.

The broader implication is continued attacker focus on backup-layer disruption as a precursor to, or amplifier for, ransomware outcomes.

 

Trend Micro patches severe Apex Central vulnerabilities affecting onpremises installs

Trend Micro released Critical Patch Build 7190 for Apex Central (on premises) that addresses multiple vulnerabilities, including a critical remote code execution flaw (CVE-2025-69258, CVSS 9.8) that could allow an unauthenticated attacker to load a malicious DLL and execute code with SYSTEM privileges on affected installations.

The patch also fixes two other high-severity flaws (CVE-2025-69259 and CVE-2025-69260) that could lead to denial-of-service conditions, all affecting versions prior to Build 7190.

Because Apex Central is a centralized security management console, compromise could enable attackers to disrupt visibility, configuration and enforcement on connected security products, increasing incident impact.