🛡️ InfoSec Blue Team Briefing

Thursday, October 09, 2025

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Wednesday, October 08, 2025, covering six articles analyzed overnight. All attribution is by the article authors, and all article analysis is automated.

Trellix has published research examining how Russian intelligence agencies now integrate physical and cyber espionage techniques. The analysis reveals operational tradecraft showing how Russian state actors combine traditional physical methods with cyber operations for intelligence gathering campaigns.

Natto Thoughts reports on the evolution of China's vulnerability research ecosystem from fragmented databases to a state-coordinated pipeline. The system now restricts researchers from competing abroad while incentivizing domestic reporting, with larger prize pools than Western equivalents and growing focus on finding vulnerabilities in Chinese products.

Huntress identified China-nexus threat actors exploiting web applications using log poisoning to deploy China Chopper web shells, followed by the Nezha monitoring tool and Ghost RAT. Over 100 victim machines have been identified since August 2025, primarily in Taiwan, Japan, South Korea, and Hong Kong, marking the first public reporting of Nezha being used in web compromises.

Volexity has identified UTA0388, a China-aligned APT group conducting targeted spear phishing campaigns since June 2025 against organizations in North America, Asia, and Europe. The threat actor uses rapport-building phishing techniques with fictional personas engaging targets in multi-email conversations across multiple languages before delivering malicious archives.

Security researcher Himanshu Anand reports threat actors are abusing legitimate Zoom document-sharing features to deliver phishing campaigns targeting Gmail credentials. The attack uses authentic Zoom emails to bypass trust filters, redirects through fake bot protection gates, and exfiltrates credentials in real-time via WebSocket connections, specifically targeting job seekers.

Finally, the UK National Cyber Security Centre has published guidance on strengthening national cyber resilience through enhanced observability and proactive threat hunting capabilities. The guidance emphasizes visibility into network environments and active threat hunting as key components of cyber defense at organizational and national levels.

📰 Articles Covered