🛡️ InfoSec Blue Team Briefing

Wednesday, October 15, 2025

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Tuesday, October 14, 2025, covering nine articles analyzed overnight. All attribution is by the article authors, and all article analysis is automated.

Researchers at UC San Diego have discovered that unencrypted satellite communications are exposing sensitive data across up to 40% of Earth's surface. Using consumer equipment costing just a few hundred dollars, they intercepted cellular backhaul with encryption keys, military vessel tracking, government VoIP calls, and internal corporate networks from retail and financial institutions.

CERT-UA reports that threat actor group UAC-0239, linked to Russian sabotage operations, is conducting cyberattacks using the OrcaC2 framework and FILEMESS stealer malware. The campaign demonstrates coordinated use of command and control infrastructure alongside information-stealing capabilities.

ReliaQuest has uncovered how China-backed APT group Flax Typhoon maintained year-long access to an ArcGIS system by weaponizing a legitimate Java server object extension into a web shell. The attackers embedded the malicious component in system backups to ensure persistence even through recovery operations, prompting the vendor to update its security documentation.

Proofpoint is tracking TA585, a financially-motivated threat actor, and has published analysis of their toolkit and arsenal. The research focuses on the specific tools, tactics, and procedures employed by this group across their campaigns.

Sekoia has released a technical analysis of the PolarEdge backdoor malware. Their research examines the backdoor's functionality, command and control mechanisms, and provides detection methods for security teams.

Researchers at AITMfeed tracked ClickFix campaign infrastructure over several months, collecting over 13,000 unique hostnames with a significant spike in mid-August. Analysis revealed that 76% of ClickFix infrastructure overlaps with Adversary-in-the-Middle datasets, suggesting shared use of compromised infrastructure across multiple malicious campaigns.

South Korea's Ministry of Science and ICT has requested a police investigation into KT telecommunications for allegedly obstructing a data breach probe. The company allegedly submitted false information about server disposal, concealed backup logs, and failed to cooperate with investigators examining breaches that compromised hundreds of users and involved 240 million won in unauthorized mobile payments.

RULEZET, managed by Cyril Brulebois, is a new open source platform that centralizes security detection rules including YARA and Suricata signatures. The platform enables security practitioners to comment on, review, and bundle rules together, with integration capabilities for MISP threat intelligence sharing.

Microsoft's Edge security team received intelligence in August that threat actors were actively exploiting unpatched zero-day vulnerabilities in Internet Explorer's Chakra JavaScript engine through IE mode. The company is implementing reactive changes to IE mode to address this active exploitation, which combines social engineering with technical exploits to gain access to victim devices.

📰 Articles Covered