Good morning. This is your security briefing for Monday, January 19, 2026, covering 8 articles analyzed overnight. All attribution is by the article authors. All article analysis is automated.
OZ reports that DPRK hackers are conducting the DEV#POPPER Contagious Interview campaign, targeting software developers through fake job interviews and technical assessments. Victims are tricked into executing malicious code that deploys malware using a resilient Triple-Chain architecture leveraging Tron, Aptos, and Binance Smart Chain blockchains for command and control and payload delivery.
Check Point Research has discovered that Iranian state-sponsored group Handala Hack, associated with Iran's Ministry of Intelligence and Security, has resumed operations targeting entities across the Middle East. The threat actors are operating from Starlink IP ranges, potentially compromising or misusing satellite internet infrastructure to mask their origin and conduct espionage or disruption operations.
The National Cyber Security Centre reports that pro-Russia hacktivist group NoName057(16) continues targeting UK government and private sector organizations with DDoS attacks since March 2022. The group operates through Telegram channels and uses tools like DDoSia hosted on GitHub to conduct coordinated attacks, with operations now extending to UK operational technologies.
DFIR Loading on Detect FYI describes detection methods for Kerberos Golden Ticket attacks where adversaries forge Ticket Granting Tickets using the krbtgt account's password hash. Detection focuses on identifying anomalies like unusually long ticket lifetimes and empty Kdc Called fields using the Velociraptor artifact Windows.Kerberos.GoldenTicketTriage.
Mr-r3b00t has released a KQL detection query to identify suspicious execution of remote access tools, remote desktop software, and potentially malicious utilities on endpoints. The query monitors process creation events and analyzes file paths, original file names, and version information to detect known remote access tools that may be leveraged for unauthorized access or lateral movement.
Bert-JanP from KQL Query has released an updated Logic App V2 solution for monitoring new actions and signals within Microsoft Sentinel and Defender XDR environments. The solution uses Microsoft Graph API to generate weekly HTML reports of newly observed operations and event types, helping security teams prevent detection blind spots.
NetAskari reports on analysis of a collection of penetration testing tools actively used by a commercial pen-tester in China. The toolbox contains widely used security tools alongside region-specific custom frameworks designed for automated reconnaissance, exploit hunting, SQL injection, webshell creation, and exploiting vulnerabilities in services like Nacos and Kubernetes.
Otsmane-Ahmed has developed sliver-tor-bridge, a tool that routes Sliver C2 framework traffic through the Tor network using hidden services. The tool creates a Tor proxy that masks the true IP address of Sliver C2 servers behind onion addresses, making detection and disruption significantly more difficult for defenders.
That concludes today's briefing.