πŸ›‘οΈ InfoSec Blue Team Briefing

Thursday, January 29, 2026

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Wednesday, January 28, 2026, covering fourteen articles analyzed overnight. All attribution is by the article authors. All article analysis is automated.

Datadog Security Labs released IDE-SHEPHERD, an open-source security extension for VS Code and Cursor IDEs that protects against malicious extensions and compromised workspaces. The tool integrates into the IDE's Node.js runtime using a require-in-the-middle layer to monitor and block malicious activities like arbitrary code execution and data exfiltration in real-time.

Tyrrell Brewster introduced Chronix, a self-hosted, real-time collaborative workspace designed for penetration testers and red team operators to capture and organize notes, commands, outputs, and operational context during security engagements. The tool is licensed under GNU AGPL-3.0 and enables offensive security teams to coordinate their assessment activities.

Mandiant released cleanldap, a Beacon Object File tool designed for performing stealthy LDAP queries over Active Directory Web Services. The tool enables reconnaissance and information gathering from AD environments without triggering standard security alerts, allowing attackers to enumerate users, groups, and directory objects for planning privilege escalation or lateral movement attacks.

Senior Analyst Π‘Π΅Π»Π΅ΠΉ Артём at PT Cyber Analytics published analysis examining the evolution of dark web forums from basic platforms to sophisticated hybrid systems with advanced technical defenses including Tor and I2P networks, custom architectures, and anti-scraping mechanisms. These forums serve as central infrastructure for cybercriminal activities with complex economic models using cryptocurrency and escrow services, employing multi-layered architectures with Onionbalance, CDNs, and custom CAPTCHAs to evade law enforcement and security researchers.

Maxim Suhanov documented a memory safety bug in Windows that causes cleared event logs to be resurrected with data from unrelated log files. Specifically, the Microsoft-AppV-Client operational log was cleared but then contained uninitialized data from the Microsoft-Windows-BitLocker-API log, creating forensic analysis challenges by potentially obscuring the true timeline of events during incident investigations.

CodeCrank.ai reported a sophisticated supply-chain attack targeting developers through a fake LinkedIn job offer, leading victims to a trojanized Node.js application in a GitLab repository. The malware exploited npm's postinstall script to automatically execute, establishing command and control capabilities to steal credentials, exfiltrate sensitive files, and execute arbitrary commands using obfuscated code with Function.constructor to fetch remote payloads.

CodeXTF2 introduced OpenMalleableC2, an open-source library that enables C2 frameworks like Mythic, Havoc, and Adaptix to implement Cobalt Strike's Malleable C2 profile format for HTTP traffic transformation. The framework-agnostic library democratizes sophisticated C2 evasion techniques previously limited to commercial tools, allowing attackers and red teams to disguise command and control traffic as legitimate HTTP requests.

Morphisec disclosed that on January 20, 2026, MicroWorld Technologies' eScan antivirus suffered a critical supply chain compromise where malicious updates were distributed through legitimate update infrastructure. The attack deployed multi-stage malware via a trojanized Reload.exe file, which dropped CONSCTLX.exe downloader that established persistence, modified registry entries, and disabled eScan's update mechanisms, affecting all eScan users globally across both enterprise and consumer editions.

Google Threat Intelligence Group announced the disruption of IPIDEA, one of the world's largest residential proxy networks used by botnet operators, espionage groups, and cybercriminals to mask malicious activities. The operation seized control domains, shared intelligence on IPIDEA's SDKs including Castar, Earn, Hex, and Packet, and removed associated applications from millions of Android devices via Google Play Protect, with the network having facilitated threats including botnets, espionage operations, and compromised consumer devices serving as unwitting exit nodes for illicit traffic.

Macs-Hit published a threat intelligence dossier on TOXICSNAKE, a multi-domain traffic distribution system operation using the domain toxicsnake-wifes[.]com that deploys JavaScript loaders to redirect victims to phishing sites, scam funnels, or malware payloads. The infrastructure utilizes bulletproof hosting through HZ Hosting Ltd, disposable WHOIS information, and multiple burner domains with coordinated tradecraft, targeting users with education and university lures.

ESET Research uncovered a targeted espionage campaign primarily affecting users in Pakistan that utilized a fake dating app called GhostChat to deploy spyware on Android devices. The same threat actor conducted ClickFix attacks using fake government websites to deliver DLL payloads for remote command execution, and GhostPairing attacks that hijacked WhatsApp accounts via malicious QR codes, focusing on data theft, device surveillance, and communication hijacking through social engineering tactics.

Independent researcher Seeker analyzed MoonBounce, a UEFI firmware implant attributed to APT41, also known as the Winnti group. The malware directly patches the DXE Core executable, installing inline hooks on critical boot services including AllocatePool, CreateEventEx, and ExitBootServices to deploy kernel-resident shellcode, operating at the firmware level with boot-path-adaptive capabilities that enable persistent and stealthy kernel-mode execution across legacy and UEFI boot paths.

The New York Times reported that the U.S. Pentagon is integrating cyberwarfare capabilities into military operations, deploying cyberweapons against adversaries including Venezuela, Iran, and Russia. Operations have included disabling power grids, disrupting radar and communications, damaging Iranian nuclear centrifuges, and shutting down Russian troll farms to degrade adversary command and control capabilities.

The Proofpoint Threat Research Team reported that TA584, a cybercriminal threat actor and initial access broker overlapping with Storm-0900, has significantly evolved its attack campaigns in 2025 with tripled operational tempo and expanded global targeting including Germany. The group employs ClickFix social engineering techniques and delivers malware including Tsundere Bot and XWorm RAT, targeting organizations globally across healthcare, government, and business sectors with rapidly iterating tactics that challenge static detection methods.

That concludes today's briefing.

πŸ“° Articles Covered