🛡️ InfoSec Blue Team Briefing

Wednesday, February 04, 2026

🚨 Critical Vulnerability Alert

We have a critical security alert. CVE-2025-40551, a remote code execution in SolarWinds Web Help Desk via untrusted data deserialization, has been added to the CISA Known Exploited Vulnerabilities catalog.

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Tuesday, February 03, 2026, covering ten articles analyzed overnight. All attribution is by the article authors. All article analysis is automated.

We have a critical security alert. CVE-2025-40551, a remote code execution in SolarWinds Web Help Desk via untrusted data deserialization, has been added to the CISA Known Exploited Vulnerabilities catalog.

Researchers Shakhzod Yuldoldhjaev, Mijin Jeon, Doowon Kim, Nick Nikiforakis, and Hyungjoon Koo published comprehensive decade-long research analyzing fifteen hundred nine APT dossiers from six hundred three unique threat groups operating between 2014 and 2023. The study revealed that the United States, India, and South Korea were most frequently targeted across one hundred fifty-four countries, with malicious documents and spear phishing remaining dominant initial access vectors, though zero-day exploitation has significantly declined since 2016.

According to reports from Matt Green and Velociraptor, and YARA rules developed by mgreen27, the LotusBlossom campaign compromised Notepad++ versions 8.8.2 through 8.8.9 to distribute the Chrysalis backdoor. The malware exploits Microsoft's Warbird Runtime Code Protection feature, embedding malicious payloads within the first 0x490 bytes of Microsoft-signed clipc.dll to execute shellcode while evading antivirus and EDR detection, with command and control infrastructure including api.skycloudcenter.com and api.wiresguard.com.

Researchers Jan-Luca Gruber and Frederik Reiter detailed the Warbird abuse technique, which exploits kernel-level decryption APIs to decrypt and execute shellcode in a single system call, bypassing traditional security monitoring of user-mode memory allocation. This technique has been recently observed in the Notepad++ payload deliveries targeting Windows systems.

ACYCRAFT reports an advanced threat actor conducting an infrastructure-less campaign targeting Taiwan's government and manufacturing sectors since 2024. The attackers use dead-drop resolvers and Microsoft Graph API for command and control laundering, exploit Active Directory Certificate Services ESC vulnerabilities for privilege escalation, and deploy GRAPHBROTLI, GRAPHRELOOK, and RCREMARK malware families while leveraging legitimate cloud services to evade detection.

Trend Micro identified Earth Kurma, an APT group active since November 2020, conducting stealthy data exfiltration campaigns across Southeast Asia including the Philippines, Vietnam, Thailand, Malaysia, Brunei, and Indonesia. The group employs sophisticated multi-stage infection chains with advanced rootkits such as KRNRAT and MORIYA, custom loaders, and memory-resident agents while abusing trusted platforms like Dropbox, OneDrive, and Cisco Webex for lateral movement and data exfiltration from government and telecommunication sectors.

Researcher Omer Amiad discovered the GatewayToHeaven vulnerability, designated CVE-2025-13292, in Google Cloud's Apigee platform. This critical tenant isolation failure allowed unauthorized cross-tenant access to logs and analytics data containing plaintext access tokens, enabling attackers to read and write sensitive data and potentially compromise authentication credentials across organizations using Apigee.

Security researcher clearbluejar, also identified as digicat on infosec.pub, demonstrated how Large Language Models can accelerate reverse engineering of vulnerabilities using CVE-2025-29824 as a case study. This critical use-after-free vulnerability in Windows' Common Log File System driver stems from a race condition where the FsContext2 structure is freed during active IRP processing, potentially enabling privilege escalation or remote code execution on Windows systems.

YARAHQ released a YARA Rule Skill for LLM agents that automates over sixty quality checks for YARA rules, covering logic, performance, and style validation. The tool helps cybersecurity analysts and threat hunters improve rule quality by identifying issues that could lead to false positives, false negatives, or performance degradation.

CodeXTF2 released an open-source reimplementation of Cobalt Strike's Beacon Object File loader to address debugging challenges in BOF development. The tool provides a one-to-one replica of Cobalt Strike's loader implementation, enabling developers to troubleshoot issues with COMDAT sections and other COFF file structures, while exposing internal mechanics that may benefit both offensive tool developers and security researchers analyzing post-exploitation frameworks.

That concludes today's briefing.

📰 Articles Covered