🛡️ InfoSec Blue Team Briefing

Friday, February 06, 2026

🎧 Audio Briefing

Download MP3

Good morning. Yesterday's security developments from Thursday, February 05, 2026. We're analyzing 15 articles today. All attribution is by the article authors. All article analysis is automated.

According to reports from CISA, the FBI, and the U.K.'s National Cyber Security Centre, nation-state threat actors are actively exploiting unpatched vulnerabilities in End-of-Support edge devices including firewalls, routers, VPN gateways, and load balancers. These devices no longer receive manufacturer security updates, creating persistent vulnerabilities that enable initial network access and data compromise. In response, CISA has issued Binding Operational Directive 26-02 mandating Federal Civilian Executive Branch agencies inventory affected devices within three months and decommission or replace them within twelve months.

Cisco Talos disclosed DKnife, a sophisticated gateway-monitoring and adversary-in-the-middle framework attributed to a China-nexus threat actor. The framework enables interception and manipulation of network traffic, allowing attackers to steal credentials, alter data in transit, and maintain persistent access to victim networks.

Palo Alto Networks Unit 42 uncovered a state-aligned cyberespionage group designated TGR-STA-1030, also known as UNC6619, originating from Asia that has been conducting global espionage operations since January 2024. The group has compromised organizations in 37 countries and performed reconnaissance in 155 countries, primarily targeting government ministries involved in law enforcement, finance, economic affairs, and diplomatic functions through phishing campaigns and exploitation of known vulnerabilities.

CyStack reports that APT-Q-27, also known as GoldenEyeDog, is targeting financial institutions using sophisticated malware delivered through phishing emails via Zendesk. The attack chain uses a digitally-signed dropper that deploys an in-memory backdoor capable of establishing persistence through Windows services, disabling User Account Control, and communicating with command and control servers for additional module deployment.

Broadcom discovered that Black Basta ransomware has embedded a Bring-Your-Own-Vulnerable-Driver defense evasion component directly into the ransomware payload, exploiting CVE-2025-68947 in the NsecSoft NSecKrnl driver. This integration allows the ransomware to terminate security processes from Sophos, Microsoft Defender, and Avast at kernel-level, making attacks stealthier and faster by eliminating separate tool deployment.

The Canadian Centre for Cyber Security released a Ransomware Threat Outlook for 2025-2027, projecting continued threats to all Canadian organizations and individuals. The report details evolving ransomware tactics including Ransomware-as-a-Service, multi-extortion methods, AI-enhanced attacks, and exfiltration-only operations, with threat actors remaining opportunistic and financially motivated.

The Zero Day Initiative disclosed a critical use-after-free vulnerability in Cisco Snort, tracked as CVE-2026-20026, that allows remote attackers to execute arbitrary code without authentication. The vulnerability has a CVSS score of 9.8 and can lead to complete system compromise, though Cisco has released patches to address this critical flaw.

Datadog Security Labs reports that threat actors are exploiting the React2Shell vulnerability, CVE-2025-55182, to gain remote code execution and deploy malicious NGINX configuration modifications that hijack web traffic. The campaign uses automated shell scripts to inject proxy directives that redirect users to attacker-controlled domains, with targets including NGINX installations with Baota management panels, focusing on Asian TLDs and Chinese hosting infrastructure.

Palo Alto Networks observed the KongTuke campaign using ClickFix scripts that leverage DNS TXT records to stage and execute malicious PowerShell payloads. The multi-stage attack chain involves resolving DNS TXT records from attacker-controlled domains to retrieve URLs pointing to PowerShell scripts, with the campaign demonstrating adaptability by rotating through various delivery techniques including DNS TXT records, finger protocol, and mshta.

ShadowOpCode researchers discovered and analyzed DesckVB RAT version 2.9, a previously undocumented .NET Remote Access Trojan with modular plugin architecture linked to the Pjoao1578 toolchain. The malware uses a multi-stage infection chain starting with JavaScript, progressing through PowerShell loaders, and deploying plugins for keylogging, webcam access, and system control via custom TCP command and control communication.

Security researchers Amine Ismail and Anirudha Kanodia released aura-inspector, an auditing tool for Salesforce Experience Cloud applications. The tool uses an undocumented GraphQL Aura method to identify misconfigurations including unauthorized record access, exposed administrative URLs, and vulnerable self-registration capabilities, providing a command-line interface for security researchers and developers to proactively discover vulnerabilities.

Victor M. Alvarez announced that the YARA-X project released an official Language Server that integrates with code editors to enhance YARA rule writing through intelligent features like real-time diagnostics, autocompletion, and navigation tools. The server uses the Language Server Protocol and is currently in beta for Visual Studio Code, enabling security researchers and developers to create more effective threat detection rules with improved efficiency.

Owl4444 released jsdeob-workbench, a visual deobfuscation tool that enables security researchers and analysts to reverse engineer obfuscated JavaScript code, including malware samples, webpack bundles, and obfuscator.io output. The tool uses BabelJS for abstract syntax tree parsing and transformation, featuring a three-panel interface with built-in transforms and support for custom plugins to aid in malware analysis and threat detection.

In an opinion piece on Bytes and Borscht, an independent cybersecurity and geopolitics blog, the author argues that lack of accountability for cybersecurity failures perpetuates a cycle of recurring incidents, using the 2021 Colonial Pipeline ransomware attack as an example. The article contends that organizations treat cybersecurity as a compliance exercise rather than core business priority, and advocates for treating every breach as a preventable failure and strengthening enforcement of existing regulations.

That concludes today's briefing.

📰 Articles Covered