Good morning. This is your security briefing for Sunday, February 15, 2026, covering six articles across malware threats, attack techniques, and security tools. All attribution is by the article authors, and all article analysis is automated.
According to research by Mike, a new information-stealing malware called DigitStealer has been discovered targeting macOS users, including Apple M2 devices. The malware steals cryptocurrency wallet data from 18 different wallets, browser information, and macOS keychain data while functioning as a persistent backdoor that continuously polls command and control servers. Researchers were able to map the C2 infrastructure cluster by identifying consistent patterns in how operators registered domains and procured hosting services.
Socket's Threat Research Team has identified a malicious Chrome extension called 'CL Suite by @CLMasters' targeting Meta Business Manager and Facebook Business Manager users. The extension steals TOTP two-factor authentication seeds and current codes to bypass 2FA protection, while also exfiltrating business contact lists, analytics data, and payment information to a backend server at getauth[.]pro and Telegram channels. The threat enables trivial account takeovers and remains persistent even after the extension is removed.
According to research published on infosec.pub, security researchers have detailed how malicious Windows LNK shortcut files can disguise malicious executables and hide command-line arguments to deceive end-users. The article introduces 'lnk-it-up', an open-source tool suite capable of both generating deceptive LNK files and detecting anomalous ones, including variants exploiting CVE-2025-9491, noting that traditional security measures often fail to detect these attacks until payload execution occurs.
WIRED reports that a surge of sophisticated bot traffic has been impacting websites globally since September, originating primarily from China and Singapore and routing through major Chinese cloud providers including Tencent, Alibaba, and Huawei. The bots mimic normal human users with zero-second dwell times and no user interaction, affecting personal blogs, e-commerce sites, large platforms, and US government domains. While not actively scanning for vulnerabilities, the traffic increases operational costs, distorts analytics, and negatively impacts advertising revenue.
RunReveal has released sigmalite, an open-source Go-based parser and execution engine for Sigma detection rules. The tool enables security defenders to parse YAML-formatted Sigma rules and execute threat detection logic, featuring field modifiers and a FieldResolver interface for complex field lookups, providing a technical foundation for implementing Sigma-based detection strategies in security operations.
HybridBrothers has released a GitHub repository containing detection rules and hunting queries for Microsoft Defender for Office 365 and Teams. The rules target phishing campaigns using direct send methods, external users sending suspicious links, malicious Teams messages, and Business Email Compromise attacks leveraging high volumes of Teams recipients.
That concludes today's briefing.