πŸ›‘οΈ InfoSec Blue Team Briefing

Friday, February 27, 2026

🎧 Audio Briefing

Download MP3

Yesterday's security developments from Thursday, February 26, 2026. We're covering 4 articles today. All attribution is by the article authors. All article analysis is automated.

A security researcher at kmsec.uk has published findings on tracking North Korean APT group FAMOUS CHOLLIMA's IP addresses by exploiting vulnerabilities in temporary email services used to register malicious npm accounts. The analysis revealed the group's operational infrastructure between July 2025 and January 2026, showing their use of VPNs like Astrill and hide.me, along with network providers including China Unicom and TransTeleCom Russia for distributing malware through the npm software supply chain.

Censys has disclosed details about ResidentBat, an Android spyware implant developed by the Belarusian KGB and discovered in December 2025. The malware has been targeting journalists and civil society members since at least 2021, requiring physical device access for installation and enabling comprehensive surveillance including exfiltration of SMS, call logs, encrypted messages, recordings, and screen captures through command and control infrastructure located in Europe and Russia. Detection involves monitoring TLS connections with CN=server certificates on ports 7000 through 7257 and implementing physical access controls.

Cisco Talos has identified a new malware campaign called Dohdoor, operated by threat actor UAT-10027, targeting U.S. education and healthcare organizations since December 2025. The malware uses DNS-over-HTTPS for command and control communications through Cloudflare infrastructure and employs EDR bypass techniques by unhooking ntdll.dll to execute payloads reflectively, potentially delivering Cobalt Strike beacons.

Infoblox has reported that threat actors are exploiting the .arpa top-level domain, normally reserved for infrastructure, to host phishing content by creating A records for reverse DNS names in IPv6 address space instead of expected PTR records. The campaign bypasses traditional security measures because .arpa domains have inherently clean reputations and are implicitly trusted for internet infrastructure, coordinating abuse of free IPv6 tunnels with DNS providers that permit A record creation for .arpa domains.

That concludes today's briefing.

πŸ“° Articles Covered