πŸ›‘οΈ InfoSec Blue Team Briefing

Tuesday, March 17, 2026

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Monday, March 16, 2026, covering six articles analyzed overnight. All attribution is by the article authors, and all article analysis is automated.

Elastic security researchers have published an analysis of AI coding agents deployed in security operations, revealing critical vulnerabilities to prompt injection attacks, data exposure, and privilege escalation. The research shows how AI agents with real credentials and shell access can process attacker-controlled input from security data sources, potentially enabling exploitation through context file manipulation and leading to sensitive data exfiltration to third-party APIs.

Security researcher Jonathan Johnson has detailed a method for hooking the CreateLxProcess COM method in Windows Subsystem for Linux using C++ Run-Time Type Information when debugging symbols are unavailable. This technique addresses a security gap where attackers can leverage COM interfaces to execute Linux processes stealthily without launching wsl.exe directly, particularly relevant for WSL2 environments built on Hyper-V that lack robust native telemetry sources.

A security researcher has published a novel technique to bypass Windows Protected Process Light protections and extract memory dumps from the LSASS process. The method exploits WinSock2's Autodial feature to load xolehlp.dll into LSASS, then leverages the WriteDumpThread function to invoke MiniDumpWriteDump, enabling attackers to harvest passwords, hashes, and Kerberos tickets for privilege escalation and lateral movement.

The Genians Security Center reports that the Konni APT group, linked to North Korean interests, has launched a sophisticated spear-phishing campaign using North Korea-themed lures to deliver EndRAT, RftRAT, and RemcosRAT malware. The attack exploits the KakaoTalk PC application to propagate malicious files through compromised victim contacts, establishing persistence and exfiltrating sensitive data.

The FBI Seattle Division is investigating a malware incident where threat actors embedded malicious code within seven Steam games between May 2024 and January 2026. The affected games include BlockBlasters, Chemia, Dashverse, Lampy, Lunara, PirateFi, and Tokenova, and the FBI is seeking victim information through IC3 or the dedicated email Steam_Malware@fbi.gov.

Finally, a red team tool called VMkatz has been released that extracts Windows credentials and secrets directly from virtual machine memory snapshots and disk files without requiring full VM exfiltration. The tool can extract NTLM hashes, DPAPI master keys, Kerberos tickets, and Active Directory hashes in-place from VM files stored on NAS or hypervisors, enabling stealthy credential harvesting during penetration testing while minimizing network traffic and detection risks.

That concludes today's briefing.

πŸ“° Articles Covered