๐Ÿ›ก๏ธ InfoSec Blue Team Briefing

Thursday, March 19, 2026

๐ŸŽง Audio Briefing

Download MP3

Good morning. This is your security briefing for Wednesday, March 18, 2026, covering 13 articles analyzed overnight. All attribution is by the article authors. All article analysis is automated.

The Office of the Director of National Intelligence released its annual threat assessment, identifying cyber actors from China, Russia, Iran, North Korea, and ransomware groups as continuing critical threats to U.S. networks and critical national infrastructure. This represents the official intelligence community's prioritization of both state-sponsored APT groups and financially-motivated ransomware operators targeting essential services.

According to ctrlaltint3l, APT28, also known as FancyBear, is employing a Python Flask-based phishing framework that mimics Roundcube and SquirrelMail webmail interfaces to harvest credentials. The framework exploits cross-site scripting vulnerabilities to deploy JavaScript payloads that exfiltrate emails, address books, and establish email forwarding rules for ongoing espionage operations.

Unit 42 reports that Boggy Serpens, also known as MuddyWater, a state-sponsored cyberespionage group attributed to Iran's Ministry of Intelligence, conducted multi-wave phishing campaigns targeting diplomatic, energy, maritime, and finance sectors primarily in the Middle East. The group leveraged hijacked internal accounts, Rust-based tools like BlackBeard, custom malware including UDPgangster backdoor and LampoRAT, and various command and control channels with evidence of AI-assisted development.

NTT Security Japan identified StoatWaffle, a new modular Node.js malware deployed by the North Korea-linked threat group WaterPlum that targets blockchain developers using Visual Studio Code. The malware exploits VSCode's tasks.json file to initiate an infection chain deploying stealer and RAT modules capable of extracting credentials from browsers, extensions, and macOS Keychain while operating across multiple platforms including Windows Subsystem for Linux.

According to IIJ Security Diary, the North Korean APT group Kimsuky launched a malware campaign in March 2026 targeting South Korean users by exploiting Dropbox's API to host and distribute malicious payloads. The attack utilized LNK files that deployed PowerShell scripts to gather system information, exfiltrate data to Dropbox using hardcoded API credentials, and download secondary payloads including potential remote access trojans while establishing persistence through scheduled tasks.

Amazon Web Services threat intelligence identified an active Interlock ransomware campaign exploiting CVE-2026-20131, a critical vulnerability in Cisco Secure Firewall Management Center that allows unauthenticated remote code execution as root. The attackers deploy custom RATs, webshells, and leverage legitimate tools like ConnectWise ScreenConnect to gain persistence before deploying ransomware, primarily targeting education, engineering, manufacturing, healthcare, and government sectors.

Trend Micro Research reports that the Warlock ransomware group, also tracked as Water Manual, conducts sophisticated attacks exploiting unpatched Microsoft SharePoint servers, deploying an extensive toolkit including TightVNC, Yuze reverse proxy, bring-your-own-vulnerable-driver techniques to disable security products, and legitimate tools like VS Code tunnels and Cloudflare Tunnels for command and control. The group targets technology, manufacturing, government, and education sectors primarily in the United States, Germany, Russia, and the United Kingdom, using Active Directory Group Policy for ransomware distribution and timing attacks during holiday periods when security monitoring is reduced.

ConnectWise has released ScreenConnect version 26.1 to address CVE-2026-3564, rated at CVSS 9.0, a critical vulnerability where unique machine keys were stored in plain text within server configuration files. Malicious actors could extract these keys to gain unauthorized session authentication, and on-premise users must upgrade immediately to the new version, which implements encrypted storage of cryptographic material.

iVerify researchers discovered DarkSword, a sophisticated iOS exploit kit targeting devices running iOS 18.4 through 18.6.2 via compromised legitimate websites. The kit uses a multi-stage exploit chain involving JavaScriptCore JIT vulnerabilities, sandbox escape through the GPU process, and XNU kernel privilege escalation to achieve full device control, with attacks initially targeting users in Ukraine and expanding to Saudi Arabia, Turkey, and Malaysia.

Security researcher st3rven released FrontHunter, a tool for identifying domain fronting candidates from large domain lists. Domain fronting is a technique used to obfuscate command and control traffic destination, making malicious communications harder to detect and block, with the tool primarily intended for security researchers and penetration testers.

Security researcher Tim Blazytko developed an agentic malware analysis pipeline that enables large language models to autonomously perform reverse engineering tasks using tool-based workflows. The pipeline was evaluated against the German Staatstrojaner federal trojan component, demonstrating improved capability in uncovering complex malware functionalities through a structured four-stage approach that addresses context limitations and separates evidence from reasoning.

According to Flangvik, RegPwnBOF is a Cobalt Strike Beacon Object File that exploits a registry symlink race condition in the Windows Accessibility ATConfig mechanism to achieve local privilege escalation from normal user to SYSTEM. The exploit affects Windows 11, Windows 10, and Windows Server versions prior to the March 2026 security update, targeting the msiserver service by default to write arbitrary values to protected HKLM registry keys.

The Atlantic Council published research examining how intermediaries such as brokers and resellers facilitate the proliferation of offensive cyber capabilities including spyware. These intermediaries connect vulnerability researchers with buyers, repackage cyber intrusion tools, and provide infrastructure for operations, creating an opaque market that enables cross-jurisdictional sales to potentially abusive end-users including governments targeting journalists, activists, and political leaders.

That concludes today's briefing.

๐Ÿ“ฐ Articles Covered