🛡️ InfoSec Blue Team Briefing

Sunday, April 05, 2026

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Saturday, April 04, 2026, covering 13 articles. All attribution is by the article authors. All article analysis is automated.

Breakglass Intelligence reports that the APT41 Winnti group has deployed a sophisticated ELF backdoor with zero antivirus detections, using three typosquat domains for command and control communication. The malware harvests cloud instance metadata from AWS, GCP, Azure, and Alibaba Cloud to steal credentials and API tokens, enabling full cloud account compromise, and uses advanced obfuscation while communicating over SMTP port 25 for stealth.

Censys researchers uncovered a web-delivered malware campaign using a technique-based hunting methodology. The attack chain uses a ClickFix social engineering lure on a compromised Turkish website to deliver PhantomVAI loader and XWorm V5.6 RAT through PowerShell, HTA files with Unicode emoji obfuscation, and steganography in JPEG files, demonstrating advanced evasion techniques including VM detection, process hollowing, and AES-encrypted C2 communications.

A detection engineer documented in the Catscrdl series has built 15 container escape scenarios across five attack classes to analyze kernel-level telemetry and test eBPF-based detection tools including Tetragon, Falco, and Tracee. The research evaluated how these tools capture telemetry from various escape techniques including misconfigurations, kernel exploits, capability abuse, and adversarial syscall flooding, emphasizing understanding detection gaps and the need for custom tuning beyond default configurations.

Google has released an automated hardening tool for VMware vCenter Server Appliance that implements Zero Trust security controls and forensic auditing capabilities. The tool addresses APT threats by shifting VCSA from a default-permit to default-deny security model using native Linux iptables controls, implementing micro-segmentation, command auditing, anti-lateral movement restrictions, and rate limiting for organizations using VCSA as a Tier-0 asset in high-security environments.

Jason Saayman, the lead maintainer of the axios npm package, reports that on March 31, 2026, attackers published two malicious versions of axios containing a remote access trojan targeting macOS, Windows, and Linux systems. The attack originated from a sophisticated social engineering campaign that compromised the maintainer through a fake company impersonation, branded Slack workspace, and malicious Microsoft Teams meeting that delivered RAT malware, with the malicious packages available for approximately three hours.

Evilsocket has discovered three critical vulnerabilities in the Mongoose embedded web server library, affecting hundreds of millions of devices from major manufacturers including Siemens, Schneider Electric, Broadcom, Bosch, Google, Samsung, Qualcomm, and Caterpillar. The vulnerabilities, tracked as CVE-2026-5246, CVE-2026-5244, and CVE-2026-5245, enable pre-authentication remote code execution through heap and stack-based buffer overflows, as well as an mTLS bypass when P-384 certificates are used, potentially affecting devices using MG_TLS_BUILTIN or mDNS functionality.

Fortinet has identified an Improper Access Control vulnerability in FortiClient EMS versions 7.4.5 and 7.4.6 that allows unauthenticated attackers to execute unauthorized code or commands via crafted API requests, leading to privilege escalation. Fortinet has observed active exploitation of this vulnerability in the wild, with hotfixes immediately available for affected versions and version 7.4.7 including a permanent fix.

Takahiro Takeda and Holger Unterbrink report that Qilin ransomware operators deploy a sophisticated multi-stage infection chain that disables over 300 EDR solutions using a malicious DLL loader and helper drivers. The malware employs advanced evasion techniques including SEH/VEH manipulation, API unhooking, and direct physical memory access to terminate EDR processes before deploying ransomware, targeting organizations globally while excluding post-Soviet countries through geo-fencing.

A security researcher at zsec.uk developed an autonomous vulnerability hunting system using Claude Code and the Model Context Protocol that orchestrates security tools to automate vulnerability discovery. The system successfully identified multiple vulnerabilities including OOM flaws in Go's standard library image processing packages, a critical zero-day SYSTEM privilege escalation chain in a widely-deployed Windows OEM management agent affecting millions of enterprise machines, and vulnerabilities in a macOS application distribution platform enabling data exfiltration and malicious updates.

Elastic released an open-source tool called Supply Chain Monitor that automatically detects supply chain compromises in top PyPI and npm packages. The tool polls package registries for new releases, generates diffs against previous versions, and uses an LLM to classify changes as benign or malicious with Slack alerting for suspicious findings, specifically looking for indicators like obfuscated code, unexpected network calls, credential exfiltration, and typosquatting.

Raytheon BBN Technologies released Maude-HCS, a formal toolchain for specifying and analyzing Hidden Communication Systems that embed covert messages in network traffic. The tool enables researchers and network designers to formally verify undetectability claims and evaluate privacy-performance trade-offs through Monte Carlo sampling and probabilistic modeling, supporting configuration from JSON and YML and capable of modeling protocols like iodine DNS tunneling with adversary profiles including Zeek detectors.

Rapid7 released a whitepaper documenting seven new variants of BPFDoor, a kernel-level backdoor that uses Berkeley Packet Filters to inspect network traffic within the operating system kernel. These variants demonstrate significant advancement in evasion capabilities and are specifically targeting global telecom infrastructure, with threat actors evolving their tactics to bypass static indicators of compromise.

Quarkslab has released SightHouse, an open-source tool that automates function identification in binary code through signature matching. It integrates with IDA Pro, Ghidra, and Binary Ninja via plugins and uses an automated pipeline to discover, compile, and extract function signatures from online projects, designed to accelerate reverse engineering workflows for security researchers analyzing unknown or malicious binaries.

That concludes today's briefing.

📰 Articles Covered