Good morning. This is your security briefing for Wednesday, April 08, 2026, covering 6 articles analyzed from yesterday's developments. All attribution is by the article authors. All article analysis is automated.
Black Lotus Labs, in collaboration with Microsoft, the FBI, and DOJ, has disrupted the FrostArmada campaign orchestrated by the Forest Blizzard threat actor group. The operation used DNS hijacking techniques, compromising MikroTik and TP-Link routers to redirect authentication traffic through attacker-controlled infrastructure, stealing credentials and OAuth tokens primarily from government agencies and IT providers globally.
The UK National Cyber Security Centre reports that Russian APT28 is exploiting known vulnerabilities in small office and home office routers, particularly TP-Link models, to perform DNS hijacking operations. The threat actors redirect traffic through malicious DNS servers to conduct adversary-in-the-middle attacks, primarily stealing credentials including passwords and OAuth tokens.
A joint advisory from the FBI, CISA, NSA, EPA, DOE, and U.S. Cyber Command reports that Iranian-affiliated cyber actors are actively exploiting internet-facing programmable logic controllers across U.S. critical infrastructure sectors including government, water and wastewater, and energy. The actors gain access via configuration software like Rockwell Automation's Studio 5000 Logix Designer, manipulating project files and data with potential for widespread operational and financial damage.
Security researcher Fabian Bader discovered a technique to bypass Microsoft Entra ID Conditional Access policies by exploiting the Defender portal's token broker functionality. Attackers can extract the 'sccauth' cookie from a compromised endpoint and use it to request access tokens for various Microsoft services without re-authentication or Conditional Access policy evaluation for approximately 8 hours.
Cognition has released BlueHammer, a proof-of-concept exploit demonstrating privilege escalation to SYSTEM level against Windows Defender. The attack chain simulates a Defender signature update, uses the Cloud Files API to freeze the Defender service, employs symbolic link redirection to leak the SAM hive containing password hashes, and extracts credentials for privilege escalation.
A security researcher has developed DeepZero, an automated pipeline using LangChain DeepAgents to discover zero-day vulnerabilities in Windows kernel drivers. The system successfully identified a previously unknown vulnerability in an ASUS signed driver after analyzing approximately twelve thousand driver files and identifying over seven thousand unique candidates with reachable IOCTL surfaces.
That concludes today's briefing.