🛡️ InfoSec Blue Team Briefing

Tuesday, April 28, 2026

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Tuesday, April 28, 2026, covering 6 articles. All attribution is by the article authors. All article analysis is automated.

LAB52 has published analysis of EasterBunny, a highly customized Stage 3 implant deployed by APT29, the Russian foreign intelligence service. Discovered in 2019, the malware targeted government agencies, diplomatic delegations, and defense organizations across Europe, Central Asia, and Five Eyes countries. Each sample is uniquely tailored per victim using BIOS UUID-derived decryption keys and advanced evasion techniques, defeating traditional indicator-based detection methods and maintaining persistent access for intelligence gathering.

Synacktiv researchers have discovered a new Windows authentication reflection vulnerability that bypasses Microsoft's recent patch, allowing local privilege escalation to SYSTEM on Windows Server 2025. The attack exploits SMB multiplexing and a new feature allowing arbitrary TCP ports for SMB connections, enabling attackers to relay privileged authentication from services like LSASS back to the local machine.

JPCERT's Incident Response Group has developed a novel detection system combining graph-based modeling with large language model reasoning to identify malicious Windows logon activities. The system transforms Windows Event Logs into authentication graphs analyzed using PageRank and Hidden Markov Models. The approach was validated against a real-world incident involving the threat actor exploiting Ivanti Connect Secure for lateral movement.

The Goodboy Framework is a 15-stage educational course teaching Windows malware development in Rust, progressing from basic shellcode loaders to a full command and control agent. All 15 binaries achieved zero detection rates on VirusTotal by implementing advanced antivirus and machine learning evasion techniques. The course demonstrates both offensive development and defensive analysis perspectives for security professionals and researchers.

AsuNa has released TLGMapper, an IDA Pro script that parses TraceLogging metadata in 64-bit PE binaries to map Event Tracing for Windows events to their source functions. The tool automates static analysis of binary instrumentation through metadata extraction and call-graph analysis, enabling security researchers to understand telemetry capabilities without executing the binary, though it has limitations including 64-bit only support and reduced effectiveness on obfuscated binaries.

DrvEye is a static analysis toolkit for Windows kernel drivers that enables security researchers to assess driver exploitability and identify input output control codes, symbolic links, and certificate information. The tool targets Bring Your Own Vulnerable Driver hunters and kernel reverse engineers, helping them determine if drivers will load on specific Windows configurations and their exploitation potential while generating findings and proof-of-concept code for vulnerability assessment.

That concludes today's briefing.

📰 Articles Covered