🛡️ InfoSec Blue Team Briefing

Thursday, May 07, 2026

🎧 Audio Briefing

Download MP3

Good morning. This is your security briefing for Thursday, May 7th, 2026. We have 6 articles to cover today. All attribution is by the article authors. All article analysis is automated.

Rapid7 reports that MuddyWater, an Iranian APT group linked to the Ministry of Intelligence and Security, conducted state-sponsored operations in early 2026 disguised as Chaos ransomware attacks. The group used Microsoft Teams for social engineering to bypass multi-factor authentication, deployed custom remote access tools, and focused on data exfiltration rather than encryption, primarily targeting US organizations in construction, manufacturing, and business services sectors.

Hunt.io has identified an Iranian-nexus cyber espionage operation that compromised 12 Omani government ministries, exfiltrating over 26,000 citizen records. The attackers deployed custom webshells, PowerShell beacons, and exploited ProxyShell vulnerabilities to maintain persistent access, with the operation discovered through an exposed VPS directory containing attacker tools and stolen data.

Cisco Talos reports that UAT-8302, a China-nexus APT group, has been targeting government entities in South America since late 2024 and southeastern Europe in 2025 for long-term access and espionage. The group deploys custom malware families including NetDraft, CloudSorcerer version 3, and V-SHELL alongside open-source tools for credential extraction, information collection, and network proliferation, with Cisco Talos releasing detection signatures and indicators of compromise.

ESET Research has discovered that North Korea-aligned APT group ScarCruft compromised the sqgame gaming platform in a supply-chain attack targeting ethnic Koreans in China's Yanbian region. The attackers trojanized Windows and Android components with BirdCall and RokRAT backdoors by compromising the platform's update server and website, aiming to collect sensitive data, screenshots, and audio recordings from individuals of interest to the North Korean regime.

Palo Alto Networks has disclosed a critical buffer overflow vulnerability in PAN-OS User-ID Authentication Portal that allows unauthenticated attackers to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls. The vulnerability affects multiple PAN-OS versions and is already being exploited in the wild against publicly exposed portals, with exploitation requiring the Authentication Portal to be enabled on an internet-accessible interface.

ESET researchers have analyzed PoisonedRefresh, a sophisticated malware implant targeting F5 BIG-IP APM systems vulnerable to a previously disclosed flaw. The 64-bit variant hooks system functions to monitor HTTP traffic for a 16-byte trigger string, which deploys an RC4-encrypted webshell through inadvertent injection, potentially causing misattribution when security scanners accidentally trigger the implant.

That concludes today's briefing.

📰 Articles Covered