Friday, February 13 2026
DFM News Roundup
Digital Forensics Magazine — 48h News Roundup
Window: 2026-02-11 10:30 to 2026-02-13 10:30 (UTC)

Snapshot Summary

Sector / Section Headline Highlights Count
DFIR & Incident Response KEV adds four exploited CVEs; Siemens OT advisory refresh; Govt IR planning metrics rise 3
Cyber Investigations Vendor attribution softened amid bans; IcedID developer “death” doubted; Breach lawsuit withdrawn 3
Major Cyber Incidents Odido leak impacts millions; SmarterTools hit via auth bypass; Harima confirms ransomware at US units 3
Exploits & Threat Intelligence BeyondTrust pre-auth RCE exploited; Nation-states misuse Gemini; Notepad++ supply-chain infra expanded 3
Law Enforcement Coupang ex-employee warrant sought; French “Drill” hackers face trial 2
Policy ICO publishes complaints-process guidance; China-linked bans shape vendor disclosures 2
Standards & Compliance NIST smart-manufacturing draft; JPCERT patch advisory; Belgian MS Patch Tuesday warning 3
Consumer App Data Leaks Spyware vendor data dumped; Photo-ID apps expose Firebase data 2

Digital Forensics & Incident Response

CISA adds four KEV entries (exploited)
[AMER] CISA added four known-exploited vulnerabilities to its KEV Catalog, triggering federal remediation deadlines and prompting defenders to treat associated indicators and exploitation chains as “in play” for current intrusions. For DFIR teams, KEV additions are a practical triage signal: prioritize scoping for affected products, correlate telemetry for exploit artifacts, and validate patch/mitigation status across enterprise and third-party estates to reduce dwell time and repeat compromise. (Source: CISA, 12-02-2026).
CISA ICS advisory: Siemens SINEC NMS
[AMER] CISA published an ICS advisory for Siemens SINEC NMS, summarizing reported weaknesses, affected versions, and vendor guidance for mitigation and recovery planning in OT environments. The DFIR takeaway is that OT incidents often demand evidence-preserving change control: responders should map affected assets, capture volatile data where safe, validate compensating controls, and document patch paths to support both operational continuity and post-incident assurance. (Source: CISA, 12-02-2026).
Australia reports progress on cyber resilience metrics
[APAC] Australia’s ACSC highlighted updated government cyber posture metrics, including higher rates of incident response planning, training, and strategy adoption alongside ongoing Essential Eight maturity improvements. For responders, these maturity indicators translate into incident outcomes: strong logging, rehearsed IR plans, and governance-backed uplift reduce investigation friction, enable faster containment, and make chain-of-custody documentation and executive decisioning more reliable during high-pressure events. (Source: ASD’s ACSC, 12-02-2026).

Cyber Investigations

Report: attribution language softened amid retaliation risk
[APAC] Reuters reported that Palo Alto Networks dialed back language tying China to a large hacking spree, citing sources who said the shift followed news that Chinese authorities had banned some U.S./Israeli security vendors’ software. For investigators, it’s a reminder that attribution narratives can be politically constrained; preserve primary evidence (TTPs, infra, malware lineage), capture confidence levels, and maintain a sourcing trail so findings remain defensible even when public messaging changes. (Source: Reuters, 12-02-2026).
IcedID developer “fake death” claims questioned
[EMEA] Risky Bulletin examined new reporting around an IcedID developer whose claimed death may have been staged, pointing to inconsistencies and investigative leads that keep the individual within scope of ongoing tracking. For cyber investigations, the operational lesson is to treat identity signals as adversary-controlled: cross-verify personas with technical artifacts, financial footprints, and infrastructure reuse, and document alternative hypotheses to avoid anchoring bias in attribution and case linkage. (Source: Risky Bulletin, 13-02-2026).
Data-breach plaintiffs drop lawsuit (Thompson Coburn / NM health system)
[AMER] Reuters reported that plaintiffs dropped a data-breach lawsuit involving law firm Thompson Coburn and a New Mexico health system, signaling a shift in the litigation posture tied to the underlying incident. For investigative teams, legal timelines shape evidence handling: ensure defensible retention, keep incident chronologies and notification decisions well-documented, and validate that forensic conclusions are reproducible because litigation risk can re-emerge via regulators, insurers, or follow-on claims. (Source: Reuters, 11-02-2026).

Major Cyber Incidents

Odido confirms customer data leak
[EMEA] Dutch telecom Odido confirmed a customer data leak and said it began investigating after indications of a breach, with public reporting indicating millions of records may be involved. For incident response, telco datasets amplify secondary harms (SIM-swap, phishing, identity fraud), so responders should rapidly scope exposed fields, coordinate fraud monitoring and comms, and preserve access logs and database audit trails to support root-cause determination and regulatory reporting. (Source: Xinhua, 12-02-2026).
SmarterTools breached via auth-bypass on unpatched VM
[AMER] SmarterTools disclosed it was breached and hit with ransomware after attackers exploited an authentication-bypass issue against a single unpatched virtual machine, enabling admin access and subsequent lateral activity. For DFIR and IT, this is a classic “forgotten asset” failure mode: tighten VM inventory, enforce patch baselines, review privileged credential exposure, and hunt for persistence on adjacent identity and endpoint infrastructure even when the initial blast radius seems limited. (Source: TechRadar, 11-02-2026).
Harima Chemicals reports ransomware at U.S. subsidiaries
[APAC] Japan’s Harima Chemicals Group reported a ransomware incident affecting its U.S. subsidiaries and warned there is a possibility that certain employee personal information may have been leaked. For responders, cross-border incidents need synchronized containment and notification: segment affected networks, validate whether exfiltration occurred, prepare jurisdiction-specific disclosure steps, and ensure HR/identity protection workflows are ready for impacted staff while forensic imaging proceeds. (Source: Harima Chemicals via MarketScreener, 13-02-2026).

Exploits & Threat Intelligence

BeyondTrust pre-auth RCE (CVE-2026-1731) exploited
[AMER] BleepingComputer reported active exploitation of a critical pre-auth remote code execution flaw in BeyondTrust Remote Support / Privileged Remote Access after public disclosure, raising immediate risk for exposed appliances. For threat-led response, prioritize external attack-surface verification, patch or isolate appliances, and review authentication and session logs for anomalous client requests; responders should also pre-stage containment playbooks because exploitation of remote access tooling frequently precedes rapid credential theft and domain-wide pivoting. (Source: BleepingComputer, 12-02-2026).
Nation-state groups leverage Gemini in campaigns
[GLOBAL] The Record reported research indicating multiple nation-state APT groups are using Google’s Gemini to support malicious workflows, including target research, vulnerability lookups, and scripting tasks across phases of operations. For defenders, this shifts the speed and scale of tradecraft rather than the fundamentals: tighten exposure management, monitor for “fast-follow” tooling and phishing quality jumps, and ensure detection engineering keeps pace with adversaries who can iterate payloads and lures more quickly. (Source: The Record, 12-02-2026).
Unit 42 expands view of Notepad++ supply-chain infrastructure
[GLOBAL] Palo Alto Networks Unit 42 published additional infrastructure observations linked to the Notepad++ supply-chain incident, adding context on how the actor staged and maintained supporting assets. For threat intelligence and IR, infrastructure expansions are actionable hunting inputs: enrich blocklists carefully, pivot on certificate and hosting overlap, and update detection for downloader and post-compromise behaviors so responders can identify both initial access and follow-on activity in environments that installed compromised artifacts. (Source: Palo Alto Networks Unit 42, 12-02-2026).

Law Enforcement

South Korea seeks warrant for ex-employee in Coupang breach probe
[APAC] Reuters reported that South Korean authorities concluded a major Coupang data breach stemmed from internal management failures and a former engineer’s abuse of access, with police seeking an arrest warrant as the investigation continues. For cyber teams, insider-enabled cases demand different forensics: preserve identity and signing-key evidence, review key lifecycle controls, and capture administrative action logs to separate malicious intent from process gaps while supporting law enforcement and regulator-ready timelines. (Source: Reuters, 10-02-2026).
French “Drill” and “Durandal” hackers face trial
[EMEA] Le Monde reported that French hackers known as “Drill” and “Durandal” went before a tribunal over a series of alleged cyberattacks targeting multiple victims. For practitioners, court proceedings surface operational lessons: incident reports, forensic timelines, and attribution claims may be scrutinized years later, so maintain immutable evidence handling, document analytical reasoning, and ensure any third-party tooling outputs are reproducible to withstand legal challenge and expert review. (Source: Le Monde, 11-02-2026).

Policy

ICO publishes complaints-process guidance for organisations
[EMEA] The UK Information Commissioner’s Office published new guidance on how organisations should handle data protection complaints, noting upcoming statutory requirements under the Data (Use and Access) Act with key provisions taking effect later in 2026. For security and privacy teams, the operational impact is immediate: build an auditable complaints workflow, align IR and DPO processes, and ensure breach response outputs (scope, affected data, mitigations) can be communicated clearly within mandated timelines. (Source: ICO, 12-02-2026).
Geopolitics shapes cyber vendor disclosures and risk
[APAC] Reuters described how Chinese regulatory actions (including reported security-software bans) can influence how vendors communicate about suspected state-linked hacking activity, reflecting escalating geopolitical pressure in cyber. For defenders, this affects risk intelligence consumption: rely on multiple corroborating sources, prioritize technical indicators over rhetoric, and adjust third-party risk management and procurement assumptions because policy moves can quickly change tool availability, supportability, and the threat landscape around supply chains. (Source: Reuters, 12-02-2026).

Standards & Compliance

NIST drafts practice guide for smart manufacturing security
[AMER] NIST announced a draft practice guide focused on improving cybersecurity for smart manufacturing systems, positioning it as implementation-oriented guidance for industrial environments and modernized production lines. For compliance and engineering teams, draft guides are a head start: map recommended controls to existing OT/IT governance, validate segmentation and identity requirements, and use the draft to drive evidence-based control selection ahead of audits and insurer questionnaires that increasingly probe manufacturing cyber maturity. (Source: NIST, 12-02-2026).
JPCERT advisory highlights February 2026 Microsoft updates
[APAC] JPCERT/CC published an English advisory summarizing Microsoft’s February 2026 Security Updates and urging organizations to address the patched vulnerabilities promptly. For governance and assurance, this supports patch compliance evidence: document change windows, validate compensating controls where patching lags, and link vulnerability SLAs to “active exploitation” risk so auditors and leadership understand why some updates warrant emergency treatment. (Source: JPCERT/CC, 12-02-2026).
Belgium CCB issues Patch Tuesday warning with risk emphasis
[EMEA] Belgium’s Centre for Cybersecurity (CCB) published a warning summarizing Microsoft’s February 2026 Patch Tuesday, emphasizing breadth of affected products and the presence of actively exploited vulnerabilities. For compliance teams, national CERT guidance is strong audit support: reference it in risk registers, justify accelerated patch cycles, and capture before/after control evidence (patch state, endpoint posture, exception approvals) to demonstrate due diligence under sector regulations and cyber-insurance requirements. (Source: CCB Belgium, 11-02-2026).

Consumer App Data Leaks

Stalkerware vendor data leak exposes ~500k records
[EMEA] TechRadar reported a breach of a stalkerware developer (Struktura), with a hacktivist leaking hundreds of thousands of records tied to spyware apps and related purchase and account data. For consumer and corporate security, this is both a privacy and targeting risk: leaked emails and payment metadata fuel credential-stuffing and social engineering, while incident responders should be prepared for users and employees impacted by intimate surveillance tools to require tailored support and reporting pathways. (Source: TechRadar, 11-02-2026).
Photo-ID apps leak data via misconfigured Firebase
[GLOBAL] TechRadar, citing Cybernews, reported that three mobile photo ID apps exposed user data through misconfigured Firebase instances, potentially affecting over 150,000 users and leaking identifiers and sensitive metadata. For defenders, this is a recurring cloud misconfig pattern: ensure mobile backends enforce authentication, rotate tokens exposed in logs or databases, and treat leaked location and profile artifacts as high-risk for doxxing and account takeover, especially where apps enable identity verification workflows. (Source: TechRadar, 10-02-2026).

Editorial Perspective

This cycle reinforces a familiar pattern: exploited vulnerabilities and “forgotten” assets still drive many of the highest-impact intrusions, even as adversaries accelerate reconnaissance and tooling with AI assistance.

For DFIR teams, the winning moves remain pragmatic—tighten external exposure, instrument logs for fast scoping, and keep incident response plans and communications paths operationally testable, not just policy-compliant.

Finally, policy and compliance shifts (from national advisories to complaints-handling guidance) are increasingly intertwined with cyber operations, so resilient programs will treat governance artifacts as incident-enabling infrastructure that must be maintained with the same rigor as technical controls.

Tags

DFIR, Incident Response, KEV, OT Security, Ransomware, Supply Chain, Patch Management, Threat Intelligence, AI in Cybersecurity, Data Breach, Privacy Compliance, APT

Discover more from Digital Forensics Magazine

Subscribe now to keep reading and get access to the full archive.

Continue reading