Security Review #295

February 20, 2026

Sometimes the problem has to mature before the solution can mature.

— Kent Beck

Starred Articles

Trust Me, I'm a Shortcut

Windows' primary mechanism for shortcuts, LNK files, is frequently abused by threat actors for payload delivery and persistence. This blog post introduces several new LNK file flaws that, amongst other things, allow attackers to fully spoof an LNK's target. It also introduces lnk-it-up, a tool suite that can generate such deceptive LNK files, as well as detect anomalous ones.

Endpoint Evasion Techniques (2020-2025): The Evolution of Attacks Bypassing EDR

This post analyzes the evolution of endpoint evasion techniques from 2020 to 2025. It covers BYOI, BYOVD, DLL hijacking, service tampering, and other sophisticated methods attackers use to bypass EDR and AV. Real-world ransomware cases and vendor impact are discussed, along with defensive insights.

Scary Agent Skills: Hidden Unicode Instructions in Skills ...And How To Catch Them

Skills introduce common threats, like prompt injection, supply chain attacks, RCE, data exfiltration... This post discusses some basics, highlights the most simple prompt injection avenue, and shows how one can backdoor a real Skill from OpenAI with invisible Unicode Tag codepoints that certain models, like Gemini, Claude, Grok are known to interpret as instructions.

Investigating Windows Registry

The Windows Registry - particularly its hives, transaction logs, and timestamps -provides the most reliable evidence of system activity on Windows 10/11. In this article, we highlight the most forensic‑valuable keys and explain how to correlate them to attribute actions to specific users and devices.

Initial Access The Art of Getting In

A comprehensive red team guide to Initial Access: Payload Development , HTML Smuggling, Phishing, AitM/MFA Bypass, Password Spraying, Exploiting Public-Facing Applications, Vishing, Physical Access, Supply Chain attacks with real-world APT case studies.

New Articles

Log Poisoning in OpenClaw

Technical analysis of a log poisoning vulnerability in OpenClaw within the WebSocket handler including PoC, exploitation scenarios, and security best practices for AI assistants.

Pwning Supercomputers - A 20yo vulnerability in Munge

We discovered a buffer overflow vulnerability within the authentication daemon of an High Performance Computing (HPC) cluster, Munge. This article will provide details about the exploit, as well as some understanding about how High Performance Computers work in general, and give a quick overview of Slurm and Munge.

Hunting Kerberos: Decode TGT TicketOptions with KQL

Kerberos is often a target for adversaries trying to either steal or forge Kerberos tickets. In this blog we explore some hunting and detection possibilities, that allow us to pinpoint potential abuse of Kerberos within an environment.

Cooking with x64dbg and MCP

A cookbook that will help level up reverse engineering and bug hunting with the newly released x64dbg Automate MCP server and x64dbg-skills. We'll walk through some of the functionality and skills provided, to give a good idea how to use the x64dbg Automate MCP server.

A New RAT and a Hands-on-Keyboard Intrusion

ClickFix infection deploys Matanbuchus 3.0 loader and drops a new RAT that we've dubbed AstarionRAT. We break down the layers and the hands-on intrusion that followed.

Securing Entra ID Administration: Tier 0

Entra ID (formerly Azure AD) is the core service upon which Microsoft 365 applications rely for directory and authentication services. This blog covers the key concepts around securing the most privileged accounts in Entra ID, which are considered Tier 0.

How a single typo led to RCE in Firefox

I stumbled across quite an interesting, albeit simple, bug inside SpiderMonkey’s Wasm component. When exploited it gave me Code Execution inside the Firefox renderer process.

Notepad++ Plugins: Plug and Payload

Code execution inside of Notepad++ is not new, but is usually overlooked or considered with misguided assumptions about what malicious Notepad++ execution looks like. For these reasons, it seemed fitting to talk about some of the ways Notepad++ can be used during pentest assessments.

PromptSpy ushers in the era of Android threats using GenAI

We discovered PromptSpy, the first known Android malware to abuse generative AI in its execution flow. The main purpose of PromptSpy is to deploy a built-in VNC module, giving operators remote access to the victim's device.

Aeternum Loader: When your C2 lives forever

An exposed operator panel revealed how Aeternum Loader abuses Polygon smart contracts for C2, allowing us to view all C2 commands ever sent.

AMD uProf Exploitation - Part 1

This series showcase several vulnerabilities I discovered in the AMD uProf AMDPowerProfiler.sys driver. This first post will demonstrate a simple file write vulnerability (CVE-2025-61969) that results in privilege escalation.

Tenant from Hell: Prometei's Unauthorized Stay in Your Windows Server

Prometei is a botnet with extensive capabilitie. This blog provides a comprehensive breakdown of Prometei's technical operations including its installation process, persistence mechanisms, encryption methods, C2 communication protocols, and the additional modules it employs.

Apps Leave Traces: Forensic Insights from the Microsoft Store

Forensic analysis of Microsoft Store applications requires a multifaceted approach that combines registry data, system databases, Windows event logs, and user interaction artifacts. This post offers a practical framework for leveraging key artifacts to reconstruct installation timelines and user behaviour, empowering forensic analysts to uncover actionable insights.

CVE-2026-0714 - TPM-sniffing LUKS Keys on an Embedded Device

We demonstrate that the Moxa UC-1222A Secure Edition releases its full LUKS device decryption key in plaintext during boot via a TPM2_NV_Read operation bound to PCR policy. By passively monitoring the SPI bus between the SoC and the discrete TPM 2.0 device, the LUKS decryption key can be recovered and used to decrypt the encrypted storage.

Cloudflare Pages "Continue Read" Redirect Kit Abused for Phishing, Adware, and Malware Delivery

I identified a long-running redirect infrastructure abusing Cloudflare Pages to host benign-looking SEO articles that display a forced "Continue reading / Continue Read" pop-up shortly after page load. Once the user clicks the button, the browser is redirected into downstream infrastructure that may lead to malicious pages and force unexpected actions.

Reversing CVE-2026-21241

We detail CVE‑2026‑21241, a use‑after‑free in the Windows Ancillary Function Driver (Afd.sys) where AfdNotifyPostEvents caches the endpoint's notification‑context pointer, releases a spinlock, and can be raced with AfdNotifyDestroyContext (called from AfdCleanupCore) which frees that context, causing a stale‑pointer dereference.

When Audits Fail - Part 2: From Pre-Auth SSRF to RCE in TRUfusion Enterprise

A pre-auth SSRF in TRUfusion Enterprise (CVE-2025-32355) allows external attackers to reach internal-only services via a misconfigured reverse proxy. This SSRF can be chained with the default password trubiquity and an additional path traversal vulnerability in the WsPortalV6UpDwAxis2Impl service (CVE-2025-59793 ) to achieve pre-auth remote code execution.

Fake Homebrew Pages Deliver Cuckoo Stealer via ClickFix

Technical analysis of a ClickFix campaign delivering Cuckoo Stealer through fake Homebrew typosquat domains. Includes infrastructure pivots, HuntSQL queries, C2 details, persistence, and more.

Still Recent

PeckBirdy: A Versatile Script Framework for LOLBins Exploitation

PeckBirdy is a sophisticated JScript-based C&C framework used by APT groups to exploit LOLBins across multiple environments, delivering advanced backdoors to target gambling industries and government entities.

Accelerating Malicious Script Analysis with AMSI

In this article we will see how to use Antimalware Scan Interface (AMSI) to speed up the analysis of malicious scripts, and how it helps skipping the deobfuscation steps and retrieving IOCs more effectively.

Oldies but Goodies

Tp-Link Router Deep Research

In this blog we will work on TP-Link TL-WR841N router, and go from 0 (sealed router) to reversing the u-boot by physically extracting the firmware as well as analyzing internal binaries and potential vulnerabilities.

Unearthed Arcana

Windows User Mode Exploit Development - Part 3: Egghunter

In this third part, we will address egghunters, short pieces of assembly code which are safely able to search the Virtual Address Space (memory) for a signature or an "egg" which is a short string signifying the beginning of a larger payload.