Security Review #248

March 07, 2025

There are two possible outcomes: if the result confirms the hypothesis, then you've made a measurement. If the result is contrary to the hypothesis, then you've made a discovery

— Enrico Fermi

Starred Articles

Linux Detection Engineering - Part 5: The Grand Finale on Linux Persistence

This post discusses some more obscure, creative and/or complex backdoors and persistence mechanisms. We will review pre-OS Boot techniques (GRUB Bootloader, Initramfs), system processes (PolicyKit, D-Bus), and event triggered execution (Network Manager).

Counting Characters to Find Obfuscated Commands

I've got an idea how we can detect malicious commands obfuscation techniques by counting the number of unusual substrings that show up, and I'm going to explore it in this blog post.

New Articles

Trigon: developing a deterministic kernel exploit for iOS

CVE-2023-32434 is an integer overflow in the VM subsystem of the XNU kernel allowing an attacker to map kernel memory into arbitrary process. This makes it a very powerful vulnerability, but its exploitation is not that easy. This writeup shows the steps involved in the final, working exploit.

Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China

We present Wallbleed, a buffer over-read vulnerability in the DNS injection subsystem of the Great Firewall of China. Wallbleed caused certain nation-wide censorship middleboxes to reveal up to 125 bytes of their memory when censoring a crafted DNS query.

Mustang Panda APT Adversary Simulation

This is a simulation of attack by Mustang Panda APT Group. The attack chain starts with abuse of Visual Studio Code's reverse shell to execute arbitrary code and deliver additional payloads.

Forensic Analysis of Universal Windows Platform (UWP) Applications

The Universal Windows Platform (UWP) is Microsoft's modern application model, designed to replace traditional desktop applications with a sandboxed, secure environment. While UWP apps improve system security and organization, they also introduce new forensic challenges, as many of their artifacts exist outside of expected locations.

Creating custom hash sets with YARA and Python

I wanted to produce a hash set for all the malware files in my repository. Using YARA and Python I wound up with three scripts. Two of them are used to create the hash sets, and a third that does counting and indexing on the source directory for different file headers.

iOS Forensics - Part 1: iOS File Systems

Apple, being notorious for creating their own versions of things, developed two unique file system formats: HFS+ and APFS. This article provides an overview of these formats.

iOS Forensics - Part 2: Analyzing iOS Files

iOS file analysis is a necessary skill for any digital forensics' investigator, as files on Apple devices are stored in unique formats and structures. This tutorial will walk you through some of the most important artifacts: analyzing property list files (plists) and SQLite databases.

Threat Hunting via Autonomous System Numbers (ASN)

This post will cover the process of searching for, identifying, and responding to various ASNs identified as risky. It will also include recommendations and the corresponding KQL queries using different Defender tables.

DNS Tunneling

Attackers exploit DNS traffic as a covert channel to exfiltrate data, communicate with compromised machines, or execute remote commands. This technique is known as DNS Tunneling, where malware hides malicious traffic inside legitimate-looking DNS queries and responses, making detection difficult. This article explains how it works, and how it can be detected.

Your MFA Is No Match for Sneaky2FA

Sneaky2FA is an AitM (Adversary-in-the-Middle) PhaaS (Phishing-as-a-Service) kit designed to bypass 2FA (Two-Factor Authentication) and provide the operator with access to the victim's Office 365 account via intercepted session cookies. It is leveraged by phishing operators to setup persistent access to stolen accounts.

Symlink attacks without code execution

This article details an attack leveraging a possible race condition in anti-malware operations leading to deletion of arbitrary attacker chosen file on the targeted system.

Auto-Color: An Emerging and Evasive Linux Backdoor

We discovered new Linux malware called Auto-color. The malware employs several methods to avoid detection, such as: using benign-looking file names for operating, hiding remote command and control (C2) connections and deploying proprietary encryption algorithms.

Compromised Browser Extensions

We investigate how threat actors leverage browser extensions as an attack vector, including examples for Cyberhaven and GraphQL Network Inspector. We go through how browser extensions work and review the main compromised ones.

PolarEdge: Unveiling an uncovered ORB network

We investigate an attack chain starting with the exploitation of the CVE-2023-20118 vulnerability, leading the victime to be infected by a TLS backdoor. This blog post provides an analysis of the backdoor and the associated botnet. Additionally, it shares insights into the adversary's infrastructure.

Substack Domain Takeover

In this blog, we will talk about an edge case that allows an attacker to take over inactive Substack blog custom domains.

Havoc: SharePoint with Microsoft Graph API turns into FUD C2

We recently discovered a phishing campaign that combines ClickFix and multi-stage malware to deploy a modified Havoc Demon Agent. The threat actor hides each malware stage behind a SharePoint site and uses a modified version of Havoc Demon in conjunction with the Microsoft Graph API to obscure C2 communications within trusted, well-known services.

Antivirus Evasion 3

In this article we will discuss process injection, enumeration with EnumProcess and thread hijiacking.

CVE-2024-43639: Remote Code Execution in Microsoft Windows KDC Proxy

We detail a code execution vulnerability in the Microsoft Windows Key Distribution Center (KDC) Proxy (CVE-2024-43639). Successful exploitation could result in arbitrary code execution in the security context of the target service.

API Design Basics: Rate Limiting

In this article, we API review rate limites strategies to protect the API by telling "overactive" API consumers to calm down a bit, telling clients to reduce the frequency of their requests, or take a break entirely and come back later to avoid overwhelming the API.

CVE-2024-7014 Return: Updated Evilloader

This article examines a scenario that works similarly to the CVE-2024-7014 vulnerability. A file with an ".htm" extension is disguised as a video and sent via the Telegram API, and while the user expects a video, the JavaScript code inside the HTML is actually executed.

Deep Dive Into Allegedly AI-Generated FunkSec Ransomware

We analyze how FunkSec ransomware disables Windows Event logging and real-time protection for Windows Defender. We also review the check for VM-related processes, the command that verifies whether the user has administrative privileges, and provide related IoCs.

Client-Side Path Traversal

We review the key points of Client-side path traversal, a serious security vulnerability that occurs when an attacker manipulates file paths in web applications to gain unauthorized access to files stored on the client-side or server-side.

Detecting Hotkey-Based Keyloggers Using an Undocumented Kernel Data Structure

In this article, we explore what hotkey-based keyloggers are and how to detect them. Specifically, we explain how these keyloggers intercept keystrokes, then present a detection technique that leverages an undocumented hotkey table in kernel space.

Understanding and Mitigating TOCTOU Vulnerabilities in C# Applications

Time-of-Check to Time-of-Use (TOCTOU) vulnerabilities represent a critical class of race condition security flaws that plague software systems interacting with external resources. In this article, we detail the anatomy of a TOCTOU vulnerability, identify the common patterns in C# code and provide defensive techniques to mitigate such vulnerability.

CSS Exfiltration under default-src 'self'

In this article, I demonstrate how it is possible to do CSS Exfiltration if default-src 'self' is specified in the CSP. I also wrote a challenge about this, and will provide the solution in this blog.

Decrypting the Forest From the Trees

SCCM forest discovery accounts can be decrypted including accounts used for managing untrusted forests. If the site server is a managed client, service account credentials can be decrypted via the Administration Service API.

Sitecore: Unsafe Deserialisation Again! (CVE-2025-27218)

We found CVE-2025-27218, a remote command execution (RCE) vulnerability in Sitecore experience platform. It is another case of unsafe deserialization and is exploitable in the default configuration without authentication.

Bypass AMSI in 2025

This blog post will shed some light on what's behind AMSI, how it works and what techniques are currently available to effectively bypass it.

Still Recent

Reversing the QardioArm - Part 1

This is a two-part blog post disclosing two CVEs for the QardioArm, a wireless blood pressure monitor: CVE-2025-20615 (sensitive data exposure) and CVE-2025-24836 (command injection).

!exploitable - Part 1: Breaking IoT

In this first part, we dig into into IoT ARM exploitation. We investigate a buffer overflow in the firmware of the Tenda AC15 router, known as CVE-2024-2850.

Lumma Stealer: Fake CAPTCHAs & New Techniques to Evade Detection

We observed a new malware campaign using fake CAPTCHAs to deliver Lumma Stealer. We detail the infection chain and analyze the payloads, one of them containing a snippet used for bypassing Windows Antimalware Scan Interface (AMSI).

Oldies but Goodies

RCE on the HP M479fdw printer

This post covers the technical aspects of our exploitation of the HP M479fdw printer journey, from dumping the NAND to reliable code execution via the printer discovery service.