Security Review #255

April 25, 2025

Intelligence is the ability to avoid doing work, yet getting the work done

— Linus Torvalds

Starred Articles

io_uring Rootkit Bypasses Linux Security Tools

We investigate a major blind spot in Linux runtime security tools caused by the io_uring interface, an asynchronous I/O mechanism that bypasses traditional system calls. In this blog, we will explore how io_uring can also be used as an evasion technique that affects most Linux runtime security tools today.

How MCP servers can steal your conversation history

In this post, we demonstrate how injecting trigger phrases into MCP tool descriptions to exfiltrate the user’s entire conversation history. Customized triggers can be crafted to activate specifically when sensitive data patterns appear in the conversation, maximizing the value of the exfiltrated data while minimizing noise.

AES & ChaCha

A technical deep dive into how the ChaCha20 cipher is taking on AES as the gold standard for symmetric encryption, and a lesson about the power of simplicity in cryptographic design.

Code execution inside PID 0

On every system, there's a process whose Process ID is 0. This process is called the System Idle Process, and contains threads that execute when no other thread is ready to run on a given processor. In this article I provide a Proof-of-Concept to get code execution inside of this process.

New Articles

VINETHORN Spyware: In-depth Technical Analysis

This write-up covers a deep analysis - from manifest inspection to dynamic analysis - of the Android VINETHORN spyware, capable of sophisticated data theft and persistent surveillance.

Fire In The Hole, We're Breaching The Vault

We discuss a security vulnerability in Commvault's software (CVE-2025-34028). The vulnerability allows pre-authenticated remote code execution, discovered through a combination of server-side request forgery (SSRF) and arbitrary file writing.

Sysmon Unleashed: Tracking and Tackling Malicious Activity on Windows

Sysmon is part of the Sysinternals suite and is a powerful Windows system service and device driver that logs system activity to the Windows Event Log. By configuring Sysmon properly, security professionals can detect, analyze, and respond to malicious behavior effectively.

Understanding and threat hunting for RMM software misuse

Threat actors often use remote monitoring and management (RMM) software to install malware, disable security controls, escalate privileges and preserve continuing access to compromised networks. This report analyzes and provides detection artifacts and threat hunting queries for three types of commonly abused RMM tools - AnyDesk, Atera Agent and MeshAgent.

Remote Code Execution in ZYXEL FLEX-H Series

I found a security issue related to a third-party application (PostgreSQL) in ZYXEL USG FLEX-H Series. An architectural misconfiguration exposes the database service to external access. The absence of authentication requirements for database access, which enables an attacker to execute arbitrary queries and gain remote code execution.

Glitching STM32 Read Out Protection

In this blog post, we will demonstrate how to prepare the target and perform a fault injection attack to bypass the Read Out Protection, a security feature developed by STMicroelectronics to protect firmware and sensitive customer data.

Nothing in Run Keys

One persistence mechanism that many people miss during incident response is a small registry key called AppInit_DLLs. In this article , I'll explain how attackers use it to stay hidden, and how you can find it during forensic investigation.

Guide to Indicators of Compromise, Attack, and Behavior

In cybersecurity, the three main types of indicators are a critical concept for threat detection and response. These main types are indicators of compromise, behavior, and attack (IOCs, IOBs, IOAs). Let’s elaborate on their essence, difference, and use.

Kubernetes Threat Hunting using API Server Audit Logs

This blog article will explore the significance of Kubernetes API Server Audit Logs in threat hunting, guide you on how to interpret them, and outline best practices for leveraging them to identify potential security threats.

Mitigating ELUSIVE COMET Zoom remote control attacks

This post details our encounter with ELUSIVE COMET, explains their attack methodology targeting the Zoom remote control feature, and provides concrete defensive measures organizations can implement to protect themselves.

Threat actors misuse Node.js to deliver malware and other malicious payloads

We detail an attack chain leveraging Node.js to lure users into downloading a malicious installer disguised as legitimate software. We also provide an example of the emerging inline script execution technique, and recommendations to help users and defenders reduce the impact of these attacks in their environments.

The curious case of the evt parameter

A short blog to explain how I discovered that you could use a parameter called evt in SVG events, and how it can be leveraged in a Cross-Site Scripting (XSS) attack.

Mastering C2 Redirectors: A Red & Blue Teamer's Guide

In this post, I'll break down the most effective redirector techniques you can use to hide your C2 infrastructure, blend in with normal traffic, and outsmart modern defenses. I'll describe each technique and include code snippets for practical explanation.

The Hidden Risk: Compromising Notepad Cowriter's Bearer Tokens -

Copilot for Office 365 includes integration with Notepad in 2025, allowing users to request the AI assistant to rewrite paragraphs or text. In this blog post, I will share my technical observations and explore how Notepad AI services, as well as similar applications with these features, could potentially be compromised.

Interlock ransomware evolving under the radar

We provide a technical analysis of Interlock, a ransomware intrusion set that conducts Big Game Hunting and double extortion campaigns.

Advanced KQL Deep Dive: User State Change Tracking

What follows is the process I went through in developing a KQL query used to detect anomalous or hijacked web sessions by modeling a user's expected state at a given moment and captures changes to that state over time.

CVE-2025-23016 - Exploiting the FastCGI Library

We discovered a vulnerability (CVE-2025-23016) in the FastCGI lightweight web server development library. In this article, we'll take a look at the inner workings of the FastCGI protocol to understand how and in what context this vulnerability can be exploited. Finally, we'll see how to protect against it.

GoLibAFL

In this article, we introduce GoLibAFL, a fuzzer for Go code built on top of LibAFL. GoLibAFL provides state-of-the-art fuzzing techniques and offers great customizability for advanced users.

How MiraclePtr Crushed Two Sandbox Escapes

In this post, we introduce two newly discovered UAF within the Browser process, identified during our vulnerability research. In the past, these flaws could have led to critical exploits, but thanks to Chrome’s latest security technology, MiraclePtr, they are no longer exploitable.

Watch Your AI! Using Replit AI to Mask Your C2 Traffic

Replit is a powerful platform that builds and deploys code for you, takes care of the infrastructure, and just makes life easier overall. In this blog post, we detail a solid technique to route your C2 traffic using Replit domains, which are generally trusted and widely used.

Bypassing UAC via Intel ShaderCache Directory

I detail an UAC Bypass that involves taking advantage of the fact that auto-elevated processes, such as the Task Manager, write to the Intel Graphics Driver ShaderCache directory.

Recovering Metadata from .NET Native AOT Binaries

In this post, we will discuss Native AOT - Microsoft's latest Ahead-Of-Time Compilation Technology - in great detail from a reverse engineering standpoint. We'll talk about what it is, what it looks like in a general purpose decompiler, and how we can (automatically) extract this metadata to reconstruct most of the original type hierarchy.

Attacking My Landlord's Boiler

Here's how I figured out how to control my apartment's heating in a way that leaves no trace using the existing thermostat already fitted by my landlord, and maybe learn a bit about radios along the way.

Data in Danger: Detecting Cross-Site Scripting in Grafana

We detected a Cross-Site Scripting (XSS) vulnerability in Grafana (CVE-2025-2703). Attackers could exploit the vulnerability to steal data from other users or elevate their privileges by targeting users with more permissions.

Technical analysis of CVE-2025-31201

We delve into CVE-2025-31201, a vulnerability that affects a shared library named libRPAC. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.

PowerShell for Hackers: Exploitation Essentials

This article digs into the reasons behind PowerShell’s efficiency, examines useful methods and real-world scripts that red teamers utilize and discusses critical mitigation tactics for defenders. This guide will help you increase your PowerShell toolset and gain a deeper grasp of fundamental post-exploitation.

How to Find Evidence of Network Windows Registry

The network need not be a mystery. Network evidence in the Windows Registry refers to the traces, configurations, and historical data related to a system's network activity. This article delves into the registry to identify such activity.

Still Recent

Snapshot Fuzzing

Snapshot fuzzing enables security engineers to effectively test software that is traditionally difficult to analyze, such as kernel-level software. Whether you're auditing drivers or other kernel-mode components, including antivirus software, snapshot fuzzing provides a robust way to discover critical vulnerabilities.

NASA cFS version Aquila Software Vulnerability Assessment

NASA’s Core Flight System (cFS) is an open-source software framework that supports mission operations by providing a modular and scalable architecture. We uncovered critical vulnerabilities that could be exploited to disrupt mission-critical systems. These include Remote Code Execution (RCE), Denial of Service (DoS), and Path Traversal vulnerabilities.

A small bug in the signature verification of AOSP OTA packages

In this post, we will explore how OTA package authentication works in Android and detail a signature verification bypass in a function that verifies the integrity of ZIP archives in the AOSP framework.

CVE-2025-25364: Speedify VPN MacOS privilege Escalation

We discovered CVE-2025-25364, which is a crit­i­cal com­mand in­jec­tion vul­ner­a­bil­i­ty dis­cov­ered in the me.connectify.SMJobBlessHelper XPC ser­vice, a priv­i­leged helper tool used by Speed­i­fy VPN on ma­cOS. If exploited, it al­lows an at­tack­er to es­ca­late priv­i­leges, ex­e­cute unau­tho­rized com­mands, and gain full con­trol over the af­fect­ed ma­cOS sys­tem.

Localhost dangers: CORS and DNS rebinding

What is CORS and how can a CORS misconfiguration lead to security issues. In this blog post, we'll examine some case studies of how a broad or faulty CORS policy led to dangerous vulnerabilities in open source software. We’ll also discuss DNS rebinding, an attack with similar effects to a CORS misconfiguration that’s not as well known among developers.

Oldies but Goodies

iDRAC to Domain Admin

In this article, I detail how I executed an interesting path to escalating my privileges to domain admin, starting with an access to an IDRAC controler with default credentials.