Security Review #263

June 20, 2025

90% of hacking is swearing at your computer

— Anonymous

Starred Articles

Exploiting the Tesla Wall connector from its charge port connector

We present an attack that uses the the Tesla Wall Connector as the entry point, communicating with the charger using a non-standard protocol. We exploit a logic flaw to install a vulnerable firmware on the device. This article explains how we studied the device, how we built a Tesla car simulator to communicate with the charger, and how we exploited this logic bug.

Storing images in TXT records

I've always been interested in TXT records because they seem to be a useful way of storing arbitrary data, and in this blog post I'll discuss how I got to almost a protocol sort of method for storing an image on a domain name.

Static Data Exploration

A deep-dive analysis into the static characteristics of malware and benign binaries ("goodware") using a massive dataset.

Dragging Secrets Out of Chrome: NTLM Hash Leaks via File URLs

We leverage Chrome's drag-and-drop feature to trick users into interacting with a seemingly harmless image, eventually leading to NTLM hashes leak.

New Articles

The Jitter-Trap: How Randomness Betrays the Evasive

We developed Jitter-Trap, a new technique to detect one of the most evasive steps in the cyberattack lifecycle: post-exploitation and C2 communication. Our analysis demonstrates how patterns of randomness, often employed for evasion, can be leveraged to uncover the presence of such traffic.

Detecting Packet Sniffing Malware on Linux

Packet sniffing on Linux can be used for a variety of legitimate reasons, but sometimes it's used by malware for traffic monitoring to steal information and activate covert backdoors. In this article we're going to show you how to search the /proc/net/packet file on your Linux systems to find suspicious processes that may be grabbing traffic.

Let's Talk About HTTP

HTTP headers might seem boring on the surface, but when you dig in - they're loaded with useful info. From persistent connections to User-Agent strings to caching behavior and time syncing - every bit tells you something.

Server-Side Template Injection (SSTI): Advanced Exploitation Guide

In this article, we'll uncover what makes SSTI vulnerabilities so dangerous and walk you through the techniques to identify, exploit, and weaponize them effectively. We'll also explore advanced and unique exploitation scenarios across different template engines.

Attacking JWT using X509 Certificates

The x5u and x5c JSON Web Signature (JWS) make use of X.509 certificates and define where the public key is stored to validate the JWS integrity. An attacker could sign the token with their own private key and modify the header value to specify their public key for signature verification, thus having full access to modify the token claims.

Call Stacks: No More Free Passes For Malware

We explore the immense value that call stacks bring to malware detection and why we consider them to be vital Windows endpoint telemetry despite the architectural limitations.

Yes, Wallets Can Be Hacked Too

Some of the same features that make wallets like Apple Pay and GPay so convenient also open up serious attack paths. If your phone is stolen or misconfigured, it can become a direct gateway to your money. No card skimmer required. Let's break down what attackers are doing right now.

Buffer Overflows in the Modern Era - Part 1

We start this series with the basics to give you a feel for using a debugger and also get the main exploitable program compiled and mess with it some.

Make Self-XSS Great Again

Some XSS vulnerability require complex actions within an account, effectively making it only reproducible on the attacker's account and thus losing its practical value. The purpose of this article is to demonstrate that what is commonly perceived as Stored Self-XSS can actually be transformed into a regular Stored XSS using modern browser capabilities.

Malware Disguised as Minecraft Mods Target Gamers

We discovered a multistage campaign targeting Minecraft users via the distribution as a service (DaaS) Stargazers Ghost Network, which operates on GitHub. The malware impersonates, among others, Oringo and Taunahi, which are "Scripts & Macro" tools (a.k.a cheats).

Best EDR Of The Market - Part 3

This third version marks a decisive turning point in the future of the project: nothing is done in user mode any more, but rather in kernel mode via a dedicated kernel driver, making it possible to exploit the Windows kernel telemetry capabilities that are far more powerful. The aim of this article is to discuss the detection methods and the architectural changes.

Using the Raspberry Pi Pico W as a Bluetooth Dongle

We repurposed the Pico W, which features the Infineon CYW43439 Bluetooth controller, to use it as a Bluetooth dongle. We provide instructions for installing the necessary software, building the project, and flashing the Pico W to function as a Bluetooth controller.

Serverless Tokens in the Cloud: Exploitation and Detections

This article outlines the mechanics and security implications of serverless authentication across major cloud platforms. Attackers target serverless functions developped with insecure code and misconfigured cloud functions. Successful exploits of these weaknesses enable attackers to obtain credentials that can then be abused.

Leveraging Windows Event Logs for Effective Threat Hunting

Windows Event Logs are a critical tool for threat hunters. By focusing on specific Event IDs, Threat Hunters can identify suspicious behaviors related to user authentication, process execution, file access, and log tampering. This blog post provides a concise guide to key Windows Event IDs and practical strategies for using them in threat hunting.

Is b For Backdoor? Pre-Auth RCE Chain In Sitecore Experience Platform

We're exploring Sitecore’s Experience Platform (XP), demonstrating a pre-auth RCE chain. We are going to walk you through three vulnerabilities: CVE-2025-34509 - hardcoded credentials, CVE-2025-34510 - Post-Auth RCE via path traversal, and CVE-2025-34511 - Post-Auth RCE via Sitecore PowerShell extension.

Introducing: GitHub Device Code Phishing

GitHub device code phishing represents a natural evolution of attack techniques. Compromising a target's GitHub account takes five steps: code generation, social engineering, user authentication, token retrieval, own everything... We'll break down this entire flow and then provide a tool that security teams can use to automate the process.

Hunting Through APIs

We’re diving into the world of hunting through APIs. These APIs can enhance security operations, automate threat detection, and enable bigger automation potential. We will specially focus on available data, permissions, API limitations, and hunting through PowerShell.

Streaming Zero-Fi Shells to Your Smart Speaker

In this post, we'll touch on how past research was adapted to obtain a foothold on Sonos Era 300, a high-end smart speaker, providing us the necessary introspection to discover and exploit a powerful memory corruption vulnerability (CVE-2025-1050) in remotely accessible, unauthenticated attack surface.

Chronos vs Chaos: The Art (and Pain) of Building a DFIR Timeline

In this post, we'll dive into why creating a single, accurate timeline is both an art and a pain, discuss the tools that help, the technical hurdles (from timestamp discrepancies to outright time trickery), and strategies for stitching events together into a sensible story.

Inside the BlueNoroff Web3 macOS Intrusion Analysis

We explore the attack chain, malware, and techniques of a Web3 macOS intrusion initiated by a malicious Zoom extension download.

Sleepless Strings

This is the story of how we stumbled upon a serious security issue in the Insomnia API Client. We found that by simply importing a malicious collection file or sending an API request to a malicious server, arbitrary code execution could be triggered via template injection within the Insomnia API Client.

AntiDot Analysis

AntiDot is an Android botnet malware that lets cybercriminals control their victim devices with high capability. Its features include screen recording through accessibility service abuse, SMS interception, and log theft from installed applications. The malware also employs WebView injection and overlay attacks to steal credentials, making it a serious threat to user privacy and device security.

Still Recent

CVE-2025-4318: RCE in AWS Amplify Studio via Unsafe Evaluation

CVE-2025-4318 is a critical vulnerability in the @aws-amplify/codegen-ui package, a core part of AWS Amplify Studio's UI generation process. The issue arises from improper input sanitization of JavaScript property expressions, resulting in remote code execution (RCE) during build or render time.

Hypervisors for Memory Introspection and Reverse Engineering

In this article, we explore the design and implementation of Rust-based hypervisors for memory introspection and reverse engineering on Windows. We cover two projects - illusion-rs, a UEFI-based hypervisor, and matrix-rs, a Windows kernel driver-based hypervisor. Both leverage Extended Page Tables (EPT) to implement stealthy control flow redirection without modifying guest memory.

Oldies but Goodies

SCCM / MECM LAB - Part 1

We apply different reconnaissance techniques with and without user, and add a computer with PXE.

SCCM / MECM LAB - Part 2

In this part we start SCCM exploitation with low user credentials: relay and NAA credentials theft.

SCCM / MECM LAB - Part 3

In this part we will exploit SCCM with an admin access on one VM, impersonating users, adding new admin, pivoting and executing commands.

Best EDR Of The Market - Part 1

The Best EDR Of The Market (BEOTM) is an open source EDR designed to serve as a testing ground for understanding and bypassing some of the detection mechanisms employed by many well-known EDRs. The purpose of this first article is to give a brief overview of how these mechanisms are implemented in BEOTM.

SCCM / MECM LAB - Part 0

An overview of the SCCM lab infrastructure and exposed vulnerabilities.

Best EDR Of The Market - Part 2

This second part details more extensive BEOTM's capabilities. It now offers active hooks, analyzes process's heap, in-memory regions, abnormal system calls, and much more. All this, coupled with the integration of YARA rules, increases the tool's capabilities and maneuverability.

Getting Started with Detection-as-Code and Google SecOps - Part 1

This first post of the series provides an overview of the principles and benefits of managing detection rules as code and a typical detection engineering workflow used by security teams. I will configure a CI/CD pipeline in GitHub Actions to pull the latest version of my existing rules via Google SecOps' API and commit them to a GitHub repo.

Unearthed Arcana