Security Review #301

April 03, 2026

You decided to use regex, and now you have two problems

— Anonymous

Starred Articles

Creative approaches to coding FUD Stagers

We write 3 variants of a fully undetected (FUD) code of a simple dropper/stager that downloads and executes shellcode in-memory, and avoids writing anything to disk. The trick is using Python as scripting languages are not heavily scrutinized when we’re comparing with compiled (PE executable) code.

Audio Steganography in Supply Chain Attacks

We discuss how attackers hide malware inside WAV audio files using steganography. We first review the full kill chain of a real-life attack then move to an hands-on lab to create our own .WAV steganography encoder/decoder.

Kernel-Level Stealthy Observation of TTY Streams

I developed a kernel module to monitor tty connections (ie SSH Sessions, Terminal or Console sessions) in a stealthy way filtering only processes I am interested at. Instead of relying on direct system-call hooks, the approach comes from understanding how the kernel itself moves tty data and identifying a point in that path where observation can happen without drawing attention.

New Articles

OpenAI Codex: How a Branch Name Stole GitHub Tokens

We discovered a critical command injection vulnerability in OpenAI Codex that allowed attackers to steal GitHub OAuth tokens through unsanitized branch names. The flaw affected ChatGPT, Codex CLI, SDK, and IDE extensions, and could scale into automated supply chain attacks via poisoned GitHub branches.

Common Entra ID Security Assessment Findings - Part 2: Privileged Unprotected Groups

We review the impact of unprotected groups used to grant sensitive privileges or enforce critical security controls. This can allow internal or external lower-tier administrators, or even foreign enterprise applications, to perform sensitive actions or gain access to critical resources.

Operation NoVoice: Rootkit Tells No Tales

We identified and investigated an Android rootkit. The the app contacts a remote server, profiles the device, and downloads root exploits tailored to that device’s specific hardware and software. If the exploits succeed, the malware gains full control of the device. From that moment onward, every app that the user opens are injected with attacker‑controlled code.

Methodology for Assessing Kubernetes Namespace-Based Multi-Tenancy Setups

This post introduces a structured methodology for assessing security risks in Kubernetes environments that use Namespace-based Multi-Tenancy. It addresses weaknesses that break Namespace-based isolation that not well studied, yet.

Mongoose: Preauth RCE and mTLS Bypass on Millions of Devices

I found three vulnerabilities in Mongoos, each independently exploitable: complete bypass of mTLS authentication, preauth RCE as root via a heap overflow in the client public key parsing logic, and preauth RCE via a single UDP packet through mDNS.

ShellBags and User Navigation: What Windows Remembers About Exploration

ShellBags are better understood as Windows remembering where the shell has been asked to render a folder view for a user. That can be strong evidence of navigation and exploration. It can also be weak evidence of anything beyond that. We detail what ShellBags really are and how they can be properly used as a guide for corroboration.

Kubernetes forensics - Part 1: what the container ?

This is the first article of a series on Kubernetes forensics. In this one we will focus on the underlying container technology, reviewing the architecture, the components and detailing how to perform forensic analysis on Podman and Docker containers.

TeamPCP’s Telnyx Windows Malware: Technical Analysis

This is a deep analysis of TeamPCP’s second-stage payload targeting Windows machines. The malware is downloaded in the form of a WAV file from the remote C2 server when importing the malicious version of Telnyx, decoded using XOR, and then saved as an executable, which is later executed on the machine.

CVE-2025-33073 NTLM Reflection Vulnerability Explained

CVE-2025-33073 gives any domain user SYSTEM on unpatched hosts. We elaborate on its combination with the AD unconstrained delegation architectural flaw, eventually leading to a full domain compromise from a low-privilege domain user.

Citrix NetScaler CVE-2026-3055 Memory Overread - Part 1

We dive deep into CVE-2026-3055, an unstable memory overhead vulnerability in Citrix Netscaler SAML persoing engine, leading to partial memory leak.

CVE-2025-14325: SpiderMonkey Type Confusion in Baseline JIT Inline Cache

In this post we will share a journey of finding a type confusion in Firefox JavaScript engine, SpiderMonkey. We discovered this bug using AI-assisted fuzzing by asking Claude Code to analyze the actively being developed TypedArray resizable feature. After that we iteratively enhanced our fuzzing framework to cover all aspects of that feature in the entire commit history.

Progress ShareFile Pre-Auth RCE Chain: CVE-2026-2699 & CVE-2026-2701

In this post, we'll walk through vulnerabilities we discovered in Progress ShareFile that allowed us to achieve pre-auth RCE: CVE-2026-2699 (Authentication Bypass) and CVE-2026-2701 (Remote Code Execution)

LofyGang Returns: From Fake undici to Full System Compromise via Parallel Data Theft

We identified a malicious undicy-http npm package that delivers a dual-payload attack: a Node.js-based Remote Access Trojan (RAT) with live screen streaming, and a native Windows PE binary that uses direct syscalls to inject into browser processes and steal credentials, cookies, credit cards, IBANs, and session tokens.

Citrix NetScaler CVE-2026-3055 Memory Overread - Part 2

We go deeper in the analysis of CVE-2026-3055, a memory overhead in Citrix Netscaler, and discover a bug in the processing of the /wsfed/passive URL. The impact is a consistent memory leak that eventually can reveal administrative sessions ID.

ghostsurf: From NTLM Relay to Browser Session Hijacking

I dug into why ntlmrelayx's HTTP SOCKS proxy fails with browsers, and fixed several fundamental issues with how it handles HTTP. I also discovered some undocumented Windows kernel auth behavior, silently killing relay sessions, and a tool built to fix both issues.

New widespread EvilTokens kit: device code phishing as-a-service - Part 1

We uncover the new sophisticated EvilTokens device code phishing as-a-service, with AI-augmented features facilitating BEC fraud. This first part explains the Microsoft device code authorisation flow and offers a technical analysis of the EvilTokens device code kit, covering its phishing pages, the weaponisation of harvested Microsoft tokens, and the functionalities available to affiliates.

Guidance for detecting, investigating, and defending against the Trivy supply chain compromise

Threat actors abused trusted Trivy distribution channels to inject credential-stealing malware into CI/CD pipelines worldwide. This analysis walks through the Trivy supply-chain compromise, attacker techniques, and concrete steps security teams can take to detect and defend against similar attacks.

ChatGPT Data Leakage via a Hidden Outbound Channel in the Code Execution Runtime

We discovered a hidden outbound communication path from ChatGPT's isolated execution runtime to the public internet enabling a single malicious prompt to turn an otherwise ordinary conversation into a covert exfiltration channel, leaking user messages, uploaded files, and other sensitive content.

CrySome RAT : An Advanced Persistent .NET Remote Access Trojan

An in-depth analysis of CrySome, a feature-rich remote access trojan (RAT) designed to establish and maintain a persistent command-and-control (C2) channel over TCP while enabling full-spectrum remote operations on compromised systems.

Oldies but Goodies

CSS Data Exfiltration to Steal OAuth Token

In this article, we explain how we leveraged an HTML injection vulnerability in a DOMPurify-protected web application to perform a CSS injection. Thanks a an OAuth misconfiguration, this injection makes it possible to steal victim's token.

If you think you blocked NTLMv1 in your org, think again

We discovered that attackers bypass the Group Policy designed to disable NTLMv1, allowing insecure authentications to persist in Active Directory environments.

Uncovering Hidden Forensic Evidence in Windows: The Mystery of AutoLogger-Diagtrack-Listener.etl

We uncoves forensic insights in Windows AutoLogger-Diagtrack-Listener.etl, a telemetry artefact with untapped investigative value. Understanding when and how this file records telemetry could transform it into a valuable forensic artefact- particularly in incident response investigations where process creation and execution traces are critical.

Understanding Out-Of-Bounds in Windows Kernel Driver

In this blog post, we will explore different types of out-of-bounds (OOB) vulnerabilities in Windows kernel drivers. We will write realistic, purpose-built kernel drivers containing intentional vulnerabilities to showcase OOB reads, OOB writes, and loop-based overflow.

An Operators Guide to Beacon Object Files

Beacon object files (BOF) are the new method for conducting post-exploitation activities on compromised systems. This blog aims to provide the necessary tools and knowledge to start incorporating BOFs in your hacking toolkit.

Unearthed Arcana

The Art of Self-Mutating Malware

Self-mutation in malware represents one of the most elegant solutions to the detection problem. Instead of hiding what you are, you become something different each time you reproduce. It’s digital evolution in its purest form. In this post, we talk about writing self-mutating malware, how to build your own polymorphic engine, and a bit on metamorphic code too.