Threat Research Blog

  • Inglourious Drivers – A Journey of Finding Vulnerabilities in Drivers

    Inglourious Drivers – A Journey of Finding Vulnerabilities in Drivers

    TL;DR I discovered multiple bugs in OEM vendors for peripheral devices, which affected many users of these OEM vendors (Razer, EVGA, MSI, AMI). Many of the vulnerabilities originated in a...

    Read Article
  • CyberArk Named a Leader in the 2022 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • Chatting Our Way Into Creating a Polymorphic Malware

    Chatting Our Way Into Creating a Polymorphic Malware

    Abstract ChatGPT took the world by storm being released less than two months ago, it has become prominent and is used everywhere, for a wide variety of tasks – from automation tasks to the...

    Read Article
  • What I Learned from Analyzing a Caching Vulnerability in Istio

    What I Learned from Analyzing a Caching Vulnerability in Istio

    TL;DR Istio is an open-source service mash that can layer over applications. Studying CVE-2021-34824 in Istio will allow us to dive into some concepts of Istio and service meshes in general. We...

    Read Article
  • Decentralized Identity Attack Surface – Part 2

    Decentralized Identity Attack Surface – Part 2

    Introduction This is the second part of our Decentralized Identity (DID) blog series. In case you’re not familiar with DID concepts, we highly encourage you to start with the first part. This time...

    Read Article
  • Decentralized Identity Attack Surface – Part 1

    Decentralized Identity Attack Surface – Part 1

    Introduction Who are you? That’s a hard question to answer. Many philosophers have been fascinated with this question for years. Who are you in cyberspace? Your digital identity is comprised of...

    Read Article
  • Fantastic Rootkits: And Where to Find Them (Part 1)

    Fantastic Rootkits: And Where to Find Them (Part 1)

    Introduction In this blog series, we will cover the topic of rootkits — how they are built and the basics of kernel driver analysis — specifically on the Windows platform. In this first part, we...

    Read Article
  • Colorful Vulnerabilities

    Colorful Vulnerabilities

    Our love for gaming alongside finding bugs led us back to the good ol’ question: Is it true that the more RGB colors you have (except for your gaming chair, of course), the more skill...

    Read Article
  • Understanding Windows Containers Communication

    Understanding Windows Containers Communication

    Several years ago, when I spoke with people about containers, most of them were not familiar with the term. Today, it is unquestionably one of the most popular technologies being used in DevOps...

    Read Article
  • Trust Me, I’m a Robot: Can We Trust RPA With Our Most Guarded Secrets?

    Trust Me, I’m a Robot: Can We Trust RPA With Our Most Guarded Secrets?

    In our complicated and challenging enterprise world, trust is not just important — it’s a vital link in the long chain of enterprise success. If you’ve ever managed people who didn’t trust one...

    Read Article
  • Inside Matanbuchus: A Quirky Loader

    Inside Matanbuchus: A Quirky Loader

    An in-depth analysis of Matanbuchus loader’s tricks and loading techniques Matanbuchus is a Malware-as-a-Service loader that has been sold on underground markets for more than one year....

    Read Article
  • That Pipe is Still Leaking: Revisiting the RDP Named Pipe Vulnerability

    That Pipe is Still Leaking: Revisiting the RDP Named Pipe Vulnerability

    On January 11, 2022, we published a blog post describing the details of CVE-2022-21893, a Remote Desktop vulnerability that we found and reported to Microsoft. After analyzing the patch that fixed...

    Read Article
  • Go BLUE! A Protection Plan for Credentials in Chromium-based Browsers

    Go BLUE! A Protection Plan for Credentials in Chromium-based Browsers

    In my previous blog post (here), I described a technique to extract sensitive data (passwords, cookies) directly from the memory of a Chromium-based browser’s [CBB] process. Google’s response to...

    Read Article
  • Extracting Clear-Text Credentials Directly From Chromium’s Memory

    Extracting Clear-Text Credentials Directly From Chromium’s Memory

    This research was initiated accidentally. After “mini-dumping” all active Chrome.exe processes for another research project, I decided to see if a password that I recently typed in the browser...

    Read Article
  • Finding Bugs in Windows Drivers, Part 1 – WDM

    Finding Bugs in Windows Drivers, Part 1 – WDM

    Finding vulnerabilities in Windows drivers was always a highly sought-after prize by sophisticated threat actors, game cheat writers and red teamers. As you probably know, every bug in a driver...

    Read Article
  • Conti Group Leaked!

    Conti Group Leaked!

    The conflict in Ukraine has driven significant attention from the cybersecurity community, due in large part to the cyber attacks conducted against Ukraine infrastructure — including evidence of...

    Read Article
  • How Docker Made Me More Capable and the Host Less Secure

    How Docker Made Me More Capable and the Host Less Secure

    TL;DR After Docker released a fix [1] for CVE-2021-21284 [2], it unintentionally created a new vulnerability that allows a low-privileged user on the host to execute files from Docker images....

    Read Article
  • Checking for Vulnerable Systems for CVE-2021-4034 with PwnKit-Hunter

    Checking for Vulnerable Systems for CVE-2021-4034 with PwnKit-Hunter

    What is PwnKit Vulnerability CVE-2021-4034? On January 25th, 2022, a critical vulnerability in polkit’s pkexec was publicly disclosed (link). The Qualys research team named this vulnerability...

    Read Article
  • Analyzing Malware with Hooks, Stomps and Return-addresses

    Analyzing Malware with Hooks, Stomps and Return-addresses

    Table of Contents Introduction The First Detection The Module Stomp Bypass The Module Stomp Detection Final Thoughts Introduction This is the second post in my series and with this post we will...

    Read Article
  • Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file system access to client machines and more

    Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file system access to client machines and more

    In this blog post we are going to discuss the details of a vulnerability in Windows Remote Desktop Services, which we recently uncovered. We reported the vulnerability to Microsoft in a...

    Read Article
  • Don’t Trust This Title: Abusing Terminal Emulators with ANSI Escape Characters

    Don’t Trust This Title: Abusing Terminal Emulators with ANSI Escape Characters

    One day, while I was working on OpenShift, a Kubernetes distribution by RedHat focused on developer experience and application security, I noticed that I was able to inject ANSI escape characters...

    Read Article
  • loading
    Loading More...