Threat Research Blog

  • The Hacker’s Guide to The Cosmos (SDK): Stealing Millions from the Blockchain

    The Hacker’s Guide to The Cosmos (SDK): Stealing Millions from the Blockchain

    Introduction Welcome, fellow travelers of the Cosmos! While we may not be traversing the stars on a spaceship, we are all interconnected through the powerful network of blockchains. Unfortunately,...

    Read Article
  • CyberArk Named a Leader in the 2023 Gartner® Magic Quadrant™ for Privileged Access Management – again.

    View the Report
  • A Deep Dive into Penetration Testing of macOS Applications (Part 3)

    A Deep Dive into Penetration Testing of macOS Applications (Part 3)

    Introduction This is the final installment of the blog series “A Deep Dive into Penetration Testing of macOS Applications.” Previously, we discussed the structure of macOS applications and their...

    Read Article
  • Ransomware’s PLAYing a Broken Game

    Ransomware’s PLAYing a Broken Game

    Abstract The Play ransomware group is one of the most successful ransomware syndicates today. All it takes is a quick peek with a disassembler to know why this group has become infamous. This is...

    Read Article
  • SafeNet: Securing Your Network From Yourself

    SafeNet: Securing Your Network From Yourself

    TL;DR Whether working at home or in the office, when conducting cybersecurity research, investigating the dark web forums or engaging with any dangerous part of the internet, staying safe is...

    Read Article
  • Fuzzer-V

    Fuzzer-V

    TL;DR An overview of a fuzzing project targeting the Hyper-V VSPs using Intel Processor Trace (IPT) for code coverage guided fuzzing, built upon WinAFL, winipt, HAFL1, and Microsoft’s IPT.sys....

    Read Article
  • NVMe: New Vulnerabilities Made Easy

    NVMe: New Vulnerabilities Made Easy

    As vulnerability researchers, our primary mission is to find as many vulnerabilities as possible with the highest severity as possible. Finding vulnerabilities is usually challenging. But could...

    Read Article
  • Fantastic Rootkits: And Where To Find Them (Part 3) – ARM Edition

    Fantastic Rootkits: And Where To Find Them (Part 3) – ARM Edition

    Introduction In this blog, we will discuss innovative rootkit techniques on a non-traditional architecture, Windows 11 on ARM64. In the prior posts, we covered rootkit techniques applied to a...

    Read Article
  • A Deep Dive into Penetration Testing of macOS Applications (Part 2)

    A Deep Dive into Penetration Testing of macOS Applications (Part 2)

    Introduction This is the second part of the “A Deep Dive into Penetration Testing of macOS Application” blog series. In the first part, we learned about macOS applications and their structure and...

    Read Article
  • A Deep Dive into Penetration Testing of macOS Applications (Part 1)

    A Deep Dive into Penetration Testing of macOS Applications (Part 1)

    Introduction As many of us know, there are a lot of guides and information on penetration testing applications on Windows and Linux. Unfortunately, a step-by-step guide doesn’t exist in the macOS...

    Read Article
  • How to Write a PoC for an Uninitialized Smart Contract Vulnerability in BadgerDAO Using Foundry

    How to Write a PoC for an Uninitialized Smart Contract Vulnerability in BadgerDAO Using Foundry

    TL;DR In this post, we’re going to learn how Foundry can be used to write a proof of concept (PoC) for uninitialized smart contract vulnerabilities. We will take a look at and exploit a simple...

    Read Article
  • White Phoenix: Beating Intermittent Encryption

    White Phoenix: Beating Intermittent Encryption

    Recently, a new trend has emerged in the world of ransomware: intermittent encryption, the partial encryption of targeted files. Many ransomware groups, such as BlackCat and Play, have adopted...

    Read Article
  • Fantastic Rootkits and Where to Find Them (Part 2)

    Fantastic Rootkits and Where to Find Them (Part 2)

    Know Your Enemy In the previous post (Part 1), we covered several rootkit technique implementations. Now we will focus on kernel rootkit analysis, looking at two case studies of rootkits found in...

    Read Article
  • Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 2

    Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 2

    In the previous blog post, we described how the Docker research started and showed how we could gain a full privilege escalation through a vulnerability in Docker Desktop. In this follow-up blog...

    Read Article
  • The (Not so) Secret War on Discord

    The (Not so) Secret War on Discord

    CyberArk Malware Research Team Abstract CyberArk Labs discovered a new malware called Vare that is distributed over the popular chatting service, Discord. Vare has been used to target new malware...

    Read Article
  • Persistence Techniques That Persist

    Persistence Techniques That Persist

    Abstract Once threat actors gain a foothold on a system, they must implement techniques to maintain that access, even in the event of restarts, updates in credentials or any other type of change...

    Read Article
  • Phishing as a Service

    Phishing as a Service

    Introduction Everyone knows what phishing is. It has been around for more than two decades. Now it seems that phishing is more accessible than before. This blog covers how malicious actors can...

    Read Article
  • The Linux Kernel and the Cursed Driver

    The Linux Kernel and the Cursed Driver

    Introduction NTFS is a filesystem developed by Microsoft that was introduced in 1993. Since then, it has become the primary filesystem for Windows. In recent years, the need for an NTFS...

    Read Article
  • Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 1

    Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 1

    Everything started when I was researching Windows containers. It required installing Docker Desktop for Windows, and I couldn’t help but notice that there were many Docker processes. Since some of...

    Read Article
  • Inglourious Drivers – A Journey of Finding Vulnerabilities in Drivers

    Inglourious Drivers – A Journey of Finding Vulnerabilities in Drivers

    TL;DR I discovered multiple bugs in OEM vendors for peripheral devices, which affected many users of these OEM vendors (Razer, EVGA, MSI, AMI). Many of the vulnerabilities originated in a...

    Read Article
  • Chatting Our Way Into Creating a Polymorphic Malware

    Chatting Our Way Into Creating a Polymorphic Malware

    Abstract ChatGPT took the world by storm being released less than two months ago, it has become prominent and is used everywhere, for a wide variety of tasks – from automation tasks to the...

    Read Article
  • loading
    Loading More...