Cisco Talos is aware of UAT-4356‘s continued active targeting of Cisco Firepower devices’ Firepower eXtensible Operating System (FXOS). UAT-4356 exploited n-day vulnerabilities (CVE-2025-20333 and CVE-2025-20362) to gain unauthorized access to vulnerable devices, where the threat actor deployed their custom-built backdoor dubbed “FIRESTARTER.” FIRESTARTER considerably overlaps with the technical capabilities of RayInitiator’s Stage 3 shellcode that processes incoming XML-based payloads to endpoint APIs.
In early 2024, Cisco Talos attributed ArcaneDoor, a state-sponsored campaign focused on gaining access to network perimeter devices for espionage, to UAT-4356.
Customers are advised to refer to Cisco’s Security Advisory for mitigation and detection guidance, indicators of compromise (IOCs), affected products, and applicable software upgrade recommendations.
The FIRESTARTER backdoor
FIRESTARTER is a malicious backdoor implanted by UAT-4356 that allows remote access and control to execute arbitrary code inside the LINA process, a core component of Cisco’s ASA and FTD appliances running FXOS.
Persistence
UAT-4356 established persistence for FIRESTARTER on compromised devices by manipulating the mount list for Cisco Service Platform (CSP), namely “CSP_MOUNT_LIST”, to execute FIRESTARTER. The mount list allows programs and commands to be executed as part of the device’s boot sequence. The persistence mechanism triggers during graceful reboot (i.e., when a process termination signal is received). FIRESTARTER also checks the runlevel for value 6 (indicating device reboot) and in case of a match, writes itself to backup location “/opt/cisco/platform/logs/var/log/svc_samcore.log” and updates the CSP_MOUNT_LIST to copy itself back to “/usr/bin/lina_cs” and then be executed. When FIRESTARTER runs after a reboot, it restores the original CSP_MOUNT_LIST and removes the trojanized copy. Because the runlevel triggers establishment of this transient persistence mechanism, a hard reboot (for example, after the device has been unplugged from power) effectively removes the implant from the device.
FIRESTARTER has used the following commands to establish persistence for itself using the transient persistence mechanism:
When the implant injects itself into the LINA process, it removes the traces of its persistence mechanism by restoring the CSP_MOUNT_LIST from a temporary copy (“CSP_MOUNTLIST.tmp”), then removing the temporary copy and the FIRESTARTER file from disk (“/usr/bin/lina_cs”).
FIRESTARTER’s backdoor capabilities
FIRESTARTER can run arbitrary shellcode received by the device. A pre-defined handler function specified by a hardcoded offset in the LINA process’ memory is replaced by an unauthorized handler routine that parses the data being served to it. FIRESTARTER specifically looks for a WebVPN request XML. If the request data received matches a specific pattern of custom-defined prefixing then the shellcode that immediately follows it is executed in memory. If the prefixing bytes are not found, then the data is treated as regular request data and passed to the original handler function (if any).
FIRESTARTER’s loading mechanism, Stage 2 shellcode (i.e., the actual request handler component), handler function replacement, XML parsing for magic bytes, and final payload execution display considerable overlaps with RayInitiator’s Stage 3 deployment actions and accompanying artifacts.
Injecting and activating the malicious shellcode in LINA
FIRESTARTER first reads the LINA process’ memory to search for and verify the presence of the bytes (long) 0x1, 0x2, 0x3, 0x4, 0x5 at specific locations in memory. If found, FIRESTARTER will then query the process’ memory to find an “r-xp” memory range for the shared library “libstdc++.so”. It then copies the next stage shellcode (Stage 2) to the last 0x200 bytes of the memory region. FIRESTARTER then overwrites an internal data structure in the LINA process’ memory to replace a pointer to a WebVPN-specific, legitimate XML handler function with the address of the malicious Stage 2 shellcode.
The malicious shellcode is triggered as part of the authentication API’s request handling process and parses the incoming request data for magic markers signifying an executable payload. If found, the executable payload is then executed on the compromised device.
Detection guidance
The presence of the following artifacts – specifically the filenames “lina_cs” and “svc_samcore.log” – though somewhat brittle indicators, may indicate the presence of the FIRESTARTER on a Firepower device:
We recommend that Cisco customers follow the steps recommended in Cisco’s advisory, with particular attention to any applicable software upgrade recommendations. Organizations impacted can initiate a TAC request for Cisco support.
A FIRESTARTER infection may be mitigated on all affected devices by reimaging the devices.
On Cisco FTD software that is not in lockdown mode, there is also the option of killing the lina_cs process then reloading the device:
Lately, hackers have been turning up the heat on software developers. On the surface, this might seem like a puzzling move — why go after someone who’s literally paid to understand tech when there are plenty of less-savvy targets in the office? As it turns out, compromising a developer’s machine offers a much bigger payoff for an attacker.
Why developers are such high-value targets
For starters, compromising a coder’s workstation can give attackers a direct line to source code, credentials, authentication tokens, or even the entire development infrastructure. If the company builds software for others, a hijacked dev environment allows attackers to launch a massive supply chain attack, using the company’s products to infect its customer base. If the developer works on internal services, their machine becomes a perfect beachhead for lateral movement, allowing hackers to spread deeper into the corporate network.
Even when attackers are purely chasing cryptocurrency (and let’s face it, tech pros are much more likely to hold crypto than the average person), the malware used in these hits doesn’t just swap out wallet addresses; it vacuums up every scrap of valuable data it can find — especially those login credentials and session tokens. Even if the original attackers don’t care about corporate access, they can easily flip those credentials to initial access brokers or more specialized threat actors on the dark web.
Why developers are sitting ducks
In practice, developers aren’t nearly as good at understanding cyberthreats and spotting social engineering as they think they are. This misconception is a big reason why they often fall prey to cybercriminals. Professional expertise can often create a false sense of digital invincibility. This often leads technical professionals to cut corners on security protocols, bypass restrictions set by the security team, or even disable security software on their corporate machines when it gets in the way of their workflow. That mindset, combined with a job that requires them to constantly download and run third-party code, makes them sitting ducks for cyberattackers.
Attack vectors targeting developers
Once an attacker sets their sights on a software engineer, their go-to move is usually finding a way to slip malicious code onto the machine. But that’s just the tip of the iceberg — hackers are also masters at rebranding classic, battle-tested tactics.
Compromising open-source packages
One of the most common ways to hit a developer is by poisoning open-source software. We’ve seen a flood of these attacks over the past year. A prime example hit in March 2026, when attackers managed to inject malicious code into LiteLLM, a popular Python library hosted in the PyPI repository. Because this library acts as a versatile gateway for connecting various AI agents, it’s baked into a massive number of projects. These trojanized versions of LiteLLM delivered scripts designed to hunt for credentials across the victim’s system. Once stolen, that data serves as a skeleton key for attackers to infiltrate any company that was unlucky enough to download the infected packages.
Malware hidden in technical assignments
Every so often, attackers post enticing job openings for developers, complete with take-home test assignments that are laced with malicious code. For instance, in late February 2026, malicious actors pushed out web application projects built on Next.js via several malicious repositories, framing them as coding tests. Once a developer cloned the repo and fired up the project locally, a script would trigger automatically to download and install a backdoor. The attackers gained full remote access to the developer’s machine.
Fake development tools
Recently, our experts described an attack where hackers used paid search-engine ads to push malware disguised as popular AI tools. One of the primary baits was Claude Code, an AI coding assistant. This campaign specifically targeted developers looking for a way to use AI-assistants under the radar, without getting the green light from their company’s infosec team. The ads directed users to a malicious site that perfectly mimicked the official Claude Code documentation. It even included “installation instructions”, which prompted the user to copy and run a command. In reality, running that command installed an infostealer that harvested credentials and shuttled them off to a remote server.
Social engineering tactics
That said, attackers often stick to the basics when trying to plant malware. A recent investigation into a compromised npm package — Axios — revealed that hackers had gained access to a maintainer’s system using a shockingly simple “outdated software” ruse. The attackers reached out to the Axios repository maintainer while posing as the founder of a well-known company. After some back-and-forth, they invited him to a video interview. When the developer tried to join the meeting on what looked like Microsoft Teams, he hit a fake notification claiming his software was out of date and needed an immediate update. That “update” was actually a Remote Access Trojan, giving the attackers access to his machine.
Niche spam
Sometimes, even a blast of fake notifications does the trick, especially when it’s tailored to the audience. For example, just recently, attackers were caught posting fake alerts in the Discussions tabs of various GitHub projects, claiming there was a critical vulnerability in Visual Studio Code that required an immediate update. Because developers subscribed to those discussions received these alerts directly via email, the notifications looked like legitimate security warnings. Of course, the link in the message didn’t lead to an official patch; it pointed to a “fixed” version of VS Code that was actually laced with malware.
How to safeguard an organization
To minimize the risk of a breach, companies should lean into the following best practices:
Make security a native part of your workflow. Use specialized solutions to vet your images, packages, dependencies, and components.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-04-22 18:06:352026-04-22 18:06:35Targeting developers: real-world cases, tactics, and defense strategies | Kaspersky official blog
You can get immediate threat context for over 40 types of IOCs, IOBs, and IOAs belonging to the latest malware & phishing attacks. All data is sourced from real sandbox investigations by ANY.RUN’s community of 15,000 organizations and 600,000 security analysts and experts.
AI assistant interprets a lookup request in natural language, helps select sandbox analyses of malware using a TTP
AI-assisted search is available directly in the query flow, allowing analysts to use natural language and move from question to results without manual query building.
With this expanded access, SOC and MSSP teams can explore Threat Intelligence capabilities in their workflows and see how it affects core SOC processes for faster and more confident operations:
Reduce triage time: Validate alerts against ANY.RUN’s threat database to get immediate verdicts, full context, and access to related samples and activity.
Improve response accuracy: Pivot from a single indicator to connected infrastructure, artifacts, and behavior to understand how the attack unfolds and what else needs containment.
Run more effective threat hunts: Test hypotheses against live attack data, find related samples with YARA Search, and confirm relevance before expanding the hunt.
Build detections based on real attacks: Use discovered patterns and artifacts to create or refine detections aligned with current malware and phishing activity.
This directly impacts key SOC metrics, including reduced time per investigation, lower escalation rates, and faster Mean Time to Respond.
Accelerate security workflows for faster triage & response. Test Threat Intelligence in your SOC or MSSP.
To speed up investigations and simplify how analysts work with Threat Intelligence, TI Lookup now includes AI-assisted search directly in the search bar.
AI Search suggesting a lookup parameter
Analysts can use natural language to query data, while the system automatically translates requests into structured queries with the correct parameters and wildcards.
This removes time spent on query construction and reduces friction in the workflow. Analysts move faster from alert to context, run more queries in less time, and get consistent results without additional steps.
Fueling Core SOC Workflows
Threat intelligence becomes truly valuable when it integrates into everyday operations. Here’s how it reinforces the three pillars of any SOC.
1. Triage: From Guesswork to Confident Decisions
Alert volume is the defining operational challenge for most SOC teams. The ability to validate an alert quickly and to make a confident decision about whether to close it or escalate directly determines how efficiently a team can operate.
With ANY.RUN’s threat intelligence, analysts can immediately check an incoming indicator against a broad base of real-world attack data. Known-malicious infrastructure, recognized malware patterns, and previously documented campaigns can be matched in seconds. This means:
Faster, evidence-backed decisions on alert validity;
A measurable reduction in the percentage of escalations driven by uncertainty rather than confirmed risk;
Lower analyst cognitive load during high-volume periods.
Quick verdict on the suspicious IP, campaign relations, infrastructure, and IOCs
Analysts spend less time on inconclusive alerts and more time on confirmed threats. With documented context to support every decision.
2. Response: Seeing the Bigger Picture
Once an incident is confirmed, speed and precision matter. The quality of the response depends on how well the team understands the threat: its connections, its infrastructure, its behavioral patterns, and its likely next moves. Two clicks in TI Lookup search results cited above take your analyst to a sandbox session of malware detonation and attack chain exposure:
Move from TI Lookup results to sandbox analyses exposing malware’s behavior
ANY.RUN’s threat intelligence enables response teams to map the relationships between indicators and the broader campaigns or actor groups behind them. Shared infrastructure, overlapping TTPs, and connected artifacts can be identified quickly, giving responders a structural understanding of what they are dealing with, not just a list of individual indicators.
This translates into:
More complete scoping of incidents, with fewer blind spots;
Targeted containment and remediation actions grounded in evidence;
Higher confidence in response decisions.
Overreaction and underreaction are reduced at the same time. The response becomes targeted, not reactive.
3. Threat Hunting: Testing Hypotheses Against Reality
Proactive threat hunting requires the ability to test hypotheses against real-world data. Analysts need to move from a suspicion about adversary behavior to a confirmed or refuted finding with enough evidence to act.
ANY.RUN’s threat intelligence gives hunters access to a rich, searchable base of behavioral data from real-world malware analysis. Campaign linkages, attacker infrastructure patterns, and behavioral signatures can all be researched in depth.
YARA Search accumulating artifacts and sandbox analyses
YARA Rules Search adds a further dimension, allowing hunters to build and validate detection logic against current threat data.
The result is a hunting capability that is grounded in current, real-world evidence rather than theoretical models. It enables teams to find genuine threats and build detection coverage that reflects how adversaries actually behave. Hunting shifts from speculative to evidence-driven.
How Threat Intelligence Impacts Your Business Outcomes
Behind every alert, investigation, and response action, there is a business impact quietly accumulating.
For Security Operations Teams (SOCs & MSSPs):
Alert validation accelerates, reducing the time from detection to decision.
Fewer escalations are driven by uncertainty; each escalation carries stronger evidentiary weight.
Investigation time decreases as analysts access contextualized data without pivoting between tools.
Analyst confidence improves, reducing the hesitation that slows response in high-pressure situations
For the Organization:
Incident costs fall when threats are understood accurately and responded to precisely.
Faster response timelines limit attacker dwell time and reduce the scope of potential damage.
The risk of missing significant threats decreases as detection and investigation are backed by broad, current intelligence.
Security investments deliver more measurable returns when team capacity is focused on real, confirmed risk.
Scale SOC Performance with Full Access to Threat Intelligence from ANY.RUN
The Free plan is a genuine starting point: a full-capability evaluation that lets teams verify the value of ANY.RUN’s intelligence on real workflows. For organizations ready to operationalize threat intelligence at scale, ANY.RUN offers paid plans designed for different operational needs.
ANY.RUN’s TI plans & pricing
These include Live, Core, and Complete plans, allowing teams to choose the level of access and integration that fits their workflows and scale.
Across these plans, organizations can leverage the full set of threat intelligence capabilities, including:
1. Threat Intelligence Feeds
Continuous streams of validated indicators enriched with behavioral context from the sandbox analyses, delivered directly into SIEM, EDR, IDS/IPS, and SOAR systems. This enables automated enrichment and faster detection pipelines.
2. Threat Intelligence Reports: full access
Structured analyses of active campaigns, malware families, and attacker techniques. These reports provide ready-to-use insights for both operational response and strategic planning.
TI Reports: most pressing threats, most dangerous APTs
Close blind spots and reduce exposure to critical incidents.
Integrate ANY.RUN’s Threat Intelligence in your SOC.
What makes them particularly useful in operations:
Clear breakdowns of campaigns, including tactics, techniques, and procedures;
Context around how attacks unfold in real environments;
Indicators and infrastructure tied together into meaningful clusters;
Ready-to-use insights that support both immediate response and long-term defense.
Reports act as a bridge between raw telemetry and strategic understanding. They help teams not only react faster, but also recognize patterns before they escalate into incidents.
3. Threat Landscape
A contextual layer that maps threats to industries and geographies, helping organizations understand where specific risks are most relevant to their business.
Lookup shows: Vidar trojan now targeting education, government, IT, and telecom in Europe and Americas
Together, these capabilities support key business objectives:
Reducing mean time to detect and respond (MTTD/MTTR);
Lowering operational costs of incident handling;
Improving analyst efficiency and capacity utilization;
Strengthening risk management and compliance posture.
ANY.RUN TI plans
The result is a measurable improvement in how security operations contribute to overall business resilience.
Final Thoughts
The gap between threat detection and effective response is not primarily a technology problem. It is a data problem. When analysts have access to rich, current, contextual intelligence at the moment they need it, decisions improve and outcomes follow.
ANY.RUN’s unified threat intelligence — TI Lookup, TI Feeds, TI Reports, and YARA Search, all powered by real sandbox data from 15,000 organizations — gives SOC and MSSP teams that foundation. The free plan removes the evaluation barrier: any team can run it through real workflows, on real alerts, before committing to anything.
For teams that operationalize it, the cumulative effect is a SOC that is measurably faster, more accurate, and more confident — and an organization that is measurably harder to compromise and cheaper to defend.
About ANY.RUN
ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams investigate threats faster and with greater clarity across modern enterprise environments.
It allows teams to safely execute suspicious files and URLs, observe real behavior in an Interactive Sandbox, enrich indicators with immediate context through TI Lookup, and monitor emerging malicious infrastructure using Threat Intelligence Feeds. Together, these capabilities help reduce investigation uncertainty, accelerate triage, and limit unnecessary escalations across the SOC.
ANY.RUN is trusted by thousands of organizations worldwide and meets enterprise security and compliance expectations. It is SOC 2 Type II certified, demonstrating its commitment to protecting customer data and maintaining strong security controls.
What is included in the expanded entry-level plan?
It includes 20 investigations in Threat Intelligence Lookup with AI-assisted search, access to YARA search, and the free Threat Intelligence Reports to evaluate real workflows.
How is this different from a typical trial?
It is not a limited demo. It allows teams to test threat intelligence directly within their SOC processes, using real alerts and investigations.
What data powers ANY.RUN’s threat intelligence?
It is generated from real-world malware analyses in the ANY.RUN Interactive Sandbox, enriched with behavioral data, infrastructure links, and campaign context.
How does AI search help analysts?
It simplifies query building by translating intent into structured search parameters, reducing time spent on syntax and accelerating investigations.
Can this be integrated into existing security infrastructure?
Yes, paid plans support integration with SIEM, SOAR, and other security systems, enabling automated workflows and enrichment.
Who is this most relevant for?
SOC teams, MSSPs, and security leaders who want to improve decision speed, reduce uncertainty, and lower incident response costs.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-04-22 14:07:262026-04-22 14:07:26More Attack Context for Faster Triage, Response, and Hunting. Now Available to Every SOC
Phishing reemerged as the most observed means of gaining initial access, accounting for over a third of the engagements where initial access could be determined. Phishing has not been the top vector for initial access since Q2 2025.
Public administration and health care tied as the most targeted industry verticals, each accounting for 24 percent of all engagements. This is the third consecutive quarter where public administration has been the most targeted industry vertical.
Pre-ransomware incidents made up just 18 percent of engagements this quarter, and we did not observe any ransomware deployment due to early and swift mitigation from Cisco Talos Incident Response (Talos IR). This is a slight increase from last quarter but overall very low compared to Q1 and Q2 2025, when we observed ransomware in 50 percent of engagements.
AI tool leveraged in phishing campaign
Talos IR responded to a campaign that leveraged phishing, the most common means of initial access this quarter, to compromise the most targeted industry vertical this quarter: public administration. Notably, the actors leveraged the SoftrAI-based web application development service, marking the first time we have documented the use of a specific AI tool by an adversary in a phishing campaign. Softr was used to generate a credential harvesting page targeting users’ Microsoft Exchange and Outlook Web Access (OWA) accounts.
State-sponsored and criminal actors have been observed abusing large language models (LLMs) to aid in the development of phishing lures, malicious scripts, and other tasks. DDoS-as-a-service actors have adopted AI algorithms for defense evasion and attack orchestration. While this is the first time we have documented the use of a specific AI tool in a Talos IR incident, we have moderate confidence that malicious actors have used Softr’s AI-powered web application creation platform since at May 2023, based on Cisco Umbrella data and other telemetry, and have done so with increasing frequency to date.
This incident demonstrates how AI tools can lower the barrier to entry for less sophisticated actors and/or accelerate the speed of phishing and credential-harvesting campaigns. Using a form template and the “vibe coding” feature, a phishing page like the one used in this attack could be quickly created with a few AI prompts and no code. Phishing pages built with Softr can direct data to a disposable external data store, such as Google Sheets, and send alerts for new captures via email — all without code.
Crimson Collective seen for the first time
Talos IR experienced its first case involving Crimson Collective, a cyber extortion group that appeared in September 2025. This attack highlighted the use of valid accounts for initial access, the second most commonly observed means of initial access this quarter. This attack also notably involved targeting exploit weaknesses, the second-most observed security weakness, accounting for 25 percent of all engagements. We attribute this activity to Crimson Collective based on IPs associated with the group that were used to scan the victim’s ASA firewalls, as well as an overlap of observed tactics and techniques with publicly reported Crimson Collective attacks.
The incident began when a GitHub Personal Access Token (PAT) was inadvertently published on a public-facing website, exposing the organization to adversaries for several months. Upon obtaining access, the adversary used TruffleHog, an open-source tool commonly utilized by security professionals, to scan thousands of victim GitHub repositories for additional secrets and sensitive information. This approach allows attackers to perform reconnaissance without triggering suspicion, as they are leveraging standard, legitimate tools. The attacker’s discovery of client secrets through TruffleHog enabled further access to the victim’s Azure cloud storage, where they used Microsoft Graph API calls to authenticate, explore, and exfiltrate data. The abuse of legitimate cloud APIs demonstrates a growing trend where threat actors use native platform functionality to blend into normal user activity, making detection more challenging.
In addition to exfiltrating data, the adversary attempted to inject malicious code into multiple GitHub repositories. This code was designed to harvest any new secrets committed in the future, sending them to adversary-controlled infrastructure. Though these attempts were largely thwarted by the expiration of targeted secrets and effective security controls, the tactic reflects an emerging trend of supply chain and development environment attacks.
Pre-ransomware incidents made up just 18 percent of engagements this quarter, and we did not observe any ransomware encryption due to early and swift mitigation from Talos IR. This is a slight increase from last quarter, when ransomware and pre-ransomware collectively comprised 13 percent of engagements, but overall very low compared to Q1 and Q2 2025, when we observed ransomware in 50 percent of engagements. Attribution is challenging in pre-ransomware events because there are no encryptors or ransom notes, but we assess that Rhysida ransomware and MoneyMessage ransomware accounted for two of the engagements.
While we did not observe many active and prolific ransomware-as-a-service (RaaS) operations, like Qilin or Akira, this likely does not indicate these major players are decreasing operations, as their data leak sites remain consistently active.
Rhysida ransomware actors use uncommon backdoor, Meowbackconn
Talos IR responded to a ransomware incident where the adversary attempted to deploy Rhysida ransomware. While the attack was mitigated in the pre-ransomware stage, we attribute this activity with moderate confidence to Rhysidabased on observed infrastructure that is associated with Rhysida activity and the use of Gootloader, which is commonly leveraged in Rhysida attacks during initial access. Notably, the actors deployed proxy-related DLLs (e.g., “meow_eu.dll”), which we assess were likely related to MeowBackConn, an uncommon backdoor that is closely associated with Gootloader, based on public reporting.
This attack represents several trends that we observed throughout Talos IR engagements in Q1 2026. The environmental weaknesses that enabled this intrusion — exposed WinRM management ports, over-privileged service accounts, and critical logging gaps — directly echo this quarter’s most prominent security weaknesses, including vulnerable or exposed infrastructure, accounting for 25 percent of engagements. Furthermore, the adversary’s use of Remote Desktop Protocol (RDP) for lateral movement is consistent with RDP being the top technique for lateral movement for the previous two quarters (Q3 and Q4 2025).
Targeting
Public administration and health care were tied as the most targeted industry verticals. Notably, Q3 2025 marked the first time public administration emerged as the most targeted sector in Talos IR engagements, and it has retained that position since. Organizations within the public administration sector are attractive targets as they are often underfunded and use legacy equipment. These entities may have access to sensitive data as well as a low downtime tolerance, making them attractive to financially motivated and espionage-focused threat groups.
Initial access
Phishing reemerged as the most observed means of gaining initial access, accounting for over a third of the engagements where initial access could be determined. Phishing was the top initial access vector in the first half of 2025, at which point it was surpassed by exploitation of public-facing applications, likely due to the widespread exploitation of vulnerabilities in on-premises Microsoft SharePoint servers, collectively referred to as ToolShell. Since then, we have observeda steady decrease in the exploitation of public-facing applications as an initial access vector from a high of 62 percent to only 18 percent in Q1 2026. Similarly, in this quarter, valid accounts returned to its pre-ToolShell baseline as the second most observed means of gaining initial access, comprising 24 percent of Talos IR engagements. We assess the decline in ToolShell exploitation is likely due to the widespread availability of emergency patches and enhanced security detections, highlighting the importance of timely patching.
Recommendations for addressing top security weaknesses
Implement properly configured MFA and other access control solutions
35 percent of engagements this quarter involved multi-factor authentication (MFA) weaknesses, an increase from last quarter. This includes incidents where threat actors bypassed MFA and where MFA was either missing or only partially enabled, particularly on remote access services. Adversaries were able to bypass MFA by registering new devices to previously compromised accounts, and in one instance, by configuring Outlook clients to connect directly to Exchange servers, circumventing MFA requirements. Addressing these weaknesses, especially by restricting self-service MFA enrollment and enforcing strong, centralized authentication policies, is essential to reducing risk and strengthening organizational resilience.
Conduct robust patch management
Vulnerable or exposed infrastructure was another top security weakness accounting for 25 percent of all engagements, a slight decrease from last quarter. This included exploiting a vulnerability (CVE-2025-20393) in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager, as well as a vulnerability (CVE-2023-20198) in the web UI feature in Cisco IOS XE Software. Talos also observed exposed management ports (such as WinRM open to the internet), which enabled rapid attacker movement and reconnaissance.
Configure centralized logging capabilities across the environment
Finally, 18 percent of engagements this quarter involved organizations with insufficient logging capabilities, which hindered investigative efforts. Understanding the full context and chain of events performed by an adversary on a targeted host is vital not only for remediation but also for enhancing defenses and addressing any system vulnerabilities for the future. To address this issue, Talos IR recommends organizations implement a security information and event management (SIEM) solution for centralized logging. In the event an adversary deletes or modifies logs on the host, the SIEM will contain the original logs to support a forensics investigation. Additionally, Talos IR offers a Log Architecture Assessment service, which provides a focused review of an organization’s logs and overall log strategy to identify gaps and offer recommendations that give a complete view of the security environment and strengthen incident response readiness
MITRE ATT&CK appendix
The tables below represent the MITRE ATT&CK techniques observed in this quarter’s IR engagements and includes relevant examples and the number of times seen. Given that some techniques can fall under multiple tactics, we grouped them under the most relevant tactic based on the way they were leveraged. Please note that this is not an exhaustive list.
Key findings from the MITRE ATT&CK framework include:
Phishing was the top method of initial access, replacing exploitation of public-facing applications which was dominant in the prior two quarters.
Web-based C2 was the most common C2 pattern. Application Layer Protocol over web protocols was observed most often, indicating adversaries frequently blended C2 into normal-looking traffic.
Lateral movement primarily relied on common remote administration channels. SMB/Windows Admin Shares was the top lateral movement technique, with WMI and RDP also heavily used, suggesting attackers repeatedly leveragedstandard enterprise remote management paths once inside. RDP was the top technique for lateral movement in the prior two quarters.
Defense evasion frequently focused on weakening visibility and endpoint protections. Impair defenses by disabling/modifying tools appeared multiple times, alongside log/trace reduction behaviors (e.g., clear command history and file deletion), indicating a recurring emphasis on reducing detection and forensic evidence.
The adversaryenumeratedinternal processes andidentifiedvendor emails tofacilitatetheir fraudulent ordering scheme.
1
T1595: Active Scanning
The adversary scanned public-facing websites to understand the target environment.
2
T1593: Search Open Websites/Domains
The adversary scanned the web to obtainGithubPATs.
1
Initial access
T1566: Phishing
The adversary used malicious emails and social engineering to compromise user accounts andfacilitatefraudulent purchase orders.
5
T1189: Drive-by compromise
The adversary registered several domains that masquerade as being related to VMware, and manipulated the SEO to show them at the top when searching for keywords such as VMware
3
T1078: Valid Accounts
The adversary successfully gained access to the environment by using compromised user credentials
4
T1190: Exploit public-facing applications
Two internet facing Linux servers running Apache and an LMS application were targeted.
3
Execution
T1204.002: User Execution: Malicious File
The victim downloaded a malicious installer on their personal host, connected the host to their company’s network, transferred the malware to their primary domain controller, then executed the malware.
3
T1204.001: User Execution: Malicious link
The victim clicked on a link that led to a fakeDocuSigndocument hosted on adobe[.]com
5
T1059.001: Command and Scripting Interpreter: PowerShell
The adversary used PowerShell commands and scripts for execution.
4
T1059.006: Command and Scripting Interpreter: Python
The adversary used automated Python scripts to interact with the environment.
1
T1059.005: Command and Scripting Interpreter: MSHTA
The adversaryattemptedto use mshta.exe to retrieve and execute a remote malicious payload from an external URL.
The adversary registered their own malicious MFA devices tomaintainaccess to compromised accounts.
2
T1219: Remote Access Software
The adversary installed and usedAnyDeskfor unauthorized remote access.
1
T1053.005: Scheduled Task/Job: Scheduled Task
The adversary configured tasks to run on a schedule or at system startup.
1
T1505: Server Software Component
The adversary installed malware on breached devices tofacilitateremote command execution via HTTP.
1
Privilege escalation
T1068: Exploitation for Privilege Escalation
The adversary escalated to SYSTEM level privileges, which may have provided access to cached credentials in memory or registry hive.
1
T1548: Abuse Elevation Control Mechanism
The adversary usedExecutionPolicyBypass in PowerShell andattemptedto add users to the local Administrators group.
1
T1078Valid Accounts
The adversary bypassed standard access controls by using compromised accounts with existing high-level privileges.
1
Defense evasion
T1070.003: Indicator Removal on Host: Clear Command History
The adversary used the terminal emulator “ConEmu” to run commands, intentionally avoiding log generation.
2
T1070.001: Indicator Removal: Clear Windows Event Logs
The adversarydeletedlogs on compromised devices to limit forensic findings.
1
T1556:ModifyAuthentication Process
The adversary set up an OutlookclientOutlook client to connect to the Exchange Server and was able to send messages via that path which bypasses the requirement for MFA via Duo.
1
T1562.001: Impair Defenses: Disable or Modify Tools
The adversary was able to uninstall EDR agents from hosts andattemptedto delete Windows Defender policies.
4
Credential access
T1003.002: OS Credential Dumping: Security Account Manager
The adversary saved SAM and SYSTEM registry hives to extract local account hashes.
2
T1003.003: OS Credential Dumping: NTDS
The adversary dumped thentds.ditfile from Domain Controllers to obtain domain-wide credential hashes.
1
T1003.005: Cached Domain Credentials
The adversary gained NT hashes for multiple domain accounts from cached logon information.
1
T1557: Adversary-in-the-Middle
Theadversary usedanAiTMproxy to capture credentials and session tokens.
1
Discovery
T1087.003: Account Discovery: Email Account
The adversary used Graph API calls to verify long lists of email addresses and retrieve associated user GUIDs.
1
T1580: Cloud Infrastructure Discovery
The adversary performed enumeration of the environment, including gathering OneDrive metadata (drive IDs and child item counts) and user roles.
1
T1069.002: Permission Groups Discovery: Domain Groups
The adversary used commands like net group “domain admins” /domain to find high-privilege accounts.
1
T1526: Cloud Service Discovery
The adversary ran the legitimate cybersecurity toolTruffleHogto discover repositoriescontainingclient secrets and personal information.
The analysis of M365 Audit Logs showed multipleFileAccessedand FileDownloaded events for documents stored in SharePoint and OneDrive.
1
T1040 Network Sniffing
The adversary executed monitor capture commands on specific interfaces to intercept and capture network traffic.
1
Command and control
T1071.001: Application Layer Protocol: Web Protocols
The adversary usedMeshAgentto communicate with the C2 server overWebSockets.
5
T1102: Web Service
The adversaryleverageda Telegram URL to issue instructions and download links.
1
T1572: Protocol Tunneling
The adversary used a second-stage script to create an HTTPS tunnel directly to the C2 system.
1
T1201: Traffic Signaling
The adversary communicated with external infrastructure using regular beaconing or other signaling patterns to maintain C2 or check in with their C2 server.
1
Exfiltration
T1567.002: Exfiltration Over Web Service
The adversary accessed and exfiltrated internal data, specifically SharePoint files, via web-based channels.
1
T1041: Exfiltration Over C2 Channel
The adversary exfiltrated approximately 2,500 client secrets and personal information.
2
Impact
T1657: Financial Theft
The adversary used company resources to place orders totaling hundreds of thousands of US dollars for various products which were successfully delivered.
1
T1486 Data Encrypted for Impact
The adversary encrypted victim data.
1
T1531 Account Access Removal
The adversary disabled admin accounts and deleted service accounts in the Active Directory (AD) and Azure
1
Software
Rhysida
A RaaS, known for posing as a cybersecurity team that “helps” its victimsidentifysecurity weaknesses in their networks.
Pre-ransomware engagement
SocGholish
A JavaScript-based loader malware that has been usedsince at least2017, primarily forinitialaccess.
1
Money Message
A ransomware that emerged inMarch 2023, andis capable of targeting Windows and Linux systems (including VMwareESXiservers).
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-04-22 10:06:392026-04-22 10:06:39IR Trends Q1 2026: Phishing reemerges as top initial access vector, as attacks targeting public administration persist
In this episode, we unpack state-sponsored and phishing trends from the 2025 Talos Year in Review. Amy and Martin Lee explore the alarming rise of internal phishing campaigns that bypass traditional perimeter defenses, including the widespread weaponization of Microsoft 365’s Direct Send feature. Beyond simple phishing, we analyze the aggressive, blended operations of state-sponsored actors from China and North Korea who are combining high-level zero-day exploits with sophisticated social engineering. From the “Dear Leader” interview test to the reality of fake developer personas, we break down exactly how these adversaries are infiltrating modern organizations.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-04-21 14:07:402026-04-21 14:07:40[Podcast] It’s not you, it’s your printer: State-sponsored and phishing threats in 2025
In 2025, attackers increasingly targeted weaknesses in multi-factor authentication (MFA) workflows, and phishing attacks leveraged valid, compromised credentials to launch lures from trusted accounts. The trends focused entirely on trust, or the lack thereof, in everyday business operations.
Phishing
In 2025, phishing attacks were used for initial access in 40% of incidents, maintaining their prevalence. Attackers ramped up cascaded phishing campaigns, where attackers leveraged the trust of the initial compromised account to create specialized phishing attempts, within the network and out of it, aimed at trusted partners and third parties.
Email composition trends
The content of phishing emails changed somewhat. Transitioning away from spam offers, they took the form of workflow-style emails — IT, travel, and other everyday business tasks that look familiar to employees and executives. Travel and logistics lures in particular surged, while political lures dropped off. Internal expensing and travel emails, even when legitimate, are often repetitive and come from disparate sources with changeable formats or poorly-rendered templates, leading to a lowered guard toward spotting malicious intent. Attackers were likely aiming to steal credentials, payment information, or MFA tokens via fake single sign-on (SSO) pages.
In reviews of thousands of blocked-email keywords, 60% contained subject lines with “request,” “invoice,” “fwd,” “report,” and similar. IT-focused phishing keywords turned more technical, to words like “tampering,” “domain,” “configuration,” “token,” and others, showing that attackers were making plays toward IT and security workflows.
Attackers also abused Microsoft 365 Direct Send to capitalize on internal email trust. Direct Send is the method by which networked devices like printers and scanners deliver documents to users. The messages appear to be sent and received by the same email address. These internal messages do not receive the same scrutiny that external emails do, from employees or automated email filters. Direct Send allowed attackers to spoof internal email addresses and deliver highly convincing lures from inside the organization, without compromising real accounts, to target key attack services and deliver high-impact damage.
MFA and identity attacks
Identity and access management (IAM) applications have grown popular with organizations hoping to consolidate user privileges. Unfortunately, it has also grown in popularity with attackers. Nearly a third of 2025 MFA spray attacks targeted IAM, turning the tools companies used to maintain access control into a point of failure. Device compromise surged by 178%, largely driven by voice phishing designed to trick administrators into registering malicious devices.
MFA spray and device compromise
MFA attack strategy changed by sector. A successful attack could glean SSO tokens and give adversaries the ability to change user roles and credentials, or even the MFA policies themselves. Attackers increasingly exploited authentication workflows to gain and maintain access.
Spray attacks were deployed against networks with predictable identity behavior, while diverse, unmanaged, or high-turnover device ecosystems proved weaker to device compromise attacks.
Notably, higher education was the most targeted device compromise sector. Several factors could contribute to the trend:
· Large, public-facing directories for targeted phishing
Higher education was a very unfavorable target for MFA spray attacks, however. Passwords and MFA are also highly varied and segmented, and most universities have strong login portal policies, enforced lockouts, and login attempt limits.
Guidance for defenders
As always, prioritize based on your own environment.
Organizations should keep in mind that living-off-the-land binaries (LOLBins) and open-source and dual-use tools, which are not inherently malicious, are key to further exploitation. Blocking external IPs from using a feature, enabling Microsoft’s newer “Reject Direct Send” control, tightening SPF/DMARC enforcement, and treating “internal-looking” emails with the same scrutiny as inbound mail are currently the most effective defenses.
Likewise, MFA attack protection should be tailored to the style of environment and sector.
MFA spray attacks work well on stable, scaled identity controls. Counter these attacks with strong lockout policies, good password hygiene, and conditional access.
Device compromise works best on variable networks where devices change over fast and MFA use is spotty. Work on establishing better device hardening and management, session controls, and strict phishing-resistant MFA with enrollment governance. Solutions such as Cisco Duo provide controls for phishing-resistant MFA, device trust, and secure enrollment, helping reduce risk from phishing and identity-based attacks. Solutions such as Cisco Duo provide controls for phishing-resistant MFA, device trust, and secure enrollment, helping reduce risk from phishing and identity-based attacks.
This blog only scratched the surface on 2025 threat trends. See the full Year in Review report for a detailed explanation of Microsoft 365 Direct Send and how it was used for attacks, infographic breakdowns of MFA spray vs. device compromise attacks, the full list of targeted tools and sectors by percentage, and more.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-04-21 12:06:402026-04-21 12:06:40Phishing and MFA exploitation: Targeting the keys to the kingdom
As macOS adoption grows among developers and DevOps, it has become a high value target; however, native “living-off-the-land” (LOTL) techniques for the platform remain significantly under-documented compared to Windows.
Adversaries can bypass security controls by repurposing native features like Remote Application Scripting (RAS) for remote execution and abusing Spotlight metadata (Finder comments) to stage payloads in a way that evades static file analysis.
Attackers can move toolkits and establish persistence using built-in protocols such as SMB, Netcat, Git, TFTP, and SNMP operating entirely outside the visibility of standard SSH-based telemetry.
Defenders should shift from static file scanning to monitoring process lineage, inter-process communication (IPC) anomalies, and enforcing strict MDM policies to disable unnecessary administrative services.
As macOS adoption in the enterprise reaches record highs, with over 45 percent of organizations now utilizing the platform, the traditional “security through obscurity” narrative surrounding the OS has been rendered obsolete. Mac endpoints, once relegated to creative departments, are now the primary workstations for developers, DevOps engineers, and system administrators. Consequently, these machines have become high-value targets that serve as gateways to source code repositories, cloud infrastructure, and sensitive production credentials.
Despite this shift, macOS-native lateral movement and execution tradecraft remain significantly understudied compared to their Windows counterparts. This research was conducted to address this critical knowledge gap. Through a systematic validation of native macOS protocols and system binaries, it is demonstrated how adversaries can “live off the land” (LOTL) by repurposing legitimate administrative tools. By weaponizing native primitives, such as Remote Application Scripting (RAS) and Spotlight metadata, intentional OS security features can be bypassed to transform standard system functions into robust mechanisms for arbitrary code execution and fleet-wide orchestration.
macOS is no longer a niche operating system. According to the Stack Overflow 2024 Developer Survey, a third of professional developers use macOS as their primary platform. These machines represent high-value pivot points, often holding source code repositories, cloud credentials, and SSH keys to production infrastructure.
Despite this trend, the MITRE ATT&CK framework documents far fewer techniques for macOS than for Windows, and recent industry reports indicate that macOS environments prevent significantly fewer attacks than their Windows or Linux counterparts. To address this disparity, community-driven resources such as LOOBins (living-off-the-orchard binaries) have emerged to catalog native macOS binaries that can be repurposed for malicious activity. This research aims to further close that gap by systematically enumerating the native pathways available for both movement and execution.
Establishing a remote shell is the first step in any post-exploitation chain. While SSH is the standard, native macOS features provide several alternatives that can bypass traditional monitoring.
Remote Application Scripting as a Software Deployment Tool (T1072)
Remote Application Scripting (formerly known as Remote Apple Events or RAE) was introduced to extend the capabilities of the AppleScript Inter-Process Communication (IPC) framework across a network. By utilizing the Electronic Program-to-Program Communication (“eppc”) protocol, administrative tasks and application automation can be performed on remote macOS systems. This mechanism allows a controller machine to send high-level commands to a target machine, which are then processed by the “AppleEventsD” daemon.
The Open Scripting Architecture (OSA) is utilized as the standardized framework for this inter-application communication and automation on macOS. Through the exchange of Apple Events, this architecture enables scripts to programmatically interact with the operating system and installed applications, providing the functional foundation for the “osascript” utility.
Traditionally, RAE is viewed as a lateral movement vector; however, this research demonstrates that it can also be utilized as a standalone Software Deployment Tool for Execution (T1072).
Adversaries attempting to use RAE for complex payloads often encounter Apple’s intentional security features, specifically the -10016 Handler Error. This restriction prevents the “System Events” application from executing remote shell commands via do shell script, even when RAE is globally enabled.
Figure 2. The -10016 Handler Error in remote application scripting.
To bypass this, a methodology was developed that treats “Terminal.app” as an execution proxy. Unlike “System Events”, “Terminal.app” is designed for shell interaction and accepts remote “do script” commands. To ensure payload integrity and bypass AppleScript parsing limitations (such as the -2741 syntax error), Base64 transport encoding is utilized. This transforms multi-line scripts into flat, alphanumeric strings that are decoded and executed in a two-stage process:
Deployment: A single RAE command instructs the remote “Terminal.app” to decode the Base64 string into a temporary path and apply chmod +x.
Invocation: A second RAE command explicitly invokes the script via “bash”, ensuring a proper shell context.
Figure 3. Terminal.app as an execution proxy for Base64 payloads.
Remote Application Scripting for Lateral Movement (T1021.005)
While RAE can be weaponized for execution, its primary function remains the facilitation of inter-process communication (IPC) across a network. In a lateral movement context, RAE is utilized to control remote applications by targeting the “eppc://” URI. This allows for the remote manipulation of the file system or the retrieval of sensitive environmental data without the need for a traditional interactive shell.
For example, the command in Figure 4 can be used to remotely query the Finder for a list of mounted volumes on a target machine, providing an adversary with immediate insight into the victim’s network shares and external storage:
Figure 4. Remotely querying mounted volumes via RAE.
Because these actions are performed via Apple Events rather than standard shell commands, they often bypass security telemetry that focuses exclusively on process execution trees, making RAE a discreet and effective vector for lateral movement.
AppleScript execution via SSH
AppleScript is macOS’s built-in scripting language for automation. While RAE is a viable application control mechanism, Apple security controls prevent RAE from launching applications; they must already be running. Additionally, RAE must be enabled on the target. To circumvent these obstacles, osascript can be invoked directly over SSH.
Passing osascript the system info command over SSH returns critical environmental details:
Figure 5. Retrieving system information via osascript over SSH.
For arbitrary command execution, AppleScript’s do shell script handler can be invoked over SSH. In the following example, do shell script is used to write a file to the target:
Figure 6. Arbitrary file creation using do shell script over SSH.
While SSH alone can accomplish shell tasks, osascript provides access to graphical user interfact (GUI) automation and Finder manipulation through Apple Events IPC rather than spawning shell processes. This creates a significant telemetry gap, as most endpoint detection tooling has less visibility into IPC-driven actions than standard shell process trees.
socat remote shell
socat (SOcket CAT) is a command line utility for establishing bidirectional data streams between two endpoints. It supports a wide range of socket types including TCP, UDP, Unix domain sockets, and pseudo terminals (pty).
In a lateral movement context, socat can establish an interactive shell on a target without relying on SSH. The target runs a listener that binds a login shell to a TCP port with pty allocation, and the attacker connects to it from a remote machine.
On the target, the listener spawns an interactive bash session for each incoming connection with pty forwarding:
Figure 7. Establishing a listener with PTY forwarding on the target.
From the attacking machine, connecting to the listener provides a fully interactive terminal:
Figure 8. Attacker connection to the socat listener.
On the target, the reuseaddr,fork options allow multiple connections and reuse of the port, while pty,stderr on the exec gives the connecting client a proper terminal with stderr output. On the sender side, raw,echo=0,icanon=0 puts the local terminal into raw mode so that control characters and signals pass through to the remote shell correctly.
SSH is the de facto mechanism for gaining remote shell access on remote hosts, and as a result, it is where most detection engineering efforts are focused. socat achieves the same outcome, fully interactive terminal access, but operatesentirely outside the SSH ecosystem. There are no sshd logs, PAM authentication events, or “authorized_keys” to manage, which means detection pipelines built around SSH telemetry would not catch this activity.
Covert data transfer: Finder metadata abuse
A notable constraint of RAE is its inability to write file contents directly. To work around this, we can abuse the Finder Comment (“kMDItemFinderComment”) field, which is stored as Spotlight metadata.
Writing payloads to Finder Comments
A notable constraint of RAE is its inability to write file contents directly. To circumvent this, threat actors can abuse the Finder Comment field (“kMDItemFinderComment”) — a component of Spotlight metadata stored as an extended attribute. By storing a payload within metadata rather than the file’s data fork, they can bypass traditional file-based security scanners and static analysis tools, which typically focus on executable code and script contents.
Because Finder is scriptable over RAE, the comment of a file on a remote machine can be set via the “eppc://” protocol. By Base64 encoding a payload locally, a multi-line script can be stored within this single string field. The make new file command handles the creation of the target file, ensuring that no pre-existing file is required:
Figure 9. Setting Finder comments via RAE for payload staging.
The payload resides entirely within the Spotlight metadata, a location that remains largely unexamined by standard endpoint detection and response (EDR) solutions. This creates a stealthy staging area where malicious code can persist on the disk without triggering alerts associated with suspicious file contents.
Extraction and execution
On the target, extraction and execution is a single line. mdls reads the comment, base64 -D decodes it, and the result is piped to “bash”:
Figure 10. Extraction and execution of metadata-stored payloads.
Persistence via LaunchAgent
This approach can be paired with a LaunchAgent for persistence. A plist in “~/Library/LaunchAgents” that executes the extraction chain at user login allows the payload to run automatically.
Our initial attempt using mdls inside the LaunchAgent failed because Spotlight may not be fully initialized when LaunchAgents fire. The fix was to replace mdls with osascript calling Finder directly to read the comment:
Figure 11. Persistence via LaunchAgent and Finder metadata.
Talos confirmed this successfully executes the payload at login. It is worth noting that macOS prompts the user to approve the bash execution at login, which is a visible indicator of background activity. The plist contains no payload, only a reference to metadata, so static analysis of the LaunchAgent would not reveal the malicious content.
Lateral Tool Transfer techniques
Once attackers achieve execution, they must move their toolkit across the environment. Several native protocols were validated for tool transfer (T1570).
Standard protocols: SCP and SFTP
SCP (Secure Copy Protocol) and SFTP (SSH File Transfer Protocol) are the most straightforward methods, operating over SSH and available out-of-the-box on any macOS system with Remote Login enabled.
Figure 12. SCP file transfer syntax.Figure 13. SFTP file transfer syntax.
SMB-based transfer
Server Message Block (SMB) is a network file sharing protocol commonly associated with Windows environments, but macOS includes native support for both SMB client and server functionality. In a lateral movement context, an attacker can mount a remote SMB share and access its contents as if they were local files.
This method of setting up an SMB share on the victim requires SSH access. The following command creates a shared directory, loads the SMB daemon, and creates the share.
Figure 14. Configuring a native SMB share on macOS.
With the share created, the next step is mounting it from the attacker machine. Attempting this action with the mount command failed due to an authentication error.
Figure 15. Authentication error encountered during SMB mount.
To resolve this issue, GUI access to the victim machine was required. On the victim machine, navigate to System Settings > General > Sharing > File Sharing > Options. Located here is the option to store the user’s account password on the computer. Even though this is labeled as “Windows File Sharing”, it was required to properly authenticate the user when using the mount utility.
However, this entire GUI dependency can be avoided by using osascript to mount the share instead of mount:
Figure 16. Mounting SMB shares via osascript.
This mounts the share to “/Volumes/share” without requiring the GUI configuration step. With the share mounted, any file copied into the mount directory appears on the victim immediately.
Netcat-based transfer
nc (netcat) is a well-known general-purpose networking utility that ships with macOS. It can be utilized to open arbitrary TCP and UDP connections, listen on ports, and pass data between them.
The simplest pattern involves piping commands directly into a netcat listener. On the target, a listener is established that pipes incoming data directly to sh:
Figure 17. Netcat listener established on victim machine.
From the attacking machine, a command is then echoed into nc targeting the victim’s IP and port:
Figure 18. Command execution via Netcat (attacker side).Figure 19. Command execution via Netcat (victim side).
The attacker sends the curl google.com command over the wire, which is caught by the victim’s listener and executed by sh. The resulting output confirms successful execution on the target.
Netcat can also facilitate file transfers through several different methods. An attacker could invoke a fetch to a remote system where a script or payload is hosted, or start a simple HTTP server on their own machine to perform ad hoc tool transfer.
Figure 20. Serving files via netcat (Attacker Terminal 1).Figure 21. Initiating file transfer via Netcat (Attacker Terminal 2).
Git-based transfer
git is a version control system ubiquitous in software development. Its prevalence on developer machines and reliance on SSH as a transport make git push a practical file transfer mechanism. The technique requires initializing a repository on the target and setting receive.denyCurrentBranch updateInstead. By default, git refuses pushes to a branch that is currently checked out on the remote. This setting overrides that behavior and updates the working tree on push, landing files on disk the moment the operation completes.
First, a receiving repository is initialized on the target over SSH:
Figure 22. Initializing a Git repository on the target.
On the attacker, a local repository is created with the payload, and the remote is pointed at the target:
Figure 23. Pushing payloads to the target via Git.
After the push, “script.sh” exists on the target at “~/repos/project/script.sh”. Additional file transfers only require adding new files, committing, and pushing again. Because git operates over SSH, the transfer is encrypted and uses the same authentication established for command execution.
TFTP (Standard and unprivileged)
TFTP (Trivial File Transfer Protocol) is a lightweight, unauthenticated file transfer protocol that operates over UDP. macOS includes both a TFTP server and client. The server is not active by default but can be started through launchd.
With root access on the target, the system’s built-in TFTP plist activates the server in a single command:
Figure 24. Activating the native TFTP server.
This serves “/private/tftpboot” on the standard TFTP port (UDP 69). The TFTP system plist does not provide the -w flag to the tftpd process. Without it, the server only allows writes to files that already exist. A placeholder file must be created on the target for each file being transferred:
Figure 25. Creating a placeholder file for TFTP transfer.
From the attacker, the payload is pushed to the target:
Figure 26. Pushing payload to target via TFTP.
In a post-exploitation scenario without root access, tftpd can still be deployed by loading a user-created plist from “/tmp” on a non-standard port. This variant passes the tftpd -w flag, which allows write requests to create new files, removing the placeholder requirement.
Figure 27. Non-root TFTP server deployment.
SNMP trap-based transfer
SNMP (Simple Network Management Protocol) is used for monitoring and managing network devices. SNMP traps are unsolicited notifications sent from agents to a management station over UDP port 162. The trap payload can carry arbitrary string data under custom OIDs, which can be repurposed as a data transfer channel. macOS ships with the necessary net-snmp tools: snmptrap (“/usr/bin/snmptrap”) on the sender and snmptrapd (“/usr/sbin/snmptrapd”) on the receiver.
The approach works by Base64 encoding a file, splitting it into fixed-size chunks, and sending each chunk as an SNMP trap payload under a custom OID in the private enterprise space (“1[.]3[.]6[.]1[.]4[.]1[.]99999”). A trap handler on the receiving end reassembles the chunks and decodes the file. The protocol uses three message types: “FILENAME” signals the start of a transfer, “DATA” carries a Base64 chunk, and “END” triggers reassembly.
On the receiver, a trap handler processes incoming traps:
Figure 28. SNMP trap handler logic.
The snmptrapd daemon is then configured on the target to route all incoming traps to the handler and started in the foreground:
Figure 29. Configuring the snmptrapd daemon.
On the sender, a script handles the encoding, chunking, and transmission. Each chunk is sent as a separate SNMP trap with a short delay between sends to avoid overwhelming the receiver:
Figure 30. Script for SNMP chunking and transmission.
The sender initiates the transfer:
Figure 31. Initiating data transfer via SNMP traps.
The target receives the transfer:
Figure 32. Successful payload reassembly on target.
The matching MD5 hashes confirm the file was transferred and reassembled intact.
Socat file transfer
The socat shell established in the above “socat remote shell” section can also serve as a file transfer channel. Because the listener provides a fully interactive bash session, file contents can be written to the remote host by injecting a heredoc through the connection. This means socat alone handles both remote command execution and tool transfer without requiring any additional services or listeners.
With the socat listener running on the target, the attacker delivers a file by piping a heredoc-wrapped cat command through a socat connection:
Figure 33. File delivery via socat heredoc injection.
Detection and defensive considerations
Defending against LOTL techniques requires a shift from simple network alerts to granular process and metadata analysis.
Network indicators
Inbound TCP traffic on port 3031 (the “eppc” port) and unusual SNMP/TFTP traffic on internal LAN segments should be monitored for potential unauthorized activity.
Endpoint indicators (EVM)
Through mapping to the Open Cybersecurity Schema Framework (OCSF), an open-source effort to deliver a simplified and vendor-agnostic taxonomy for security telemetry, high-fidelity signatures for these behaviors were identified:
Suspiciouslineage: Process trees following the pattern launchd -> AppleEventsD -> Terminal -> sh/bash.
Metadatamonitoring: Frequent or unusual calls to mdls or writes to “com.apple.metadata:kMDItemFinderComment”.
Commandlineanomalies:base64 --decode commands originating from GUI applications or osascript executions containing “of machine “eppc://…”” arguments.
Native security controls and hardening recommendations
Several built-in macOS security mechanisms can be configured to mitigate the risks associated with native primitive abuse:
Transparency, Consent, and Control (TCC)restrictions: The “Automation” category within TCC is designed to regulate inter-application communication. By enforcing strict TCC policies via Mobile Device Management (MDM), unauthorized Apple Events between applications — such as a script attempting to control “Terminal.app” or “Finder” — can be blocked.
MDM Policy Enforcement: RAE and Remote Login (SSH) should be disabled by default across the fleet. These services can be managed and restricted using MDM configuration profiles (e.g., the “com.apple.RemoteAppleEvents”payload) to ensure they are only active on authorized administrative hosts.
Servicehardening: Unnecessary network-facing services, such as tftpd and snmpd, should be explicitly disabled. The removal of these launchd plists from “/System/Library/LaunchDaemons” (where permitted by System Integrity Protection) or the use of launchctl disable commands prevents their use as ad-hoc data transfer channels.
Applicationfirewalland Stealth Mode: The built-in macOS application firewall should be enabled and configured in “Stealth Mode.” This configuration ensures the device does not respond to unsolicited ICMP or connection attempts on common ports, reducing the visibility of the endpoint during internal reconnaissance.
Conclusion
The research presented in this article underscores a fundamental reality of modern endpoint security. The same primitives designed for administrative convenience and system automation are often the most potent tools in an adversary’s arsenal. By moving beyond traditional exploit-based attacks and instead LOTL, attackers can operate within the noise of legitimate system activity.
From the weaponization of the “eppc” protocol to the creative abuse of Spotlight metadata and SNMP traps, it is clear that the macOS attack surface is both vast and nuanced. These techniques demonstrate that even within a “walled garden” ecosystem, native pathways for movement and execution remain accessible to those who understand the underlying architecture.
For defenders, the primary takeaway is that visibility remains the most effective deterrent. By shifting focus from static file analysis to the monitoring of process lineage, inter-process communication, and metadata anomalies, these “bad Apples” can be identified and neutralized. As macOS continues its expansion into the enterprise core, the documentation and detection of these native techniques must remain a priority for the security community.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-04-21 10:09:402026-04-21 10:09:40Bad Apples: Weaponizing native macOS primitives for movement and execution
Editor’s note: The research is authored by Mauro Eldritch, offensive security expert and a founder of BCA LTD, a company dedicated to threat intelligence and hunting. You can find Mauro on X.
The recent wave of ClickFix attacks has introduced several new ways to compromise users, establishing itself as a technique that is likely here to stay. We have observed Lazarus Group using this method to distribute a range of malware, from well-known families to more unusual variants such as PyLangGhostRAT, a Python-based vibe-ported of the original Go version, along with other oddities.
In this article, we analyze the next stage of this campaign: a newly identified macOS malware kit that is currently being actively distributed.
Key Takeaways
What’s happening:Lazarus Group is running an active campaign using fake meetings and social engineering to steal credentials and data.
Who is targeted: Employees and business leaders communicating via Telegram and external partners.
How access is gained: Users are tricked into executing commands under the guise of fixing meeting issues.
What tools attackers are using: A new macOS malware kit, Mach-O Man, built as native binaries to target macOS environments.
What attackers are after: Credentials and active sessions that allow immediate access to business systems.
How data is exfiltrated: Sensitive data is sent via Telegram, blending into normal communication traffic.
What this leads to: Account takeover, financial loss, and exposure of business-critical data.
New Lazarus ClickFix macOS Campaign: Why Companies Are at Risk
Lazarus Group is actively running a campaign that turns routine business communication into a direct path to credential theft and data loss.
The attack targets business leaders through Telegram, often using compromised accounts of colleagues or contacts. Victims receive what appears to be a legitimate meeting invitation and are redirected to a fake collaboration platform that mimics Zoom, Microsoft Teams, or Google Meet. The scenario is familiar and urgent, which lowers suspicion and increases the likelihood of interaction.
Messages sent by Lazarus operatives. Credit: Bitso Quetzal Team
Instead of exploiting a technical vulnerability, the attackers rely on a simple instruction. The user is prompted to “fix” a connection issue by copying and executing a command. This step shifts control to the attacker without triggering many traditional security controls, because the action is performed by the user themselves.
From that moment, the operation is focused on extracting business value as quickly as possible. The attacker collects credentials, browser sessions, and system-stored secrets, including macOS Keychain data. These assets provide immediate access to corporate systems, SaaS platforms, and financial resources.
Telegram is used again as an exfiltration channel, allowing stolen data to be transferred through a legitimate service that blends into normal traffic.
By the time the activity is recognized as malicious, credentials may already be compromised and sensitive data already exfiltrated. At that point, the organization is dealing with:
Unauthorized access to business systems and accounts
Financial loss through fraudulent transactions or misuse of access
Exposure of sensitive data leading to regulatory and reputational impact
At the core of this operation is a newly identified macOS malware kit, “Mach-O Man”, discovered by the Quetzal Team. Built as a set of Go-based Mach-O binaries, it reflects a shift toward native macOS threats. The following sections break down how this kit operates across each stage of the attack chain.
Technical Analysis of the Mach-O Man Kit
The Stager
As described earlier, in this ClickFix campaign, the victim is invited to a meeting via Telegram, typically by a compromised contact sharing a link.
The full malware kit with all its components and variants
When the user visits it, they are taken to a site impersonating a legitimate meeting platform such as Zoom, Meet, or Teams. The page then displays a fake error message claiming that, to resolve the issue, the user must copy and paste a command into their terminal.
Thanks to ANY.RUN’s Interactive Sandbox, we can safely execute this command and observe the malicious behavior inside a secure macOS VM, without risk to our systems.
Fake Mach-O Man Kit apps shown inside ANY.RUN’s sandbox
Trusted by 15,000 organizations worldwide, including 74 Fortune 100 companies, ANY.RUN accelerates triage & response by enabling SOC teams to analyze URLs and files within a private, real-time virtual environment, reproducing the full attack flow across Windows, macOS, Linux, and Android.
The result is faster, more consistent decisions across the SOC, with earlier identification of threats, reduced response time, and lower risk of incidents escalating into financial and operational impact.
Close blind spots and reduce breach risks in your company. Integrate ANY.RUN’s sandbox for early threat detection.
Pasting and running the command in the terminal leads to the installation of malware. In this case, it executes teamsSDK.bin, the stager and initial component of the Mach-O Man kit.
When executed in our laboratory, we observed an interesting behavior: when run without arguments, the binary displays a usage message indicating how to activate it and revealing support for impersonating Google, Zoom, Teams, and “System”.
Fun fact: if you try to choose Google, it politely states that it is “not yet implemented”. A surprisingly polished touch.
Stager teamsSDK.bin usage
When invoked correctly, it downloads a fake macOS Application impersonating one of the previously mentioned platforms, with “System” referring to generic macOS system prompts presented to the user. To ensure execution, the malware uses macOS’ codesign utility to apply an ad-hoc signature to the application bundle, making it appear properly signed to the system.
All applications are virtually identical, differing only in minimal visual cues. They prompt the user for their password in broken English three times in a row.
Fake Teams App prompts for user credentials
The first two attempts always shake the window, indicating that the password is incorrect (even if not), while the third one disappears as if the authentication had succeeded.
Independently, at the end they all display Zoom’s logo along with a message stating that the installation was successful.
Zoom logo displayed on the fake Teams App
Running them interactively from the shell reveals errors during execution. Many interesting failures will be discussed throughout the analysis of the remaining components, suggesting that exhaustive testing was not conducted.
Most modules present faulty functions or unexpected errors
In the background, the next stage is downloaded, typically named in the format D1{??????}.bin. Some examples we were able to retrieve include D1YrHRTg.bin, D1yCPUyk.bin, and D1ozPVNG.bin. At the same time, the malware performs basic fingerprinting via sysctl queries, collecting information such as CPU details and system boot time.
Basic host fingerprinting
Let’s check the next stage.
The Profiler
This second binary, D1YrHRTg.bin (or any other variant you are able to retrieve), acts as a system profiler. It registers the host with the C2 and sends a system profile.
The first notable behavior is that, when executed without arguments, it once again displays a usage message, a rather kind gesture.
Most modules contain a usage message
This module relies on sysctl and local userland tools to build a comprehensive profile of the host, including hostname, a unique identifier, CPU type, boot time, operating system details, network configuration, running processes, and a list of browser extensions, with dedicated targeting of Brave, Vivaldi, Opera, Chrome, Firefox, and Safari.
Speed up triage & response workflows in your SOC. Validate alerts and analyze artifacts with ANY.RUN.
This information is written to a text file and sent to the C2 server.
The TXT file broadcasted to the C2 Server
As previously noted, some of these modules are faulty.
This one, in particular, exhibits a self-sabotaging behavior, occasionally entering an endless loop that repeatedly posts the system profile text file to the C2 server, exhausting system resources and making its presence quite obvious to the victim.
Repeated curl commands posting the same file
Next, a new binary called minst2.bin is retrieved from the /payload C2 endpoint, marking the beginning of the persistence stage.
The Persistence Mechanism
minst2.bin was slightly trickier to debug, as it does not come bundled with a usage helper, so I had to manually fine-tune both the number and type of arguments required. After reverse engineering how the previous stage invokes it, I found that it takes the machine UUID, a payload URL, and a filename as arguments, and proceeds to download a remote file named localencode, saving it locally as OneDrive and setting it up to run at as a startup item.
A Bash service is created for persistence
To achieve this, it creates a folder called “Antivirus Service”, where it stores this binary, and sets up a LaunchAgent, the macOS equivalent of a Windows Service, to execute it at startup. From that point on, it re-invokes the malware kit at every login.
The LaunchAgent
Moving on to the final stage, this script cleans up by deleting all ZIP files and downloaded fake applications (*.app) from the temporary directory. The parent process then proceeds to download the final binary in the kit: macrasv2.
The Stealer
Obtained from the same /payload endpoint, macrasv2 is the final stealer and the main component of the chain.
It stages all previously collected data, including, but not limited to, browser extension data, stored browser credentials and cookies (typically kept in SQLite databases), macOS Keychain entries, and other files of interest, consolidating them into a temporary directory. Since this is an empty laboratory, the number of staged files is relatively small.
Final staging directory
From there, the data is archived into a file named user_ext.zip, preparing it for exfiltration.
ZIP file ready to be exfiltrated
Exfiltration is carried out through a familiar channel, Telegram. In this case, however, the operators exposed their bot token, effectively allowing third parties to interact with the bot. This not only weakens their operational security but also simplifies reporting and potential takedown efforts.
Telegram Bot/API Key is leaked
This makes it trivial to both read the bot’s messages, send messages on its behalf, and even identify its owner.
Operator identified via leaked Bot Key
Finally, the malware invokes a self-deletion script named delete_self.sh, which simply removes itself and other components using the system’s rm command.
Self-deletion routine
With this, the full infection cycle is complete. Thanks to ANY.RUN’s macOS analysis capabilities, we were able to fully reconstruct it in record time. It is worth noting that this is a novel (previously unseen) malware, which would typically require significantly more time to disassemble and analyze using traditional methods.
Let’s now move on to the ATT&CK Matrix, followed by the IOCs and other interesting details.
Additional Observations
The malware is badly written, with certain components entering infinite loops that may expose its presence due to system resource starvation.
Operational security weaknesses were identified, such as exposed Telegram bot tokens and C2 endpoints with missing authentication.
The use of ad-hoc code signing indicates an attempt to bypass macOS execution controls without valid developer credentials.
Network traffic analysis shows that the malware primarily communicates over ports 8888 and 9999. Additionally, HTTP requests consistently use a User-Agent string associated with the Go programming language (e.g., Go-http-client), which aligns with other observed components of the toolset.
The adversary’s infrastructure exposed multiple services, including WinRM, Chrome Remote Desktop, Remote Desktop Protocol (RDP), and a replica of the C2 server running on port 110.
Reverse engineering analysis indicates that multiple components of the malware are written in Go. This is supported by the presence of Go-specific strings and referenced artifacts within the binaries, including characteristic function naming conventions, runtime structures, and the use of the standard Go HTTP client in network communications.
Defending Against Lazarus Attacks: How CISOs Can Minimize Risk
Trust-abuse phishing, exemplified by campaigns like Mach-O Man, exploits legitimate platforms to bypass conventional security measures. Attackers manipulate human psychology with urgent meeting requests or fake technical issues, tricking users into executing malicious commands or disclosing credentials.
For SOC teams, the difficulty lies in detecting these attacks early, as they often slip past signature-based defenses by leveraging trusted services and user-driven actions.
Close Detection Gaps with Stronger Cross-Platform Triage
To combat these threats, SOCs must adopt interactive sandboxing as a cornerstone of their triage process. Unlike automated solutions, ANY.RUN eliminates critical blind spots for security teams by enabling analysis of malicious files and URLs across Windows, macOS, Linux, and Android in a single interface.
ANY.RUN’s sandbox delivers fast verdicts on malicious files and URLs
Instead of juggling separate solutions for each OS, SOC teams gain a unified sandbox environment where they can manually simulate user interactions, uncover hidden attack stages, and capture behavioral IOCs, such as unusual sysctl queries in macOS or Mach-O binary execution.
For business processes, this means streamlined triage, reducing analysis time and integrating seamlessly with SIEM/SOAR for automated threat investigations.
ANY.RUN delivers full attack context (process chains, network connections, system changes), which is especially critical for companies with hybrid infrastructures (corporate Windows, macOS for developers/designers, Linux servers, and employee Android devices), where traditional sandboxes cover only part of the risk.
Reduce MTTR by 21 minutes in your SOC. Upgrade Tier 1 productivity with ANY.RUN.
When integrated into your SOC workflows, ANY.RUN’s Sandbox delivers measurable impact, enabling security teams to:
Identify Credential Exposure Earlier: Detect threats in under 60 seconds and reduce breach probability before escalation begins
Reduce MTTR: Achieve up to 21 minutes faster response time and 50% quicker IOC extraction
Detect More Relevant Threats: Identify up to 58% more threats with real-time, sandbox-verified intelligence
Minimize High-Severity Incidents: Earlier detection lowers escalation rates and limits impact on business operations
Improve SOC Efficiency Without Hiring: Increase team performance up to 3x and reduce Tier 1 workload by 20%
For businesses, this means fewer breaches, lower financial impact per incident, and more predictable security outcomes. Organizations gain control over both risk exposure and operational costs, rather than reacting after damage occurs.
About ANY.RUN
ANY.RUN helps over 15,000 organizations and 600,000 security professionals identify and understand threats before they turn into incidents.
The solutions combine interactive sandbox analysis and real-time threat intelligence into a single workflow, allowing SOC teams to analyze files and URLs, observe full attack behavior, and make faster, more accurate decisions. Instead of relying on delayed indicators or assumptions, analysts see what the threat actually does and what risk it creates for the business.
By strengthening monitoring, triage, and response, ANY.RUN enables organizations to detect more threats earlier, reduce response time, and limit the impact of credential theft, data exposure, and account compromise.
The result is a more predictable and efficient SOC, where decisions are made faster, incidents are contained earlier, and business risk is reduced.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-04-21 06:06:492026-04-21 06:06:49What the ransom note won’t say
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2026-04-18 06:06:562026-04-18 06:06:56That data breach alert might be a trap