BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
To Defeat Cybercriminals, Understand How They Think
/in General NewsGetting inside the mind of a threat actor can help security pros understand how they operate and what they’re looking for — in essence, what makes a soft target.
darkreading – Read More
Man Accused of SQL Injection Hacking Gets 69-Month Prison Sentence
/in General NewsVitalii Antonenko has been sentenced to 69 months in prison for hacking, but he is being released as he has been detained since 2019.
The post Man Accused of SQL Injection Hacking Gets 69-Month Prison Sentence appeared first on SecurityWeek.
SecurityWeek – Read More
Writer’s new AI model aims to fix the ‘sameness problem’ in generative content
/in General NewsWriter AI launches Palmyra Creative, a $1.9B enterprise AI solution that breaks free from generic AI content, offering businesses unique creative outputs at one-sixth the training cost of competitors.Read More
Security News | VentureBeat – Read More
Cybersecurity Marketing Predictions for 2025 Business Growth
/in General NewsBrand awareness is vital in cybersecurity because buyers—often risk-averse professionals like CISOs, IT managers, and procurement teams—rely on trusted brands when researching tools to protect their organizations.
The post Cybersecurity Marketing Predictions for 2025 Business Growth appeared first on SecurityWeek.
SecurityWeek – Read More
Organizations Warned of Rise in Okta Support Phishing Attacks
/in General NewsOkta has warned customers that it has seen an increase in phishing attacks impersonating its support team.
The post Organizations Warned of Rise in Okta Support Phishing Attacks appeared first on SecurityWeek.
SecurityWeek – Read More
Stop Calling Online Scams ‘Pig Butchering,’ Interpol Warns
/in General NewsExperts say the catchall term for online fraud furthers harm against victims and could dissuade people from reporting attempts to bilk them out of their money.
Security Latest – Read More
FBI Warns of HiatusRAT Attacks on Cameras, DVR Systems
/in General NewsFBI says HiatusRAT’s operators were seen scanning for web cameras and DVR systems affected by years-old vulnerabilities.
The post FBI Warns of HiatusRAT Attacks on Cameras, DVR Systems appeared first on SecurityWeek.
SecurityWeek – Read More
Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection
/in General NewsBogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker.
“Written in Go, CoinLurker employs cutting-edge obfuscation and anti-analysis techniques, making it a highly effective tool in modern cyber attacks,” Morphisec researcher Nadav Lorber said in a technical report published Monday.
The attacks make use of fake update alerts that employ
The Hacker News – Read More
CISA Warns of Exploited Adobe ColdFusion, Windows Vulnerabilities
/in General NewsCISA has warned organizations that two vulnerabilities affecting Adobe ColdFusion and Windows have been exploited in the wild.
The post CISA Warns of Exploited Adobe ColdFusion, Windows Vulnerabilities appeared first on SecurityWeek.
SecurityWeek – Read More
A Nifty Initial Access Payload
/in General NewsRed Teaming engagements are “realistic” attack simulations designed to test the security posture of an organization and its Blue Team. This term is used in many different ways, so if you’re not sure where to draw the line, Michael Schneier’s latest blog post provides a good comparison of different types of assessment.
Anyway, when doing attack simulations or red teaming engagements, we often want to run code on a victim machine of our customer. Due to the presence of an Endpoint Detection and Response (EDR) software, this is not an easy task. However, a combination of some well-known techniques will usually do the trick for what we call initial access.
But what do we do when the known techniques fail and we cannot use known initial access methods? In that case, we need to develop a custom payload. Since it’s nice to run our code in a signed process to better blend in, we then check the installed software.
A wild screenshot tool appears
In a recent engagement, we found an outdated screenshot tool running on startup on our victim machine that allowed users to install plugins. Double-clicking on a file with a custom extension would extract its (zipped) contents and the software would load the plugin DLL. No mark-of-the-web, no execution restrictions, etc. Nice.
First attempt: Replace the plugin DLL
Can we just make a fake plugin with our malicious DLL? No. Plugins contain a manifest and the plugin DLL has to be signed by the vendor of the software, so it’s secure, right?
Second attempt: Replace the dependency DLL
We were lucky enough to find an existing plugin that was signed by the vendor, which in turn would load an unsigned DLL. My first thought is, let’s build a dumb payload with a dllmain, replace the unsigned DLL, win.
It didn’t work, the plugin couldn’t be installed.
This unsigned DLL is a managed (.NET ) DLL, which means that when it is loaded, the CLR will check its manifest before anything else. Hm, how do we execute code then? A couple of ideas came to mind.
Third attempt: Decompile, add code, recompile
It’s .NET, right? Simple: decompile, add code recompile. That might work, but when we decompile we notice something annoying. The DLL is used for interoperation with COM and contains only interfaces. Interfaces cannot contain code.
Fourth attempt: Module initializer
Can we not run static code in C#? The answer is that we can, it’s called a module initializer. Let’s create a class and a method that will execute our shellcode:
Using https://github.com/kzu/InjectModuleInitializer, we inject the above code into the module initializer.
The plugin is installed successfully but the code is not executed. When we use the functionality provided by the plugin (i.e. some parts of the .NET module are actually used), our code (and our shellcode) is executed. This is fine, but not perfect, we would prefer to have the code run on the first click.
Fifth attempt: PE native entry point
Googling into how to execute code when the DLL is loaded by the CLR led us to this great blog post: https://blog.washi.dev/posts/entry-points/.
Adding a PE native entry point to our DLL could do the trick. It would run as soon as the DLL is loaded, which as we can see using Process Monitor happens when the plugin is installed.
Using the author’s AsmResolver tool, and building on top of the example from the blog post, we inject code into the DLL and put its address in the PE native entrypoint.
Result, it works, our (shell)code runs on plugin installation!
Conclusion
This (rather long) journey allowed us to have a simple payload, that we could deliver via a web page (using HTML smuggling) and which, when double-clicked, would run our shellcode in the signed process of the screenshot tool. Nifty!
Here are our key takeaways:
Compass Security Blog – Read More