Search:

Last Week in Security (LWiS) - 2025-04-21

CVE drama (@MITREcorp), Control Flow Hijacking w/Data Pointers (@0xLegacyy), Copilot in notepad (@zux0x3a), .NET AOT in Ghidra (@washi_dev), CSWSH in 2025 (@IncludeSecurity), 300ms to Admin (@compasssecurity), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2025-04-14 to 2025-04-21.

News

  • [PDF] Disclosure of Cyber Security Breach and Data Exfiltration through DOGE Systems and Whistleblower/Witness Intimidation - A senior DevSecOps Engineer at the National Labor Relations Board ("NLRB") details what he saw as DOGE was granted access to NLRB systems. The evidence looks damning, whomever did these actions had high privileges, was exfiltrating a lot of data, and besides disabling logging, was pretty sloppy (smash and grab vs stealth). The use of correct credentials of a DOGE account from Russia (blocked by Geo-rules) just 15 minutes after the account was created is very strange. If we assume Russia had/has an active implant that pulled the credentials from a DOGE employee that created the account or was sent the credentials, why would they attempt to use them from Russia? The mix of high-level and amateur tradecraft doesn't make sense, but it wouldn't be the first time a Russian cyber actor forgot to turn on their VPN; it does happen. For a more editorialized version of the story, see: A whistleblower's disclosure details how DOGE may have taken sensitive labor data.
  • CISA extends funding to ensure 'no lapse in critical CVE services' - MITRE, a non-profit federally funded research and development center, created and has maintained the Common Vulnerability and Exposures (CVE) database for 25 years. They sent a letter on 2025-04-15 that stated their funding would expire the next day. This is highly unusual, as government contracts not set to have their "option periods" (additional years) funded are notified well in advance. As the letter was making headlines, late the night of the 15th CISA apparently "executed the option period" (funded at least one additional year). While technically you can wait until midnight of the day the contract expires to extend it, it's highly unusual. If MITRE hadn't sent the letter that caused headlines, would the funding have come? Either way, there is now a new CVE Foundation that may be able to take over if MITRE does lose funding.
  • La Liga: Blocking of Cloudflare IPs in Spain - The Spanish La Liga football league blocked Cloudflare IPs to prevent Spanish citizen from streaming football matches. The issue is, over 20% of the internet sits behind Cloudflare, so blocking all of Cloudflare's IPs took down a good chunk of the internet for Spain during football matches. This is a good reminder of why technically competent advisors are needed for government agencies and enforcement. Cloudflare is taking legal action to stop the blocking.

Techniques and Write-ups

Tools and Exploits

  • VECTR - A service container for Mythic C2 for interacting with SRA's VECTR.
  • waiting_thread_hijacking - Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread.
  • koneko - Robust Cobalt Strike shellcode loader with multiple advanced evasion features.
  • FriendlyFireBOF - A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.
  • SourcePoint v4.0 - The popular C2 profile generator for Cobalt Strike has been updated to support the latest Cobalt Strike features.
  • bincrypter - Pack/Encrypt/Obfuscate ELF + SHELL scripts.
  • After days of struggle, my emulator now runs in the browser - 🤯 web assembly is getting wild. Source: emulator.
  • go-buena-clr - Good CLR Host with Native patchless AMSI Bypass.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • trufflehog-explorer - a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.
  • dAWShund - Putting a leash on naughty AWS permissions.
  • cloud-snitch - Easy-to-use map visualization for AWS activity, inspired by Little Snitch for macOS.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.

page 1 | older articles »