Search:

Last Week in Security (LWiS) - 2025-10-27

DumpGuard (@bytewreck), GCC + VSCode (@_winterknife_), COM Research (@bohops), Gitlab to Cloud pivot (@0xC0rnbread), function peekaboo (@saab_sec), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2025-10-20 to 2025-10-27.

News

  • Ex-L3Harris executive accused of selling trade secrets to Russia - $1.3 million USD in 3 years for selling trade secrets to Russia seems like a bad return on the risk. The executive was the former general manager of the company L3Harris formed after buying Azimuth Security, the company famous for "assisting" the FBI in gaining access to an iPhone in the San Bernardino case.
  • WSUS attacks hit 'multiple' orgs as Google and other infosec sleuths ring Redmond’s alarm bell - Normally vulnerabilities don't make the news section, but this one seems pretty bad.
  • The WhatsApp $1 Million Hack Mystery — What You Need To Know - When zero days are this valuable, will governments let the researchers disclose them on their own terms? Or is this a case of over-hyped "low-risk bugs?"
  • A Solution to the CIA’s Kryptos Code Is Found after 35 Years - It wasn't decrypted, but found in an archive at the Smithsonian. There's a relevant cybersecurity lesson to be learned here: Sometimes the solution/vulnerability is more easily found in a way the creator/maintainer/sysadmin didn't expect and/or involved a otherwise irrelevant 3rd party.
  • K000154696: F5 Security Incident - "A highly sophisticated nation-state threat actor maintained long-term, persistent access to, and downloaded files from, certain F5 systems." Looks like the nation-state threat actor stole, "source code and information about undisclosed vulnerabilities." Not great to find out that a nation-state has been chilling in the network of your firewall provider. F5 says there is no evidence of modification to the software supply chain, but they also didn't have evidence of a long-term breach until August 2025 so...

Techniques and Write-ups

Tools and Exploits

  • HawkTrace CVE-2025-59287 - WSUS exploit proof of concept. Blog post
  • Honeypot-for-CVE-2025-59287-WSUS - Defensive PoC decoy for CVE-2025-59287 (WSUS) - emulates WSUS endpoints, captures request bodies and metadata, saves evidence for forensic analysis, and provides validation harness and detection rules.
  • Find-WSUS - Helps defenders find their WSUS configurations in the wake of CVE-2025-59287.
  • DumpGuard - Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems. Full details: Catching Credential Guard Off Guard.
  • rpc2efs - Unauthenticated start EFS service on remote Windows host (make PetitPotam great again).
  • printerbugnew - The DCERPC only printerbug.py version.
  • Apollo - A fork of the Mythic Apollo agent with support for the HTTPx C2 malleable profile.
  • oswatcher - "Git for Operating Systems" - Track OS evolution, browse any version's filesystem, diff between any OS snapshot (release or update).
  • WILDBEAST - Windows capability development using GCC and GNU Make.
  • gopengraph - A Go library to create BloodHound OpenGraphs easily.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • slice - SAST + LLM Interprocedural Context Extractor.
  • raink - Bleeding-edge fork of raink 🩸 Use LLMs for document ranking.
  • Wyrm - The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.