Posts

EtherRAT Campaign Spoofs GitHub Tools to Infect Admins

Image
  Trusted Tools Turned Threats: Inside the EtherRAT GitHub Spoofing Campaign As an independent cybersecurity blogger and part-time penetration tester, this campaign highlights one of the most dangerous trends in modern attacks: Attackers are no longer breaking into systems. They are inviting themselves in through trust. The EtherRAT campaign takes advantage of something every IT professional relies on daily, trusted administrative tools and GitHub repositories. By weaponizing familiarity, attackers are achieving stealth, persistence, and scale. What Happened: EtherRAT Distributed via Spoofed GitHub Repositories Researchers uncovered a sophisticated campaign distributing EtherRAT malware through fake GitHub repositories designed to mimic legitimate administrative tools. The attack leverages: SEO poisoning to rank malicious repositories in search results Fake GitHub “facade” repositories with professional-looking content Hidden secondary repositories delivering the act...

Vect 2.0 Ransomware Destroys Files Permanently

Image
  Destruction Over Encryption: Inside the Vect 2.0 Ransomware Threat As an independent cybersecurity blogger and part-time penetration tester, this latest ransomware development stands out for one critical reason, it breaks the fundamental assumption that ransomware is reversible. Vect 2.0 is not just encrypting files. In many cases, it is destroying them. That changes everything. For years, ransomware response strategies have relied on one key factor, recovery is possible. With Vect 2.0, that assumption no longer holds. What Happened: Vect 2.0 Acts More Like a Wiper Than Ransomware Security researchers have identified that Vect 2.0 ransomware: Targets Windows, Linux, and ESXi systems Encrypts some files while permanently destroying others Fails to properly preserve decryption keys during execution Leaves victims unable to recover data even after paying Critically, files above a certain size threshold are not recoverable at all, making the attack functionally destructive r...

Codesys Backdoor Attack Threatens Industrial Systems

Image
Signed, Trusted, Exploited: Inside the Codesys Backdoor Playbook A trusted industrial automation platform turned silent entry point, the latest findings around Codesys backdoored applications reveal a dangerous evolution in cyber attacks. As an independent blogger and part-time penetration tester, this shift stands out immediately. Attackers are no longer just breaching systems, they are embedding themselves into the operational logic that drives real-world processes. This is not about malware sitting on endpoints. This is about manipulating the very instructions that control industrial environments, while everything appears legitimate. Attack Vector: Weaponised Industrial Control Applications Threat actors are modifying Codesys applications directly, inserting malicious logic into otherwise legitimate automation workflows. These backdoored applications allow attackers to: Maintain persistent access within PLC environments Execute remote commands without triggering traditional alerts B...

Signed, Trusted, Exploited: Inside the ScreenConnect Breach Playbook

Signed, Trusted, Exploited: Inside the ScreenConnect Breach Playbook A trusted remote access tool turned Trojan: today’s news reveals how attackers have hijacked ScreenConnect (now ConnectWise Control), weaponizing its legitimacy to bypass defenses and sustain access. As an independent blogger and penetration tester , this twist-from trusted utility to clandestine threat vector-highlights an urgent shift: defenders must now regard established tools as potential weapons, and our penetration testing methodologies must evolve accordingly. Attack Vector: Weaponized RMM Software Threat actors are misusing ScreenConnect installers-often digitally signed and trusted-to establish persistent access, using methods like Authenticode stuffing to embed malicious configuration while preserving legitimate signatures. Technical Abuse: CHAINVERB Downloader In several campaigns, the CHAINVERB backdoor leverages signed ScreenConnect binaries. It hides C2 instructions inside certificate fields, en...

Firewall Fails at Its Own Front Door: IPFire Admin Panel Compromised

Firewall Fails at Its Own Front Door: IPFire Admin Panel Compromised A firewall’s job is to keep attackers out. But what if the attacker walks in through the front door-the admin panel? A critical command injection flaw in IPFire , a widely trusted open-source firewall, allows authenticated users to run system commands via a legacy CGI script. No buffer overflows, no zero-days-just weak input sanitization in the user management form.This breach isn’t theoretical-it’s a wake-up call. Admin interfaces have become the new front lines of exploitation , especially as AI-driven cyberattacks scale and automate input fuzzing, credential testing, and persistence tactics. As an independent blogger and penetration tester, this event demands urgent attention. If a firewall-the very tool meant to defend networks-is exploitable from its own control panel, every red team must adjust its scope, simulation methods, and assumptions. Because in today's threat landscape, the firewall is not the finis...

From RAR to Root: Inside the New Linux Malware Hiding in Archive Filenames

From RAR to Root: Inside the New Linux Malware Hiding in Archive Filenames Security researchers have identified a new Linux-based malware campaign that hides its payload inside a RAR archive filename . The malicious name contains a Base64-encoded string that, when listed by an insecure shell script, is piped directly into Bash. This tactic bypasses traditional file-based scanning. The executed payload retrieves a Linux ELF binary from a remote server and deploys the VShell backdoor into memory. VShell supports reverse shells, file access, process control, encrypted command-and-control, and targets a wide range of architectures including x86_64, i386, i686, armv7l, and aarch64. For penetration testers,check how automation scripts handle filenames. Simulate is or for  loops with unquoted filenames to detect injection risks. Prevent execution by ensuring proper filename sanitation. Limit or block RAR archive handling on production Linux systems unless verified by sandbox or AV t...

No Click. No Warning. Just Stolen Credentials: The Windows Explorer Shortcut Attack

 No Click. No Warning. Just Stolen Credentials: The Windows Explorer Shortcut Attack It starts with a glance. Not a download. Not a double-click. Just opening a folder in Windows Explorer is now enough to silently leak your NTLM credentials. As an independent blogger and part-time penetration tester, I’ve seen my share of stealthy exploits-but CVE‑2025‑50154 feels different. It’s invisible. It’s zero-click. And it’s back with a vengeance. Security researchers have uncovered a critical Windows vulnerability that exposes NTLMv2‑SSP hashes without phishing, malware, or any user interaction . All it takes is a simple Ink shortcut file pointing to a remote icon. No warning. No prompt. Even more alarming- this flaw bypasses Microsoft’s previous patch for CVE‑2025‑24054 , proving that even visual elements in the UI can act as silent backdoors. It’s time to question what we trust in the Windows environment-and re-evaluate how we pen test for it. 2. Why This Threat Redefines Pen Testin...