This case is also a milestone for us at Huntress: it’s our first time reserving and publishing a CVE since being approved as a CVE Naming Authority (CNA).
Proud to have gone from spotting real-world exploitation → engaging the vendor → to publishing a CVE for the community.
10.10.2025 02:22
👍 2
🔁 0
💬 0
📌 0
Until a patch is released, administrators should immediately apply the workaround detailed in our post:
10.10.2025 02:22
👍 0
🔁 0
💬 1
📌 0
In observed attacks, threat actors leveraged the flaw to read sensitive files—including Web.config—and extract the application’s machine key. That access enabled further exploitation, including potential remote code execution.
10.10.2025 02:22
👍 0
🔁 0
💬 1
📌 0
Great job @jaiminton.com, @re.wtf, and James Northey
10.10.2025 01:53
👍 2
🔁 0
💬 0
📌 0
4⃣ By repurposing a legitimate monitoring tool, the actor gained persistent access and a stable C2 channel. The Nezha agent was then used to deploy the final payload: a variant of Ghost RAT, a backdoor long associated with China-nexus threat groups.
10.10.2025 01:53
👍 0
🔁 0
💬 1
📌 0
3⃣ From there, the actor used the AntSword management tool to interact with their web shell. This is a common TTP, but what came next was new to us. They used AntSword to download and install the Nezha agent, an open-source server monitoring tool, onto the victim.
10.10.2025 01:53
👍 0
🔁 0
💬 1
📌 0
2⃣ The initial access was creative. The actor exploited a misconfigured, public-facing phpMyAdmin panel. They then used a log poisoning technique to write a one-liner PHP web shell (China Chopper) to disk, bypassing authentication and gaining initial command execution.
10.10.2025 01:53
👍 0
🔁 0
💬 1
📌 0
spongebob squarepants is sitting at a table with a cup of coffee in a diner .
ALT: spongebob squarepants is sitting at a table with a cup of coffee in a diner .
Realizing the software getting exploited is owned by the same parent company who had a different app getting mass exploited in recent years.
22.08.2025 17:44
👍 1
🔁 0
💬 0
📌 0
We have to detect the latest malware! Anomaly Detection! AI? We could look for single character EXEs?
The gift that keeps on giving.
15.07.2025 19:24
👍 1
🔁 0
💬 1
📌 0
Inside the BlueNoroff Web3 macOS Intrusion Analysis | Huntress
Learn how DPRK's BlueNoroff group executed a Web3 macOS intrusion. Explore the attack chain, malware, and techniques in our detailed technical report.
Mac's don't get viruses, right? 🍏
Deepfake Zoom calls. AppleScript lures. Rosetta 2 abuse.
Plenty of custom malware: Nim backdoor, Go infostealer, Obj-C keylogger, and more!
Amazing write-up by @re.wtf , @stuartjash.bsky.social and Jonathan Semon 🔥
🔗 www.huntress.com/blog/inside-...
18.06.2025 21:13
👍 4
🔁 0
💬 0
📌 1
Huntress SIEM Door Rattling Door Rattlers Detection Initial Access Brute Force
As more companies deploy the Huntress SIEM, we've enjoyed finding the "Door Rattlers"🚪
We see an attacker failing to log in across a number of environments and then eventually succeeding in 1 organization.
Stopping attacks at initial access ❤️
22.05.2025 00:48
👍 2
🔁 0
💬 0
📌 0
I hate comcast.
26.04.2025 23:18
👍 0
🔁 0
💬 0
📌 0
Huntress has observed in-the-wild exploitation of CVE-2025-30406, a critical vulnerability in the Gladinet CentreStack enterprise file-sharing platform.
14.04.2025 00:53
👍 5
🔁 3
💬 1
📌 0
All of these advances in AI and yet I still can't pass over a 1 page document and get a companion slide deck that doesn't look insane 🤦
07.04.2025 14:32
👍 1
🔁 0
💬 0
📌 0
I’m right there with you! Simplicity is a cheat code.
31.03.2025 23:49
👍 0
🔁 0
💬 0
📌 0
Why are most "work management" tools still worse than a Google Sheet?
31.03.2025 15:22
👍 1
🔁 0
💬 1
📌 0
Tradecraft Tuesday | The Most Boring (Not Really) Tradecraft Tuesday Ever
YouTube video by Huntress
Want some entertainment? Our Tradecraft Tuesday show is LIVE right now: www.youtube.com/watch?v=5_H3...
Come listen to @antonlovesdnb.bsky.social and Dray Agha discuss tradecraft we're seeing in the wild.
11.03.2025 17:07
👍 2
🔁 0
💬 0
📌 0
"Outsized value" would have been a better choice of words.
10.03.2025 17:50
👍 2
🔁 0
💬 0
📌 0
It pains me when organizations take their limited security budgets and get tricked into buying products that don't lead to exponential value.
Heck these days, lots of VPN and Firewall products are the direct source of business ending intrusions.
10.03.2025 17:43
👍 0
🔁 0
💬 1
📌 0
netscan.exe, psexec.exe, mstsc.exe, netsh.exe, reg.exe
03.03.2025 21:10
👍 1
🔁 0
💬 0
📌 0
The Threat Actor Profile Guide for CTI Analysts
Threat actor profiles are made for a range of reasons. An example trigger for creating a new profile can include after an incident, e.g., a...
ICYMI: In July 2023, Curated Intel members shared a brand new resource for the community called 'The Threat Actor Profile Guide for CTI Analysts'.
The Threat Actor Profile Guide for CTI Analysts (curatedintel.org)
08.08.2023 11:22
👍 7
🔁 9
💬 0
📌 0
Attackers love taking over M365 identities 😬 In the past ~60 days, Huntress has tracked phishing pages used to steal M365 sessions. Seeing `.com` isn't surprising but having `.online` in second place caught my eye 👀
Interested in Adversary in the Middle attacks? www.huntress.com/blog/unmaski...
25.02.2025 13:43
👍 2
🔁 0
💬 0
📌 0
When the SOC sees an RDP login and the source IP is a datacenter.
15.02.2025 00:07
👍 2
🔁 0
💬 0
📌 0
BSidesNYC 2024 - When Apps Attack: Hunting Traitorware and Rogue Microsoft 365 Apps at Scale
YouTube video by ISOC LIVE
8/ Want more? Check out HuskyHacks (Matt Kiely) and Christina Parry's talk from @bsidesnyc.org www.youtube.com/watch?v=XSzf...
13.02.2025 22:06
👍 0
🔁 0
💬 0
📌 0
BSidesNYC 2024 - When Apps Attack: Hunting Traitorware and Rogue Microsoft 365 Apps at Scale
YouTube video by ISOC LIVE
9/ Want more? Check out HuskyHacks (Matt Kiely) and Christina Parry's talk from @bsidesnyc.org
www.youtube.com/watch?v=XSzf...
13.02.2025 21:37
👍 0
🔁 0
💬 0
📌 0
7/ Big picture: OAuth abuse is growing, and security teams need to adapt. Attackers aren't breaking in anymore—they’re logging in and staying in via OAuth apps.
13.02.2025 21:37
👍 0
🔁 0
💬 1
📌 0
GitHub - HuskyHacks/cazadora: Simple hunting script for suspicious M365 OAuth Apps
Simple hunting script for suspicious M365 OAuth Apps - HuskyHacks/cazadora
6/ What can defenders do?
✔️ Review existing OAuth applications in your org
✔️ Limit app permissions to least privilege
✔️ Monitor for unusual OAuth grants in logs
✔️ Disable unused or risky third-party integrations
HuskyHacks released an open source tool to help with this:
github.com/HuskyHacks/c...
13.02.2025 21:37
👍 0
🔁 0
💬 1
📌 0