Max Rogers's Avatar

Max Rogers

@maxrogers5.com

Sr. Director of SOC at Huntress. Ex-Mandiant/FireEye. Bringing security to the Fortune 5,000,000.

197
Followers
291
Following
34
Posts
30.12.2024
Joined
Posts Following

Latest posts by Max Rogers @maxrogers5.com

This case is also a milestone for us at Huntress: it’s our first time reserving and publishing a CVE since being approved as a CVE Naming Authority (CNA).

Proud to have gone from spotting real-world exploitation → engaging the vendor → to publishing a CVE for the community.

10.10.2025 02:22 👍 2 🔁 0 💬 0 📌 0
Post image

Until a patch is released, administrators should immediately apply the workaround detailed in our post:

10.10.2025 02:22 👍 0 🔁 0 💬 1 📌 0

In observed attacks, threat actors leveraged the flaw to read sensitive files—including Web.config—and extract the application’s machine key. That access enabled further exploitation, including potential remote code execution.

10.10.2025 02:22 👍 0 🔁 0 💬 1 📌 0
Preview
Active Exploitation of Gladinet CentreStack and Triofox Local File Inclusion Flaw | Huntress Huntress has observed in-the-wild exploitation of a Local File Inclusion vulnerability in Gladinet CentreStack and Triofox products.

🚨 @HuntressLabs identified active exploitation of a Local File Inclusion vulnerability affecting Gladinet CentreStack and Triofox systems.

A temporary workaround is available while a patch is in development:

www.huntress.com/blog/gladine...

10.10.2025 02:22 👍 1 🔁 0 💬 1 📌 0

Great job @jaiminton.com, @re.wtf, and James Northey

10.10.2025 01:53 👍 2 🔁 0 💬 0 📌 0

4⃣ By repurposing a legitimate monitoring tool, the actor gained persistent access and a stable C2 channel. The Nezha agent was then used to deploy the final payload: a variant of Ghost RAT, a backdoor long associated with China-nexus threat groups.

10.10.2025 01:53 👍 0 🔁 0 💬 1 📌 0

3⃣ From there, the actor used the AntSword management tool to interact with their web shell. This is a common TTP, but what came next was new to us. They used AntSword to download and install the Nezha agent, an open-source server monitoring tool, onto the victim.

10.10.2025 01:53 👍 0 🔁 0 💬 1 📌 0
Post image

2⃣ The initial access was creative. The actor exploited a misconfigured, public-facing phpMyAdmin panel. They then used a log poisoning technique to write a one-liner PHP web shell (China Chopper) to disk, bypassing authentication and gaining initial command execution.

10.10.2025 01:53 👍 0 🔁 0 💬 1 📌 0
Preview
The Crown Prince, Nezha: A New Tool Favored by China-Nexus Threat Actors | Huntress Beginning in mid-2025, Huntress discovered a new tool being used to facilitate webserver intrusions known as Nezha, which up until now hasn’t been publicly reported on. This was used in tandem with ot...

1⃣ The Huntress team uncovered a campaign by a likely China-nexus threat actor. The most novel finding is use of a publicly available tool called Nezha as a post-exploitation C2 agent. This is the first public reporting of the tool I've seen.

www.huntress.com/blog/nezha-c...

10.10.2025 01:53 👍 2 🔁 0 💬 1 📌 1
Preview
spongebob squarepants is sitting at a table with a cup of coffee in a diner . ALT: spongebob squarepants is sitting at a table with a cup of coffee in a diner .

Realizing the software getting exploited is owned by the same parent company who had a different app getting mass exploited in recent years.

22.08.2025 17:44 👍 1 🔁 0 💬 0 📌 0
We have to detect the latest malware! Anomaly Detection! AI? We could look for single character EXEs?

We have to detect the latest malware! Anomaly Detection! AI? We could look for single character EXEs?

The gift that keeps on giving.

15.07.2025 19:24 👍 1 🔁 0 💬 1 📌 0
Preview
Inside the BlueNoroff Web3 macOS Intrusion Analysis | Huntress Learn how DPRK's BlueNoroff group executed a Web3 macOS intrusion. Explore the attack chain, malware, and techniques in our detailed technical report.

Mac's don't get viruses, right? 🍏

Deepfake Zoom calls. AppleScript lures. Rosetta 2 abuse.

Plenty of custom malware: Nim backdoor, Go infostealer, Obj-C keylogger, and more!

Amazing write-up by @re.wtf , @stuartjash.bsky.social and Jonathan Semon 🔥

🔗 www.huntress.com/blog/inside-...

18.06.2025 21:13 👍 4 🔁 0 💬 0 📌 1
Huntress SIEM Door Rattling Door Rattlers Detection Initial Access Brute Force

Huntress SIEM Door Rattling Door Rattlers Detection Initial Access Brute Force

As more companies deploy the Huntress SIEM, we've enjoyed finding the "Door Rattlers"🚪

We see an attacker failing to log in across a number of environments and then eventually succeeding in 1 organization.

Stopping attacks at initial access ❤️

22.05.2025 00:48 👍 2 🔁 0 💬 0 📌 0

I hate comcast.

26.04.2025 23:18 👍 0 🔁 0 💬 0 📌 0

Huntress has observed in-the-wild exploitation of CVE-2025-30406, a critical vulnerability in the Gladinet CentreStack enterprise file-sharing platform.

14.04.2025 00:53 👍 5 🔁 3 💬 1 📌 0

All of these advances in AI and yet I still can't pass over a 1 page document and get a companion slide deck that doesn't look insane 🤦

07.04.2025 14:32 👍 1 🔁 0 💬 0 📌 0

I’m right there with you! Simplicity is a cheat code.

31.03.2025 23:49 👍 0 🔁 0 💬 0 📌 0
Preview
Fake Zoom Ends in BlackSuit Ransomware Key Takeaways The threat actor gained initial access by a fake Zoom installer that used d3f@ckloader and IDAT loader to drop SectopRAT. After nine days of dwell time, the SectopRAT malware dropped …

🌟New report out today!🌟

Fake Zoom Ends in BlackSuit Ransomware

Analysis and reporting completed by @pigerlin, UC1 and @Miixxedup

Audio: Available on Spotify, Apple, YouTube and more!

thedfirreport.com/2025/03/31/f...

31.03.2025 11:38 👍 7 🔁 3 💬 1 📌 0

Why are most "work management" tools still worse than a Google Sheet?

31.03.2025 15:22 👍 1 🔁 0 💬 1 📌 0
Tradecraft Tuesday | The Most Boring (Not Really) Tradecraft Tuesday Ever
Tradecraft Tuesday | The Most Boring (Not Really) Tradecraft Tuesday Ever YouTube video by Huntress

Want some entertainment? Our Tradecraft Tuesday show is LIVE right now: www.youtube.com/watch?v=5_H3...

Come listen to @antonlovesdnb.bsky.social and Dray Agha discuss tradecraft we're seeing in the wild.

11.03.2025 17:07 👍 2 🔁 0 💬 0 📌 0

"Outsized value" would have been a better choice of words.

10.03.2025 17:50 👍 2 🔁 0 💬 0 📌 0

It pains me when organizations take their limited security budgets and get tricked into buying products that don't lead to exponential value.

Heck these days, lots of VPN and Firewall products are the direct source of business ending intrusions.

10.03.2025 17:43 👍 0 🔁 0 💬 1 📌 0
Post image

netscan.exe, psexec.exe, mstsc.exe, netsh.exe, reg.exe

03.03.2025 21:10 👍 1 🔁 0 💬 0 📌 0
Preview
The Threat Actor Profile Guide for CTI Analysts Threat actor profiles are made for a range of reasons. An example trigger for creating  a new profile can include after an incident, e.g., a...

ICYMI: In July 2023, Curated Intel members shared a brand new resource for the community called 'The Threat Actor Profile Guide for CTI Analysts'.

The Threat Actor Profile Guide for CTI Analysts (curatedintel.org)

08.08.2023 11:22 👍 7 🔁 9 💬 0 📌 0
Post image

Attackers love taking over M365 identities 😬 In the past ~60 days, Huntress has tracked phishing pages used to steal M365 sessions. Seeing `.com` isn't surprising but having `.online` in second place caught my eye 👀

Interested in Adversary in the Middle attacks? www.huntress.com/blog/unmaski...

25.02.2025 13:43 👍 2 🔁 0 💬 0 📌 0
Post image

When the SOC sees an RDP login and the source IP is a datacenter.

15.02.2025 00:07 👍 2 🔁 0 💬 0 📌 0
BSidesNYC 2024 - When Apps Attack: Hunting Traitorware and Rogue Microsoft 365 Apps at Scale
BSidesNYC 2024 - When Apps Attack: Hunting Traitorware and Rogue Microsoft 365 Apps at Scale YouTube video by ISOC LIVE

8/ Want more? Check out HuskyHacks (Matt Kiely) and Christina Parry's talk from @bsidesnyc.org www.youtube.com/watch?v=XSzf...

13.02.2025 22:06 👍 0 🔁 0 💬 0 📌 0
BSidesNYC 2024 - When Apps Attack: Hunting Traitorware and Rogue Microsoft 365 Apps at Scale
BSidesNYC 2024 - When Apps Attack: Hunting Traitorware and Rogue Microsoft 365 Apps at Scale YouTube video by ISOC LIVE

9/ Want more? Check out HuskyHacks (Matt Kiely) and Christina Parry's talk from @bsidesnyc.org

www.youtube.com/watch?v=XSzf...

13.02.2025 21:37 👍 0 🔁 0 💬 0 📌 0

7/ Big picture: OAuth abuse is growing, and security teams need to adapt. Attackers aren't breaking in anymore—they’re logging in and staying in via OAuth apps.

13.02.2025 21:37 👍 0 🔁 0 💬 1 📌 0
Preview
GitHub - HuskyHacks/cazadora: Simple hunting script for suspicious M365 OAuth Apps Simple hunting script for suspicious M365 OAuth Apps - HuskyHacks/cazadora

6/ What can defenders do?
✔️ Review existing OAuth applications in your org
✔️ Limit app permissions to least privilege
✔️ Monitor for unusual OAuth grants in logs
✔️ Disable unused or risky third-party integrations

HuskyHacks released an open source tool to help with this:
github.com/HuskyHacks/c...

13.02.2025 21:37 👍 0 🔁 0 💬 1 📌 0