Advertisement · 728 × 90

Posts by Philippe Lagadec

Preview
Supply-chain attack using invisible code hits GitHub and other repositories Unicode that's invisible to the human eye was largely abandoned—until attackers took notice.

Researchers found 151 malicious packages uploaded to repositories like GitHub, npm, and Open VSX that hide harmful code using invisible Unicode characters, making the malware undetectable in normal editors and code reviews.

via Ars Technica

arstechnica.com/security/202...

1 month ago 2 2 0 0

"Zombie ZIP" CVE-2026-0866 is not really a vulnerability which can evade AV engines, because the resulting ZIP file cannot be opened by normal tools, it's malformed.
It's more like a steganography/obfuscation trick, you need malicious code already running to extract the payload.

1 month ago 4 1 1 0

CERTFR-2026-AVI-0241: Vulnérabilité dans ClamAV
https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0241/

1 month ago 3 3 0 0
Post image

Another antivirus 🛡️, another unfulfilled promise 😣. @kaluche_ turns Avira's protection into a privilege escalation playground. This time: 3 LPE vectors 🆙 via symlink abuse (CVE-2026-27748, CVE-2026-27750) and unsafe deserialization (CVE-2026-27749).

Find out more: blog.quarkslab.com/avira-deseri...

1 month ago 4 1 1 0

Honestly, AI slop PRs are becoming increasingly draining and demoralizing for #Godot maintainers.

If you want to help, more funding so we can pay more maintainers to deal with the slop (on top of everything we do already) is the only viable solution I can think of:

fund.godotengine.org

2 months ago 1989 884 53 44
Post image

How can we detect malicious documents exploiting CVE-2026-21509, the recent 0-day vulnerability in MS Office ?
I designed a YARA rule for this, which detects all the malicious files that have been reported.
To get the YARA rule and all the explanations: decalage.info/CVE-2026-215...

2 months ago 2 1 0 0
Malware Analysis - Malicious MS Office files without Macros
Malware Analysis - Malicious MS Office files without Macros YouTube video by MalwareAnalysisForHedgehogs

🦔 📹 New Video: Can office files be malicious without Macros?

➡️ VSTO Add-Ins
➡️ External Templates
➡️ Checklist for Office analysis
#MalwareAnalysisForHedgehogs
www.youtube.com/watch?v=RtHH...

2 months ago 6 4 2 1
formats_vs_techniques oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging. - decalage2/oletools

Nice examples! I also maintain a list of the various attack techniques vs. file formats in the oletools wiki:
github.com/decalage2/ol...

2 months ago 2 0 1 0
Hash All The Things / Get All The Sig(s) - Introducing Sighthouse for Seamless Function Detection The aim of this talk is to address a common challenge faced by reverse engineers: distinguishing relevant software from third-party libraries within firmware or programs. This task often wastes time a...

reverse-2026.sessionize.com/session/1082... with @mad5quirrel.bsky.social

3 months ago 3 2 0 1
Preview
Blind trust: what is hidden behind the process of creating your PDF file? Every day, thousands of web services generate PDF (Portable Document Format) files—bills, contracts, reports. This step is often treated as a technical routine, “just convert the HTML,” but in practic...

Blind trust: what is hidden behind the process of creating your PDF file?

swarm.ptsecurity.com/blind-trust-...

#vulnerability #cve #exploitation #infosec

3 months ago 8 5 0 0
Advertisement
Preview
GitHub - decoderloop/rust-malware-gallery: A collection of malware families and malware samples which use the Rust programming language. A collection of malware families and malware samples which use the Rust programming language. - decoderloop/rust-malware-gallery

🦀 Looking for Rust malware samples to practice analyzing? Our Rust Malware Sample Gallery just received a major update, with 20 new families added! github.com/decoderloop/...

#rust #rustlang #malware #infosec #ReverseEngineering #MalwareAnalysis #reversing

4 months ago 4 3 1 0
Preview
MacOS Infection Vector: Using AppleScripts to bypass Gatekeeper A look at how threat actors are abusing AppleScript .scpt files to deliver macOS malware, from fake documents to browser update lures, and how these scripts ...

MacOS Infection Vector: Using AppleScripts to bypass Gatekeeper:

pberba.github.io/security/202...

#macOS #infosec #applescript #cybersecurity #exploitation #hacking

4 months ago 4 1 0 0
Preview
Virus Bulletin

Videos and papers from this year's @virusbtn.bsky.social in Berlin are now available online. Amazing conference and looking forward to the next one: www.youtube.com/@virusbtn

4 months ago 9 4 1 0

There's some really big caveats to this. A thread.

5 months ago 156 74 6 2

Using .LNK files as lolbins

www.hexacorn.com/blog/2025/10...

6 months ago 8 4 1 0
hack.lu 2025 Hack.lu (and CTI summit) is an open convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society. It’s the ...

At hack.lu I gave a presentation about "How to better identify (weaponized) file formats":

- Why do we need to identify file formats accurately?
- Why can the current tools (libmagic, magika) sometimes be bypassed?
- How can we do better?

You can now see it here: youtu.be/Qp5GDh2sj6A

#HackLu

5 months ago 5 3 0 0
Infosec/hacking videos recorded by Cooper (@Ministraitor) Infosec/hacking videos recorded by Cooper (@Ministraitor)

I've put together a website which indexes all the recordings my rigs have made thus-far as well as those currently planned:
administraitor.video
(minimalist - I'm a mid-/backend dev! 😋)

1 year ago 16 9 0 0
How To Better Identify (Weaponized) File Formats With Ftguess - Philippe Lagadec
How To Better Identify (Weaponized) File Formats With Ftguess - Philippe Lagadec YouTube video by Cooper

How To Better Identify (Weaponized) File Formats With Ftguess - Philippe Lagadec
youtu.be/Qp5GDh2sj6A
#HackLu

5 months ago 2 2 0 0
Advertisement
Preview
hack.lu 2025 Hack.lu (and CTI summit) is an open convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society. It’s the ...

This week I'm going to hack.lu, to give a presentation about file format identification:
Why do we need to identify file formats accurately?
Why can the current tools sometimes be bypassed, or make mistakes?
How can we do better?
2025.hack.lu/agenda/

Send me a DM if you'd like to meet there.

6 months ago 1 0 0 0
Post image

I'm happy to share that LIEF 0.17.0 is out: lief.re/blog/2025-09...

7 months ago 14 5 0 0

#ESETresearch has discovered #HybridPetya ransomware on VirusTotal: a UEFI-compatible copycat of the infamous Petya/NotPetya malware. HybridPetya is capable of bypassing UEFI Secure Boot on outdated systems. www.welivesecurity.com/en/eset-rese... 1/8

7 months ago 11 11 1 0
Post image

#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/7

7 months ago 64 44 2 14
How FIDO2 works, a technical deep dive – Michael Waterman

This explanation of Passkeys and FIDO2 is really good 👍

michaelwaterman.nl/2025/04/02/h...

11 months ago 11 4 0 0
Preview
Malwoverview: First response tool for threat hunting - Help Net Security Malwoverview is an open-source threat hunting tool designed for the initial triage of malware samples, URLs, IP addresses, domains, malware families,

Even though I've been away from the field for years, it's great to see that a simple tool that I initially launched in 2018 and with great collaborators (Artur Marzano, Corey Forman and Christian Clauss) has been used by so many professionals.

www.helpnetsecurity.com/2025/03/26/m...

#malware

1 year ago 3 1 0 0
Preview
Celui qui n’aurait pas dû installer l’antivirus Kaspersky Où l’on découvre la carrière brisée d’un fonctionnaire à cause d’un penchant, au choix, pour des versions crackées de Windows ou pour l'antivirus du célèbre ingénieur russe.

Merci @gabrielthierry.bsky.social de revenir sur l'histoire incroyable des #ShadowBrokers en plusieurs parties #MustRead

Partie 1

open.substack.com/pub/pwned/p/...

Partie 2

open.substack.com/pub/pwned/p/...

Partie 3

open.substack.com/pub/pwned/p/...

1 year ago 19 12 1 0
MalDoc in PDF - Detection bypass by embedding a malicious Word file into a PDF file – - JPCERT/CC Eyes JPCERT/CC has confirmed that a new technique was used in an attack that occurred in July, which bypasses detection by embedding a malicious Word file into a PDF file. This blog article calls the techn...

Do you know examples of polyglot files that have been used in real-life to hide malware from detection/analysis tools?

There is at least this PDF/MHT: blogs.jpcert.or.jp/en/2023/08/m...

Do you know other real malware cases?

1 year ago 4 2 0 0
Video

I made a Doom source port that runs within a PDF file.

PDFs support Javascript, so Emscripten is used to compile Doom to asm.js, which is then run within the PDF engine. Input/output is done by manipulating text input fields.

doompdf.pages.dev/doom.pdf

github.com/ading2210/do...

1 year ago 4110 1922 71 220
Post image

The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:

exploitreversing.com/2025/01/08/m...

Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).

#malware

1 year ago 5 3 0 0
Advertisement
Preview
Forget PSEXEC: DCOM Upload & Execute Backdoor Join Deep Instinct Security Researcher Eliran Nissan as he exposes a powerful new DCOM lateral movement attack that remotely writes custom payloads to create an embedded backdoor.

New DCOM lateral movement technique discovered that bypasses traditional defenses. Unlike previous attacks relying on IDispatch interfaces, this method exploits undocumented COM interfaces within MSI, specifically targeting IMsiServer and IMsiCustomAction interfaces. 1/7

1 year ago 21 17 2 0