Last Week in Security (LWiS) - 2025-10-27
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求是直接写文章描述,不需要特定的开头。 首先,我看看文章的内容。这篇文章是关于过去一周的网络安全新闻、技术、工具和漏洞的总结。时间范围是从2025年10月20日到10月27日。 新闻部分提到了前L3Harris高管被指控向俄罗斯出售商业机密,WSUS攻击影响多个组织,WhatsApp百万美元漏洞事件,CIA密码被发现,以及F5安全事件。这些都是重要的新闻点。 技术与工具部分包括了Tradecraft Garden的更新、COM研究、GitLab攻击、函数peekaboo、LLM在漏洞研究中的应用、Windows ARM64内部知识、图像缓存下载恶意软件、Kerberoasting风险、蓝牙栈攻击、BitLocker保护、AI浏览器漏洞等。 工具和漏洞部分提到了HawkTrace CVE-2025-59287的WSUS漏洞利用,防御性PoC诱饵,Find-WSUS工具,DumpGuard提取NTLMv1哈希,rpc2efs启动EFS服务,打印机bug新版本,Apollo代理,oswatcher跟踪操作系统演变,WILDBEAST使用GCC开发Windows功能等。 还有一些新发现和杂项内容,如slice SAST+LLM上下文提取器、raink文档排名工具和Wyrm红队框架。 现在需要将这些内容浓缩到100字以内。重点应该放在主要新闻事件和技术亮点上。例如:L3Harris高管泄密案、WSUS攻击影响广泛、WhatsApp零日漏洞价值高、F5被国家支持的威胁入侵导致源代码泄露。技术方面可以提到COM研究和GitLab云跳跃攻击。工具方面提到DumpGuard提取NTLMv1哈希和HawkTrace WSUS PoC工具。 综合这些要点后,确保内容简洁明了,并且不超过字数限制。 </think> 文章总结了2025年10月20日至10月27日的网络安全动态,包括前L3Harris高管被指控向俄罗斯出售商业机密、WSUS攻击影响多个组织、WhatsApp百万美元漏洞事件、CIA密码被发现以及F5安全事件等新闻;介绍了COM研究与GitLab云跳跃攻击等技术;并发布了DumpGuard提取NTLMv1哈希及HawkTrace WSUS PoC工具等安全工具与资源。 2025-10-28 03:59:0 Author: blog.badsectorlabs.com(查看原文) 阅读量:19 收藏

DumpGuard (@bytewreck), GCC + VSCode (@_winterknife_), COM Research (@bohops), Gitlab to Cloud pivot (@0xC0rnbread), function peekaboo (@saab_sec), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2025-10-20 to 2025-10-27.

News

  • Ex-L3Harris executive accused of selling trade secrets to Russia - $1.3 million USD in 3 years for selling trade secrets to Russia seems like a bad return on the risk. The executive was the former general manager of the company L3Harris formed after buying Azimuth Security, the company famous for "assisting" the FBI in gaining access to an iPhone in the San Bernardino case.
  • WSUS attacks hit 'multiple' orgs as Google and other infosec sleuths ring Redmond’s alarm bell - Normally vulnerabilities don't make the news section, but this one seems pretty bad.
  • The WhatsApp $1 Million Hack Mystery — What You Need To Know - When zero days are this valuable, will governments let the researchers disclose them on their own terms? Or is this a case of over-hyped "low-risk bugs?"
  • A Solution to the CIA’s Kryptos Code Is Found after 35 Years - It wasn't decrypted, but found in an archive at the Smithsonian. There's a relevant cybersecurity lesson to be learned here: Sometimes the solution/vulnerability is more easily found in a way the creator/maintainer/sysadmin didn't expect and/or involved a otherwise irrelevant 3rd party.
  • K000154696: F5 Security Incident - "A highly sophisticated nation-state threat actor maintained long-term, persistent access to, and downloaded files from, certain F5 systems." Looks like the nation-state threat actor stole, "source code and information about undisclosed vulnerabilities." Not great to find out that a nation-state has been chilling in the network of your firewall provider. F5 says there is no evidence of modification to the software supply chain, but they also didn't have evidence of a long-term breach until August 2025 so...

Techniques and Write-ups

Tools and Exploits

  • HawkTrace CVE-2025-59287 - WSUS exploit proof of concept. Blog post
  • Honeypot-for-CVE-2025-59287-WSUS - Defensive PoC decoy for CVE-2025-59287 (WSUS) - emulates WSUS endpoints, captures request bodies and metadata, saves evidence for forensic analysis, and provides validation harness and detection rules.
  • Find-WSUS - Helps defenders find their WSUS configurations in the wake of CVE-2025-59287.
  • DumpGuard - Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems. Full details: Catching Credential Guard Off Guard.
  • rpc2efs - Unauthenticated start EFS service on remote Windows host (make PetitPotam great again).
  • printerbugnew - The DCERPC only printerbug.py version.
  • Apollo - A fork of the Mythic Apollo agent with support for the HTTPx C2 malleable profile.
  • oswatcher - "Git for Operating Systems" - Track OS evolution, browse any version's filesystem, diff between any OS snapshot (release or update).
  • WILDBEAST - Windows capability development using GCC and GNU Make.
  • gopengraph - A Go library to create BloodHound OpenGraphs easily.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • slice - SAST + LLM Interprocedural Context Extractor.
  • raink - Bleeding-edge fork of raink 🩸 Use LLMs for document ranking.
  • Wyrm - The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.


文章来源: https://blog.badsectorlabs.com/last-week-in-security-lwis-2025-10-27.html
如有侵权请联系:admin#unsafe.sh