Last Week in Security (LWiS) - 2026-02-16
嗯,用户让我用中文总结一下这篇文章,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。直接写描述就行。 首先,我需要通读整篇文章,看看主要讲了什么。这篇文章看起来是关于过去一周的网络安全新闻、技术、工具和漏洞的汇总。里面提到了很多具体内容,比如SharePoint枚举、LNK文件的漏洞、AMD驱动的本地权限提升,还有POST请求创建超级管理员账户等等。 然后,还有一些新闻部分,比如新的Android防盗功能、纽约州关于3D打印机的新法案、iOS和iPadOS的安全更新,以及Notepad的Markdown功能中的远程代码执行漏洞。此外,还有一些工具和漏洞利用的介绍,比如lnk-it-up项目、PassLLM密码猜测AI工具等等。 用户的要求是总结在一百个字以内,所以需要抓住主要点。可能包括提到的技术漏洞、工具以及安全事件。同时要简洁明了,不需要太详细的解释。 我应该先列出几个关键点:SharePoint枚举、LNK文件漏洞、AMD驱动漏洞、POST创建超级管理员、安全更新(如iOS)、工具(如lnk-it-up)等。然后把这些点整合成一个连贯的句子。 最后,确保语言简洁,不超过一百个字,并且直接描述内容,不使用开头语。 </think> 文章汇总了近期网络安全领域的新闻与技术动态,包括SharePoint枚举漏洞、LNK文件攻击、“0days”利用、AMD驱动本地权限提升等技术细节;涉及Android防盗功能更新、纽约州3D打印机法案及iOS安全补丁等新闻;并介绍了多种工具与 exploits 如lnk-it-up、PassLLM及CobaltStrike-Linux-Beacon等。 2026-2-17 10:8:14 Author: blog.badsectorlabs.com(查看原文) 阅读量:0 收藏

SharePoint enumeration (@matthiasdeeg), LNK "0days" (@Wietze), AMD driver LPE (@Bad_Jubies), POSTing to superadmin (@XeEaton), and more!

Last Week in Security is a summary of the interesting cybersecurity news, techniques, tools and exploits from the past week. This post covers 2026-02-09 to 2026-02-16.

News

  • New Android Theft Protection Feature Updates: Smarter, Stronger - New improvements to anti-theft including detecting if a phone has been grabbed while unlocked as part of a "snatch-and-run." I've witnessed two "roadmen" on ebikes snatch a phone from someone's hands on the sidewalk in London. It's gotten so bad there is a Mind the Grab campaign on the sidewalks.
  • Senate Bill S9005 - The US state of New York is considering requiring every 3D printer sold in the state to be "capable of ensuring a three-dimensional printer will not proceed to print any print job unless the underlying three-dimensional printing file has been evaluated by a firearms blueprint detection algorithm and determined not to be a printing file that would produce a firearm or illegal firearm parts." Besides the impossibility of a "firearms blueprint detection algorithm," when did legislating the tool become the solution? Is New York also going to do the same for lathes, table saws, or injection molds?
  • About the security content of iOS 26.3 and iPadOS 26.3 - dyld is the one to read: "Impact: An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report." Reported by Google's Threat Analysis Group (TAG); sounds like they found a whole exploit chain in the wild. Great work TAG! Update those iPhones and Macs.
  • Cyber Model Arena - A new benchmark with deterministic scoring (vs LLM-as-a-judge).
  • The Israeli Spyware Firm That Accidentally Just Exposed Itself - Massive OPSEC fail from the Paragon Solutions general counsel, who uploaded a photo of herself standing in front of a live spyware control panel that shows a target phone number from Czechia.
  • Notepad's new Markdown powers served with a side of remote code execution - This one got a lot of hype but it does require a user to click a link inside a document. UNC paths also apparently work 🤦‍♂️.
  • Ring and Flock Cancel Partnership - "We determined the planned Flock Safety integration would require significantly more time and resources than anticipated." Or the backlash from the public actually worked to change course here?

Techniques and Write-ups

Tools and Exploits

  • PhantomSec | Advanced Offensive Capabilities Automated - EvadeX Sponsored - EvadeX is an evasion-as-a-service platform for red teams and pentesters who want modern, continuously-updated evasive tradecraft without turning every engagement into an R&D project. Generate highly customizable, low-signature payloads through a simple web workflow so you can tune to the target and stay focused on the engagement. Trusted by teams from small consultancies to the Fortune 10. Get callbacks past EDR today!
  • lnk-it-up - Project for generating and identifying deceptive LNK files.
  • aid - A tool for detecting invisible Unicode characters in files, designed to identify potential ASCII smuggling attempts, hidden data encoding, and suspicious Unicode usage patterns.
  • AMD_uProf - Exploit code for CVE-2025-61969, incorrect permission assignment in AMD µProf may allow a local user-privileged attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.
  • sandboxec - A lightweight command sandbox for Linux, secure-by-default, built on Landlock.
  • PassLLM - World's most accurate password guessing AI tool. A PyTorch implementation of PassLLM (USENIX 2025) that leverages PII and LoRA fine-tuning to outperform existing tools by over 45% on consumer hardware.
  • aznet - The standard Go net.Conn interface using Azure Storage services as the transport layer.
  • reflektor is a Go library and CLI for loading shared libraries from bytes and invoking exported functions.
  • Adaptix-StealthPalace - Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration.
  • CobaltStrike-Linux-Beacon - Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons.

New to Me and Miscellaneous

This section is for news, techniques, write-ups, tools, and off-topic items that weren't released last week but are new to me. Perhaps you missed them too!

  • labca - A private Certificate Authority for internal (lab) use, based on the open source ACME Automated Certificate Management Environment implementation from Let's Encrypt (tm).
  • BusterCall - "Bypassing" HVCI via donor PFN swaps to modify read-only code pages. Call chained kernel functions (kCET and SLAT support), modify read-only code pages, and more.
  • nova-proximity - Nova-Proximity is a MCP and Agent Skills security scanner powered with NOVA.
  • cua-kit - Tools for attacking Computer Use Agents.
  • [X] Something Big Is Happening - Are we in the February 2020 before COVID stage of AI where a few vocal outcasts claiming massive change is coming while the world generally ignores them? With the last batch of models I am starting to believe the outcasts more and more.
  • breachpool - Predict the next ransomware target based on wisdom of the crowd.

Techniques, tools, and exploits linked in this post are not reviewed for quality or safety. Do your own research and testing.


文章来源: https://blog.badsectorlabs.com/last-week-in-security-lwis-2026-02-16.html
如有侵权请联系:admin#unsafe.sh