u/falconupkid

Introducing TailscaleHound: Mapping Tailscale Attack Paths in BloodHound

Introducing TailscaleHound: Mapping Tailscale Attack Paths in BloodHound

TailscaleHound: Mapping Mesh Network Attack Paths

SpecterOps has released TailscaleHound, an OpenGraph collector designed to integrate Tailscale network configurations into BloodHound.

What it does: TailscaleHound meticulously collects a wide array of Tailscale data, including users, devices, groups, tags, ACLs, grants, SSH rules, routes, app connectors, services, keys, invites, webhooks, and even hybrid Azure identity relationships. This data is then formatted for BloodHound, creating a visual graph of potential attack paths within a Tailscale-managed mesh network.

Who is it for: This tool is incredibly useful for Red Teams to identify lateral movement opportunities and exploit misconfigurations within Tailscale environments. It's equally valuable for Blue Teams and security architects seeking to understand and validate their access controls, identify excessive permissions, and harden their Tailscale network security posture.

Why it's useful: It transforms complex Tailscale access policies and network relationships into an easily digestible graph, allowing security professionals to answer critical questions like "Which users can reach this device?" or "Who can use this exit node?" This dramatically improves visibility into potential attack surfaces and helps proactive defense.

Source: https://specterops.io/blog/2026/05/21/tailscalehound/

u/falconupkid — 6 hours ago

Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor

Showboat Linux Malware Targets Middle East Telecom with Persistent Backdoor

A new modular Linux malware, dubbed Showboat, has been active since at least mid-2022, primarily targeting a telecommunications provider in the Middle East. This sophisticated post-exploitation framework is designed to provide persistent access and control over compromised Linux systems.

Technical Breakdown:

  • Target Industry: Telecommunications, specifically in the Middle East.
  • Malware Type: Post-exploitation framework.
  • Key Capabilities (TTPs):
    • Persistence/C2: Functions as a SOCKS5 proxy, enabling covert communication and tunneling.
    • Execution: Capable of spawning remote shells for command execution.
    • Data Manipulation: Facilitates file transfer (upload/download).
  • Affected Systems: Linux systems (general, specific distributions/versions not detailed in summary).

Defense: Strengthen Linux host security with advanced EDR solutions, meticulously monitor network traffic for suspicious SOCKS5 proxy connections or unusual outbound activity, and ensure robust security hygiene including regular patching and least-privilege principles.

Source: https://thehackernews.com/2026/05/showboat-linux-malware-hits-middle-east.html

u/falconupkid — 7 hours ago

Оновлений інструментарій UAC-0057: OYSTERFRESH, OYSTERSHUCK та OYSTERBLUES

CERT-UA is tracking an updated toolkit from threat actor UAC-0057, featuring new malware variants OYSTERFRESH, OYSTERSHUCK, and OYSTERBLUES. The group continues to target Ukrainian state organizations via sophisticated phishing campaigns.

Technical Breakdown:

  • Threat Actor: UAC-0057
  • Malware Families: OYSTERFRESH, OYSTERSHUCK, OYSTERBLUES (these are the identified tools used by the actor).
  • Initial Access (TTPs): Persistent spearphishing campaigns leveraging compromised accounts to send malicious emails.
  • Lure: Phishing themes involve the acquisition of certificates through a spoofed or exploited online platform, specifically mentioning "Prometheus."
  • Targets: Primarily state organizations (Ukrainian context implied by CERT-UA source).
  • Note: Specific IOCs (IPs, hashes) are not detailed in the provided summary but would be crucial for defense.

Defense: Focus on advanced email filtering, robust security awareness training for all personnel, and enforcing Multi-Factor Authentication (MFA) across all government accounts to mitigate compromised credential risks.

Source: https://cert.gov.ua/article/6315762

u/falconupkid — 7 hours ago

AI agents: The new insider threat

OWASP LLM security lead Steve Wilson has identified AI agents as the next significant insider threat.

This perspective redefines traditional insider threat models, urging security leaders to consider autonomous AI entities operating within their networks as potential vectors for data exfiltration or system compromise. CISOs and security teams will need to strategize on new monitoring, control, and governance frameworks specifically for AI agent deployments.

Key Takeaway: Organizations must expand their insider threat programs to account for malicious or misconfigured autonomous AI agents.

Source: https://www.reversinglabs.com/blog/ai-agents-new-insider-threat

u/falconupkid — 8 hours ago

Q1 2026 Threat Landscape Report: Zero-clicks, geopolitical tensions, and some wins for law enforcement

Attackers are increasingly relying on vulnerability exploitation, particularly zero-click, network-facing vulnerabilities, to gain initial access, according to the Q1 2026 Threat Landscape Report. This marks a significant shift, with exploitation now surpassing social engineering as the top initial access vector.

Technical Breakdown

  • Initial Access Vector (IAV) Shift:
    • Vulnerability exploitation now accounts for 38% of all initial access vectors, surpassing social engineering.
    • Over 50% of these exploited vulnerabilities are zero-click, network-facing – requiring no user interaction or authentication.
    • This trend suggests attackers are finding AI-enabled vulnerability exploitation more effective than traditional social engineering tactics.
  • TTPs Observed:
    • T1190: Exploit Public-Facing Application: Direct exploitation of internet-facing services, leveraging vulnerabilities that often require no user interaction.
    • T1566: Phishing (Social Engineering): While still present, its prevalence as a primary IAV has decreased compared to exploitation.

Defense

Prioritize rapid patching of internet-facing systems and enhance vulnerability management programs, especially for critical, network-accessible services susceptible to zero-click exploits.

Source: https://www.rapid7.com/blog/post/tr-q1-2026-threat-landscape-report-geopolitics-ransomware

u/falconupkid — 8 hours ago

ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories

This week's bulletin highlights a concerning shift: attackers are increasingly weaponizing trusted systems and processes rather than solely relying on outright breaches. We're seeing everything from Linux rootkits and router 0-days to AI intrusions and scam kits, but the overarching theme is the exploitation of inherent trust.

  • TTPs/Attack Vectors:

    • Credential/Token Leaks: Compromising authentication tokens.
    • Supply Chain Attacks: Injecting malicious code via "bad packages" or legitimate updates.
    • Login Trickery: Exploiting login mechanisms and trusted accounts.
    • Abuse of Trusted Infrastructure: Leveraging seemingly normal components like cloud buttons, support chats, and established applications.
    • AI Intrusions: While details are sparse in the summary, this suggests AI's role in attack or defense evasion.
  • Defense: Focus on continuous verification of "trusted" components, behavioral anomaly detection across critical systems, and robust supply chain security practices. Assume compromise of even seemingly benign pathways.

Source: https://thehackernews.com/2026/05/threatsday-bulletin-linux-rootkits.html

u/falconupkid — 8 hours ago

Police seize “First VPN” service used in ransomware, data theft attacks

Global law enforcement has successfully dismantled "First VPN," a prominent VPN service heavily used by ransomware and data theft groups to anonymize their malicious operations. This international takedown operation directly impacts the infrastructure relied upon by various threat actors.

Technical Breakdown:

  • Targeted Service: "First VPN" was identified as a critical anonymity service enabling threat actors.
  • TTPs:
    • Resource Development (TA0042): Provided anonymous infrastructure for threat actors to set up C2 servers or other malicious resources without revealing their true location.
    • Command and Control (TA0011): Facilitated secure, untraceable communication channels for ransomware and data theft operations.
    • Impact: Its use allowed attackers to obscure their identities and origins, complicating attribution and defensive efforts during active campaigns involving ransomware deployment and sensitive data exfiltration.
  • IOCs: The provided summary does not detail specific IP addresses or hashes related to the "First VPN" infrastructure or associated threat actor activities.
  • Affected Parties: Any organization previously targeted by groups leveraging "First VPN" will likely see a disruption in those specific attacker's operational capabilities.

Defense: This takedown represents a significant disruption to criminal infrastructure. While not a direct defensive action for organizations, it highlights the importance of international cooperation in dismantling the technical underpinnings of cybercrime, thereby increasing the operational cost and risk for threat actors.

Source: https://www.bleepingcomputer.com/news/security/police-seize-first-vpn-service-used-in-ransomware-data-theft-attacks/

u/falconupkid — 8 hours ago

Chinese hackers target telcos with new Linux, Windows malware

Chinese state-sponsored actors are deploying new Linux (Showboat) and Windows (JFMBackdoor) malware in a cyber-espionage campaign specifically targeting telecommunications providers.

Technical Breakdown

  • Actors: A Chinese cyber-espionage group.
  • Targets: Telecommunications providers.
  • Malware:
    • Showboat: Newly discovered Linux malware.
    • JFMBackdoor: Newly discovered Windows malware, likely functioning as a backdoor.
  • Campaign Type: Cyber-espionage, indicating a focus on data exfiltration and persistent access.
  • TTPs/IOCs: The provided summary does not detail specific IOCs (IPs, hashes) or granular TTPs (e.g., initial access vectors, persistence methods) beyond the general nature of the campaign and malware types.

Defense

Implement robust endpoint detection & response (EDR) solutions across Linux and Windows assets, enhance network traffic monitoring for anomalous behavior, and ensure timely patching of internet-facing systems.

Source: https://www.bleepingcomputer.com/news/security/chinese-hackers-target-telcos-with-new-linux-windows-malware/

u/falconupkid — 8 hours ago

Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet

A new wave of crypto drainers is leveraging Deception-as-a-Service (DaaS) platforms like Lucifer to scale wallet theft by tricking users into approving malicious transactions. These platforms automate phishing and transaction manipulation, moving beyond traditional wallet hacks.

Technical Breakdown:

  • TTPs:
    • Initial Access: Primarily through sophisticated phishing campaigns, luring users to malicious sites or dApps.
    • Execution: Tricking users into signing transactions that grant malicious smart contracts permission to transfer assets (e.g., approve, setApprovalForAll) or directly initiate transfers of tokens (ERC-20, ERC-721 NFTs) from their wallets.
    • Attack Infrastructure: Use of DaaS platforms (e.g., Lucifer DaaS) which provide pre-built phishing kits, contract interaction templates, and automated methods to manage and execute drainer campaigns across multiple blockchains.
    • Evasion: These platforms often include anti-bot features and proxy services to hide the attackers' infrastructure.
  • Affected Targets: Users interacting with decentralized applications or signing transactions without thoroughly understanding their implications.

Defense: Detection & Mitigation: Always scrutinize transaction requests and permissions. Verify the details of any transaction you are asked to sign, paying close attention to token allowances and destination addresses. Use wallet security tools that provide clear, human-readable explanations of transaction intent.

Source: https://www.bleepingcomputer.com/news/security/inside-a-crypto-drainer-how-to-spot-it-before-it-empties-your-wallet/

u/falconupkid — 8 hours ago

Secure Identity at the Edge: Akamai Partners with Auth0

Akamai and Auth0 (an Okta company) have partnered to enhance identity security at the edge.

Strategic Impact: This collaboration integrates Akamai's edge intelligence with Auth0's adaptive authentication capabilities. For security leaders, this signifies a stronger, more integrated approach to identity-based fraud prevention and user trust, leveraging the combined strengths of a major CDN/edge security provider and a leading identity platform. It aims to provide more robust protection against account takeover and other identity-related threats by making authentication smarter and closer to the user.

Key Takeaway: This partnership creates a combined solution for adaptive, edge-native identity security, consolidating efforts against fraud and improving user experience.

Source: https://www.akamai.com/blog/security/2026/may/secure-identity-edge-akamai-partners-auth0

u/falconupkid — 8 hours ago

TikTok, YouTube, and Roblox face scrutiny, but age gates won’t fix child safety

Summary: Ofcom, the UK communications regulator, has declared platforms like TikTok and YouTube "not safe enough" for children. The article highlights that merely implementing stricter age gates is an insufficient solution to the broader issue of child online safety.

Strategic Impact: This signals a heightened regulatory focus on child online safety and data protection for minors across major platforms. For CISOs and security leaders at companies operating consumer-facing platforms, this means increased scrutiny on:

  • Privacy by Design: Ensuring robust privacy controls are embedded from the ground up to protect younger users.
  • Content Moderation & Abuse Prevention: Enhancing systems to identify and mitigate harmful content or interactions affecting minors.
  • Age Verification: Moving beyond simple age gates to more sophisticated, privacy-preserving methods, or accepting that technical solutions alone won't solve systemic issues.
  • Compliance & Risk Management: Preparing for potential new regulations or enforcement actions related to children's online safety and data handling.

Key Takeaway: Regulatory bodies are pushing for more comprehensive and effective measures beyond basic age verification to protect children online, emphasizing a need for deeper platform changes.

Source: https://www.malwarebytes.com/blog/family-and-parenting/2026/05/tiktok-youtube-and-roblox-face-scrutiny-but-age-gates-wont-fix-child-safety

u/falconupkid — 10 hours ago

Microsoft Warns of Two Actively Exploited Defender Vulnerabilities

Microsoft warns of active exploitation of two critical vulnerabilities in Microsoft Defender, including a privilege escalation flaw that grants SYSTEM privileges.

Technical Breakdown

  • CVE-2026-41091: A privilege escalation flaw rated 7.8 CVSS.
    • Impact: Successful exploitation allows an attacker to gain SYSTEM privileges.
    • Nature: Described as "Improper link resolution before file access ('link following')".
  • A second, unspecified denial-of-service (DoS) vulnerability is also under active exploitation.
  • TTPs: Active exploitation observed in the wild.

Defense

Ensure Microsoft Defender is updated to the latest available versions immediately to mitigate these threats.

Source: https://thehackernews.com/2026/05/microsoft-warns-of-two-actively.html

u/falconupkid — 10 hours ago

Catch spyware in the act with Windows Webcam Monitoring

Malwarebytes has rolled out (or highlighted) a new Windows Webcam Monitoring feature. This functionality provides real-time alerts when any application attempts to access the system's webcam, giving users the immediate option to allow or block the access.

Who is it for? Primarily for Blue Teams and end-users focused on endpoint security and privacy.

Why is it useful? It's a direct countermeasure against spyware and remote access Trojans (RATs) that aim to covertly record users via their webcams. This provides an additional layer of defense and transparency, putting control directly into the user's hands to prevent unauthorized surveillance.

Source: https://www.malwarebytes.com/blog/product/2026/05/catch-spyware-in-the-act-with-windows-webcam-monitoring

u/falconupkid — 11 hours ago

When Identity is the Attack Path

A single, seemingly innocuous cached AWS access key on a Windows machine can become a critical identity-based attack path, potentially granting attackers broad access across 98% of cloud environments, even without explicit misconfigurations or policy violations.

Technical Breakdown

  • TTPs:
    • Initial Access / Discovery: Attackers gain access to a Windows endpoint where an AWS user has previously logged in.
    • Credential Access: Discovery and extraction of automatically cached AWS access keys (a standard behavior).
    • Privilege Escalation / Lateral Movement: Using the extracted, legitimate AWS keys to authenticate to AWS resources, leading to potential privilege escalation and lateral movement across a significant portion (up to 98%) of the cloud environment. This bypasses traditional perimeter defenses by leveraging valid identity.
  • Affected Systems: Windows machines where AWS users frequently log in, storing access keys locally.
  • IOCs: Not applicable in this conceptual scenario, as it describes a vulnerability in identity management rather than a specific attack campaign with unique artifacts.

Defense

Implement Least Privilege principles for all AWS identities, enforce MFA everywhere, utilize short-lived credentials, and deploy robust Endpoint Detection and Response (EDR) solutions to prevent credential dumping. Focus on securing the identity lifecycle from endpoint to cloud.

Source: https://thehackernews.com/2026/05/when-identity-is-attack-path.html

u/falconupkid — 11 hours ago

Flipper One project needs community help to build open Linux platform

Flipper Devices, known for the popular Flipper Zero pentesting tool, is launching the Flipper One project. This initiative aims to build an open Linux platform specifically for connected devices, and they're calling on the community for help.

What does it do? Flipper One is envisioned as a versatile, open-source Linux environment tailored for embedded systems and connected devices. It's designed to be a flexible base for a wide range of applications, leveraging the community's expertise for development.

Who is it for? This project is for Red Teamers, hardware hackers, IoT security researchers, and embedded system developers who want an open, modifiable platform for experimentation, security testing, and custom tool creation on connected devices.

Why is it useful? By creating an open Linux platform, Flipper One has the potential to become a powerful, community-driven toolkit for analyzing, interacting with, and potentially exploiting IoT and other connected hardware. It offers a foundation for developing specialized security tools and conducting deep dives into device functionalities, similar to how the Flipper Zero has enabled portable pentesting. This approach fosters innovation and collaboration in the hardware security space.

Source: https://www.bleepingcomputer.com/news/hardware/flipper-one-project-needs-community-help-to-build-open-linux-platform/

u/falconupkid — 11 hours ago

One Man, One AI, One Fake Persona: Inside the 5-Year Influence and Fraud ‘Patriot Bait’ Campaign

A solo Russian-speaking threat actor has been running a sophisticated 5-year "Patriot Bait" influence campaign via Telegram, with plans to automate credential theft and cryptocurrency fraud using AI starting September 2025, primarily targeting American audiences.

Technical Breakdown:

  • Threat Actor: Solo, Russian-speaking individual.
  • Campaign Duration: Active for 5 years, leveraging a dedicated Telegram channel.
  • Influence Tactics: "Patriot Bait" content designed to appeal to specific American audiences, indicative of information operations.
  • Future TTPs (Planned from Sep 2025):
    • AI Automation: Utilizing AI to scale content generation, credential theft attempts, and cryptocurrency fraud schemes.
    • Credential Theft: Automated acquisition of user credentials.
    • Cryptocurrency Fraud: Automated engagement in schemes designed to defraud users of cryptocurrency.
  • Target Audience: Primarily American users.
  • Note: Specific IOCs (IPs, hashes, domains) were not detailed in the summary but are likely present in the full report.

Defense: Emphasize user education on disinformation and social engineering tactics, promote robust multi-factor authentication, and advise caution with unsolicited cryptocurrency opportunities.

Source: https://www.trendmicro.com/en_us/research/26/e/inside-the-influence-and-fraud-patriot-bait-campaign.html

u/falconupkid — 13 hours ago

9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros

A nine-year-old privilege escalation flaw in the Linux kernel (CVE-2026-46333) has been disclosed, allowing unprivileged local users to achieve root command execution and sensitive file disclosure on major distributions.

Technical Breakdown

  • CVE: CVE-2026-46333 (CVSS score: 5.5)
  • Vulnerability Type: Improper privilege management within the Linux kernel.
  • Impact: An unprivileged local user can exploit this to:
    • Disclose sensitive files.
    • Execute arbitrary commands as root.
  • Affected Systems: Default installations of several major Linux distributions are impacted.
  • TTPs (MITRE-aligned):
    • TA0004 - Privilege Escalation: Specifically, T1068 - Exploitation for Privilege Escalation leading to root access.
    • TA0009 - Collection: Implied by the ability to "disclose sensitive files," potentially related to T1005 - Data from Local System.

Defense

Prioritize and apply available kernel patches from your distribution vendors immediately to address this local privilege escalation vulnerability.

Source: https://thehackernews.com/2026/05/9-year-old-linux-kernel-flaw-enables.html

u/falconupkid — 13 hours ago

Fragnesia CVE-2026-46300: Linux Kernel LPE Vulnerability Explained

Fragnesia (CVE-2026-46300): Critical Linux Kernel LPE

Fragnesia (CVE-2026-46300) is a high-severity (CVSS 7.8) Linux kernel Local Privilege Escalation (LPE) vulnerability affecting the XFRM ESP-in-TCP subsystem, impacting nearly all Linux distributions. This flaw allows local unprivileged attackers to reliably write arbitrary data into the kernel's page cache of read-only files.

Technical Breakdown:

  • Vulnerability Type: Logic flaw in the XFRM ESP-in-TCP subsystem leading to LPE.
  • Root Cause: The socket buffer (skbuff) fails to recognize shared fragment pages during memory coalescing. This causes the kernel to perform in-place AES-GCM decryption directly on file page cache entries.
  • TTPs (MITRE ATT&CK):
    • TA0004 - Privilege Escalation: Exploiting a kernel vulnerability to gain higher privileges.
    • T1068 - Exploitation for Privilege Escalation: Local unprivileged attackers can achieve arbitrary byte writes into the page cache of read-only files.
    • Execution: By repeatedly triggering the flaw, an attacker can inject a 192-byte ELF stub into the page cache of a setuid-root binary (e.g., /usr/bin/sudo), leading to root access without race conditions.
  • Affected Systems: Nearly all Linux distributions.
  • IOCs: Not specified in the provided summary.

Defense:

  • Apply kernel updates as soon as they become available from your distribution vendor to remediate this vulnerability.

Source: https://www.picussecurity.com/resource/blog/fragnesia-cve-2026-46300-linux-kernel-lpe-vulnerability-explained

reddit.com
u/falconupkid — 14 hours ago

Ransom & Dark Web Issues Week 3, May 2026

ASEC's latest threat intel update highlights significant dark web activity, including a new Nova Ransomware attack, data leak claims by CoinbaseCartel, and TeamPCP selling stolen source code.

Technical Breakdown

  • Threats Identified:
    • Nova Ransomware: A South Korean Cosmetics and Chemical Firm was impacted by a Nova ransomware attack. This group typically encrypts systems and demands payment for decryption keys.
    • CoinbaseCartel: This group claimed a data leak from an Open-Source Visualization Platform, indicating successful data exfiltration.
    • TeamPCP: This actor allegedly leaked and is selling source code stolen from a Major Developer Platform, posing a significant risk for future supply chain attacks or exploitation.
  • Observed TTPs: Ransomware deployment (encryption, extortion), data exfiltration, and the sale/publication of stolen data and intellectual property on dark web markets.
  • Affected Entities: A South Korean Cosmetics and Chemical Firm, an Open-Source Visualization Platform, and a Major Developer Platform.
  • IOCs: Specific IPs, hashes, or C2 domains were not detailed in this summary.

Defense

Prioritize robust data loss prevention (DLP) measures, implement strong access controls including MFA, ensure immutable backups, and maintain continuous dark web monitoring for early warning of compromised assets.

Source: https://asec.ahnlab.com/en/93803/

reddit.com
u/falconupkid — 14 hours ago

Webworm: New burrowing techniques

ESET researchers report on the Webworm APT group's latest additions to their arsenal, revealing new "burrowing techniques" and tools that demonstrate an evolution in their attack methodologies.

Technical Breakdown: While specific TTPs (MITRE), IOCs, and affected versions are detailed in the full ESET report, the key takeaway is Webworm's adoption of novel methods for persistent access and evasion. This includes:

  • New Tools & Techniques: Integration of sophisticated new tools for system compromise, likely focused on initial access, privilege escalation, and lateral movement.
  • Burrowing Techniques: These refer to advanced persistence mechanisms designed to deeply embed within compromised networks, significantly increasing the challenge for detection and removal.

Defense: Prioritize advanced endpoint detection and response (EDR) solutions, implement rigorous network segmentation, and engage in proactive threat hunting to identify and disrupt these evolving APT tactics.

Source: https://www.welivesecurity.com/en/eset-research/webworm-new-burrowing-techniques/

u/falconupkid — 14 hours ago