Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover

Multiple critical security flaws have been disclosed in the Judge0 open-source online code execution system that could be exploited to obtain code execution on the target system. The three flaws, all critical in nature, allow an “adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine,” Australian cybersecurity […]

How to Analyze Malware’s Network Traffic in A Sandbox

Malware analysis encompasses a broad range of activities, including examining the malware’s network traffic. To be effective at it, it’s crucial to understand the common challenges and how to overcome them. Here are three prevalent issues you may encounter and the tools you’ll need to address them. Decrypting HTTPS traffic Hypertext Transfer Protocol Secure (HTTPS), […]

LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique

The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique that leverages the mathematical principle of trigonometry to evade detection and exfiltrate valuable information from infected hosts. The method is designed to “delay detonation of the sample until human mouse activity is detected,” Outpost24 security researcher Alberto Marín said in […]

Critical vulnerability with CVSS score of 10.0 in vm2, the most popular javascript sandbox library, with over 17.5 million downloads monthly

Researchers from Oxeye identified a critical vm2 vulnerability (CVE-2022-36067) that has the highest CVSS score of 10.0. R&D executives, Application security engineers, and security experts must make sure they rapidly repair the vm2 sandbox if they utilize it in their apps due to the new flaw known as SandBreak. The most widely used Javascript sandbox […]

A critical vulnerability in vm2 Allow a Remote Attacker to Escape The Sandbox

Vm2, a JavaScript sandbox package that receives more than 16 million downloads each month, provides the synchronous execution of untrusted code within a single process. Security researchers at Oxeye found CVE-2022-36067 in August 2022, a major vulnerability in vm2 with a CVSS score of 10 that should notify all vm2 users due to its potential […]

Microsoft Details App Sandbox Escape Bug Impacting Apple iOS, iPadOS, macOS Devices

Microsoft on Wednesday shed light on a now patched security vulnerability affecting Apple’s operating systems that, if successfully exploited, could allow attackers to escalate device privileges and deploy malware. “An attacker could take advantage of this sandbox escape vulnerability to gain elevated privileges on the affected device or execute malicious commands like installing additional payloads,” […]

Researchers Takeover Unpatched 3rd-Party Antivirus Sandboxes via VirusTotal

Security researchers have disclosed a security issue that could have allowed attackers to weaponize the VirusTotal platform as a conduit to achieve remote code execution (RCE) on unpatched third-party sandboxing machines employed antivirus engines. The flaw, now patched, made it possible to “execute commands remotely within [through] VirusTotal platform and gain access to its various […]

How to Build a Custom Malware Analysis Sandbox

Before hunting malware, every researcher needs to find a system where to analyze it. There are several ways to do it: build your own environment or use third-party solutions. Today we will walk through all the steps of creating a custom malware sandbox where you can perform a proper analysis without infecting your computer. And […]

Information disclosure vulnerability in FortiSandbox, FortiWeb and FortiADC: Patch immediately

Information security specialists reported the finding of a critical information disclosure vulnerability in multiple Fortinet products, including FortiSandbox, FortiWeb and FortiADC. Tracked as CVE-2021-3259, the flaw exists due to missing cryptographic steps in the function that encrypts users’ LDAP and RADIUS credentials. Malicious hackers in possession of the password store would be able to compromise […]

How to open unknown files that have malware in Windows 10 with Sandbox

According to experts in security audits, from the May update of 2019 Windows Sandbox is available for Windows 10 system administrators. This tool provides an isolated environment of the main system installation to run unknown or unreliable source software. Windows Sandbox works in a similar way to a virtual machine, although it offers security and […]

Windows Built-in Antivirus Gets Secure Sandbox Mode – Turn It ON

Microsoft Windows built-in anti-malware tool, Windows Defender, has become the very first antivirus software to have the ability to run inside a sandbox environment. Sandboxing is a process that runs an application in a safe environment isolated from the rest of the operating system and applications on a computer. So that if a sandboxed application […]

WINDOWS ZERO-DAY BY SANDBOXESCAPER

Sandboxescaper has shown an new flaw in Windows that make all users vulnerable. Till now Microsoft has not address this issue to the windows users or has make any security patches for this vulnerability.   This flaw can be used to exploit by a hacker to compromise the vulnerable system. The researchers shared that this […]

EMOTET Malware Hijacking the Windows API & Evade the Sandbox Analysis

A wide Spread EMOTET malware emerging again with new stealthy capabilities to hijack the Windows API and evade the sandbox detection which also gives more pain for Malware analysis. Previous future called RunPE that is used for hiding malware into the Legitimate process to evade the security scanners and inject its code into windows executable process. In […]

New EMOTET Hijacks a Windows API, Evades Sandbox and Analysis

We discussed the re-emergence of banking malware EMOTET in September and how it has adopted a wider scope since it wasn’t picky about the industries it attacks. We recently discovered that EMOTET has a new iteration (detected as TSPY_EMOTET.SMD10) with a few changes in its usual behavior and new routines that allow it to elude sandbox and […]

Sandboxing support has been added to Firefox for Linux

The Firefox sandboxing innovation confines the browser from the operating system in a way to block web attacks from using a vulnerability in the browser engine and its logical functions to attack the underlying OS, place malware on the filesystem, or remove local files. Chrome has regularly run inside a sandbox. Initially, Firefox ran only […]

New Banking Trojan IcedID Evade Sandboxes and Performing Web Injection Attacks

A New Banking Trojan dubbed IcedID discovered that capable of performing some dangerous web-based injection attacks also it has some very modern sophisticated Zeus Trojan capabilities. This dangerous trojan targeting banks, payment card providers, mobile services providers, payroll, webmail and e-commerce sites in the U.S and  U.K based Bank sectors. These Trojan futures also have borrowed […]

MorphAES – IDPS & SandBox & AntiVirus STEALTH KILLER

DPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world’s first polymorphic shellcode engine, with metamorphic properties and capability to bypass sandboxes, which makes it undetectable for an IDPS, it’s cross-platform as well and library-independent. Properties: Polymorphism (AES encryption) Metamorphism (logic and constants changing) Platform independent (Linux/BSD/Windows) IDPS stealthing (the total number of possible […]

Explaining Cuckoo Sandbox and Preparing for Installation

Cuckoo Sandbox is a malware analysis system used to identify any malicious intent in provided files. By offering you a detailed report outlining all of the specifics of the target, you can easily decipher whether the file is safe to operate/execute. Commonly, you will figure this out by studying how the file responded when triggered […]