Blog Posts

RSS

ClearFake and the Evolution of Browser-Native C2

How ClearFake turns JavaScript into a browser-resident implant with blockchain-backed indirection.

Abusing Microsoft ClickOnce as an Initial Access Primitive

How ClickOnce deployment flows become a low-noise payload delivery channel inside trusted Windows execution paths.

ICS Phishing: When Your Calendar Becomes the Attack Surface

How calendar invites become phishing payloads that bypass inbox controls and live inside trusted apps.

APT31 Today: When Trusted Cloud Infrastructure Becomes the Attack Surface

  • Apt
  • December 7, 2025
  • 5 mins

How APT31 turned Microsoft Dev Tunnels, cloud storage, and signed binaries into stealthy command and control.