CYFIRMA Research

CYFIRMA

Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.

  1. 5D AGO

    CYFIRMA Research: Operation SilentCanvas – JPEG-Based Multi-Stage PowerShell Intrusion

    Operation SilentCanvas – JPEG-Based Multi-Stage PowerShell Intrusion CYFIRMA Research conducted an in-depth technical investigation into a sophisticated multi-stage intrusion campaign leveraging a weaponized PowerShell payload disguised as a legitimate “.jpeg” image file to deploy a trojanized ConnectWise ScreenConnect framework for covert persistent access.     Key highlights from the research:  • Weaponized JPEG-based PowerShell loader  • AMSI bypass & multi-layer obfuscation  • Dynamic .NET compilation via csc.exe  • Fileless UAC bypass abusing ComputerDefaults.exe  • Trojanized ScreenConnect deployment  • LOLBin abuse & stealth-focused persistence  • DPAPI-protected credential handling  • Hidden desktop architecture for covert operations  • Encrypted PBKDF2/HMAC-SHA256 C2 communication  • Extensive surveillance & SYSTEM-level execution capabilities    This campaign reflects the growing trend of threat actors weaponizing legitimate RMM platforms for stealthy enterprise compromise, credential theft, persistence, and potential ransomware staging. Link to the Research Report: https://www.cyfirma.com/research/operation-silentcanvas-jpeg-based-multistage-powershell-intrusion/ #CYFIRMA #CYFIRMAResearch #ThreatIntelligence #MalwareAnalysis #CyberSecurity #ThreatResearch #DigitalForensics #ReverseEngineering #PowerShell #ScreenConnect #ThreatHunting #CyberThreatIntelligence #ETLM #ExternalThreatLandscapeManagement https://www.cyfirma.com/

    9 min
  2. MAY 8

    CYFIRMA Research: Abuse of Cloud-Native Infrastructure in Modern Phishing Campaigns

    New Research: Trusted Infrastructure Phishing — The Attack That Lives Inside Your Security Stack Most phishing starts outside your perimeter. This one starts inside it. Trusted Infrastructure Phishing (TIP) is a threat class in which every phase of the attack chain — delivery, hosting, execution, authentication, and persistence — operates through legitimate, enterprise-trusted cloud infrastructure rather than attacker-controlled systems. No spoofed domains. No malicious IPs. No suspicious certificates. The attacker sends from Google's servers, hosts Microsoft's storage, authenticates through your identity provider, and persists inside your licensed SaaS environment. The governance gap is the real story. Every organization affected by TIP had licensed the platforms being abused. They had whitelisted the IPs. They had approved the OAuth flows. The gap is not in tooling; it is the assumption that trusted infrastructure cannot be weaponized from within. TIP invalidates that assumption at every stage. If your organization runs Microsoft 365, uses OAuth-integrated SaaS applications, or has invested in cloud productivity platforms — your trusted infrastructure is the attack surface. Link to the Research Report: https://www.cyfirma.com/research/abuse-of-cloud-native-infrastructure-in-modern-phishing-campaigns/ #CyberThreatIntelligence #CTI #CloudSecurity #TIP #TrustedInfrastructurePhishing #IdentitySecurity #OAuth #MicrosoftSecurity #PhishingDefense #MITRE #ATTACKFramework #BlueTeam #ThreatResearch #ZeroTrust #InfoSec #CYFIRMA #CYFIRMAresearch #ExternalThreatLandscapeManagement #ETLM https://www.cyfirma.com/

    8 min

About

Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.