code

Winsage
May 1, 2026
Leo, Richard, and Paul discussed developments in the Windows Insider Program, Snapdragon X2 gaming, artificial intelligence, and Xbox. Two changes in the Insider Program were noted. Microsoft has open-sourced early MS-DOS source code. Intel reported a .7 billion loss, which Paul attributes to 'collusion.' Microsoft and OpenAI are revising their partnership, with Microsoft 365 Copilot gaining enhanced AI features in Word, Excel, and PowerPoint, and GitHub Copilot moving to a usage-based billing model starting June 1. OpenAI is reportedly entering the mobile phone market, while Adobe's Firefly AI Assistant is in preview, and Anthropic is increasing its creator space involvement. Microsoft Gaming has rebranded to Xbox, with new leadership focused on future plans, including a mobile game store pending changes in Apple's policies. Valve will release its Steam Controller next week. A listener inquired about purchasing Windows 11 on Arm for Mac virtualization, leading to suggestions for cost-saving options. PowerToys 0.99 introduces new utilities and improvements. This week’s episode of RunAs Radio compares M365 Copilot and Claude Cowork. Reifel Rye is recommended as the brown liquor of the week.
AppWizard
April 30, 2026
Cybersecurity threat hunters have discovered an active infostealer campaign targeting the gaming community, involving malware called LofyStealer (or GrabBot) that disguises itself as a Minecraft hack named “Slinky.” The attackers use the official game icon to trick young gamers into executing the malware. The Brazilian cybercrime group LofyGang has enhanced its technical capabilities, utilizing a sophisticated two-stage modular architecture. The initial stage features a 53.5 MB loader file named load.exe, which is a Node.js runtime environment that obscures malicious signatures. The loader connects to the attacker’s server and decrypts a 1.4 MB C++ payload, chromelevator.exe, which targets eight web browsers to extract sensitive information like cookies and passwords. The stolen data is compressed, encrypted, and sent to the attacker’s server. LofyGang has evolved into a Malware-as-a-Service platform, offering a web panel for operators to monitor victims and generate custom executables. The campaign highlights the increasing threats to the gaming community, with advanced evasion techniques being employed by cybercriminals. Security professionals are advised to monitor network traffic and conduct audits for suspicious activities.
AppWizard
April 30, 2026
Google is preparing to update the Gemini app for Wear OS with the "Gemini App UX 2.0," featuring animated gradient backgrounds and an enhanced user interface. A retail demo video has revealed a new glow animation and updated weather icons, although these features are not yet publicly available. The latest version of the Gemini app is v1.31.56.902760379. The new glow animation is designed to be more dynamic, and the updated weather icons aim to improve clarity and aesthetics. A full demo video showcases these upcoming changes, but they will remain unreleased until an official announcement, likely at the Google I/O event. An APK teardown suggests potential future features, though not all may be included in the final release.
AppWizard
April 30, 2026
A new infostealer malware called LofyStealer is targeting the gaming community, particularly Minecraft players, by disguising itself as a cheat tool named “Slinky.” It employs a two-stage attack to extract sensitive information from eight major web browsers, including Chrome and Firefox, while evading detection by security software. The malware siphons off cookies, saved passwords, payment card information, and session tokens. Researchers at Zenox.ai identified LofyStealer, linking it to the Brazilian cybercrime group LofyGang, which has been active since October 2022. The malware uses social engineering tactics to appear legitimate and operates as a Malware-as-a-Service platform, offering both Free and Premium tiers to buyers. Its technical sophistication is evident in its method of in-memory browser injection, which allows it to bypass security defenses. The stolen data is compressed and sent to a command-and-control server. Users are advised to avoid downloading unofficial game mods and enable multi-factor authentication to reduce the risk of credential theft. Security teams should monitor for specific behavioral indicators related to the malware's operations.
Winsage
April 30, 2026
Attackers are exploiting CVE-2026-32202, a zero-click vulnerability in Windows Shell, allowing authentication of victims' systems without user interaction. This vulnerability stems from an incomplete patch for CVE-2026-21510 and has been used by the APT28 group with weaponized LNK files to bypass Windows security. Although Microsoft addressed these vulnerabilities in February 2026, the risk remains as opening a folder with a malicious LNK file can still connect victims' machines to the attacker's server, initiating an NTLM authentication handshake that exposes the victim’s Net-NTLMv2 hash. This affects various versions of Windows 10, 11, and Windows Server. Microsoft released a patch for CVE-2026-32202 on April 14, 2026, but did not label it as actively exploited until more than two weeks later, leaving security teams unaware of its urgency. Organizations are advised to apply the patch and consider blocking outbound SMB traffic to mitigate risks.
Search