local accounts

Winsage
November 11, 2025
Dave Plummer, a retired Microsoft Windows engineer, shared a video discussing the dissatisfaction with Windows 11 among long-time users. He attributes this discontent to Microsoft's focus on integrating its own products into the user experience, which alienates loyal users. The shift began with Windows 10, which adopted a "Windows as a service" model and aimed to create a unified user base for monetization through cloud services. Windows 11 has further evolved into a platform that promotes Microsoft products over user experience, leading to intrusive advertising within the OS. Plummer suggests improvements, including a genuine "Pro Mode" for power users, a "privacy ledger" for telemetry transparency, and better options during setup. He emphasizes the need for Microsoft to refine the Windows experience to regain user trust.
Winsage
November 4, 2025
The Russian-aligned APT group Curly COMrades has been using hidden Alpine Linux virtual machines (VMs) on compromised Windows hosts via Microsoft Hyper-V to evade detection and maintain covert access. This technique was uncovered in mid-2025 through an investigation by Bitdefender and the Georgian CERT, which traced suspicious activities to a compromised Georgian website. The attackers activated Hyper-V on the infected machines, downloaded a disguised VM image, and named it “WSL.” The VM, operating on Alpine Linux, had a small disk footprint and low RAM usage, minimizing alerts from security systems. Within this environment, they deployed two malware implants: CurlyShell, a reverse shell for command execution, and CurlCat, a reverse proxy tool for SSH traffic. Both implants were designed to maintain a low forensic footprint. The attackers also used a PowerShell script to inject encrypted Kerberos tickets into LSASS for lateral movement and employed various tunneling tools for communication. Artifacts from their operations were stored in directories that blended with legitimate Windows files. Security teams are advised to audit Hyper-V usage, monitor for hidden VMs, and enable host-based network inspection.
Search