Registry

Tech Optimizer
June 9, 2025
The AhnLab Security Intelligence Center (ASEC) has reported that ViperSoftX malware, first identified in 2020, continues to pose a significant threat, particularly targeting cryptocurrency-related information. It disguises itself as cracked software or eBooks on torrent sites and uses deceptive tactics to infect users globally. ViperSoftX exploits the Windows Task Scheduler to execute malicious PowerShell scripts and communicates with its command-and-control server to transmit detailed system information. The malware captures clipboard activity to steal cryptocurrency wallet addresses and employs mechanisms to avoid detection, including self-removal. It also deploys secondary payloads like Quasar RAT and ClipBanker, which hijacks wallet addresses during transactions. ASEC warns that infections can lead to total system compromise and advises users to avoid unverified downloads and maintain updated security measures. Indicators of Compromise (IOCs): - MD5: - 064b1e45016e8a49eba01878e41ecc37 - 0ed2d0579b60d9e923b439d8e74b53e1 - 0efe1a5d5f4066b7e9755ad89ee9470c - 197ff9252dd5273e3e77ee07b37fd4dd - 1ec4b69f3194bd647639e6b0fa5c7bb5 - URLs: - http://136.243.132.112/ut.exe - http://136.243.132.112:881/3.exe - http://136.243.132.112:881/APPDATA.exe - http://136.243.132.112:881/a.ps1 - http://136.243.132.112:881/firefoxtemp.exe - IPs: - 136.243.132.112 - 160.191.77.89 - 185.245.183.74 - 212.56.35.232 - 89.117.79.31
Winsage
May 29, 2025
Windows collects telemetry data, which includes hardware specifications, installed software, and system events, but does not reveal personally identifiable information. This data is encrypted and sent via HTTPS during significant events like system crashes. Users can manage optional data collection settings during initial setup or in the Privacy section of the Settings app, with enterprise versions offering more control. Mandatory data collection in Windows is more extensive than in macOS, while Linux has minimal data collection due to its decentralized structure. Users can disable some data collection, but some information will always be gathered unless advanced measures are taken.
Tech Optimizer
May 23, 2025
Cloudflare, in collaboration with Microsoft and international law enforcement, has dismantled the infrastructure of LummaC2, an information-stealing malware service. This initiative led to the seizure and blocking of malicious domains and disrupted digital marketplaces used by criminals. Lumma Stealer operates as a subscription service providing threat actors access to a central panel for customized malware builds and stolen data retrieval. The stolen information includes credentials, cryptocurrency wallets, and sensitive data, posing risks of identity theft and financial fraud. Lumma Stealer was first identified on Russian-language crime forums in early 2023 and has since migrated to Telegram for distribution. Its proliferation is facilitated by social engineering campaigns, including deceptive pop-ups and bundled malware in cracked software. Cloudflare implemented measures to block access to Lumma's command and control servers and collaborated with various authorities to prevent the criminals from regaining control. Mitigation strategies for users include restricting unknown scripts, limiting password storage in browsers, and using reputable endpoint protection tools. The operation has significantly hindered Lumma's operations and aims to undermine the infostealer-as-a-service model contributing to cybercrime.
Winsage
May 21, 2025
Windhawk is a tool for customizing the Windows 11 interface, allowing users to make significant modifications to their operating system. It provides various mods, including: - Vertical Taskbar Mod: Restores the ability to reposition the taskbar and customize its width and jump list alignment. - Taskbar Labels Mod: Allows users to display labels for app icons, customize label text, combine apps, and adjust taskbar width, with options for increasing label font size. - Start Menu Syler Mod: Enables users to apply themes to the Start menu, including options that mimic the Windows 10 look. - Classic Explorer Navigation Bar Mod: Restores familiar items to the File Explorer navigation bar, enhancing user experience. - Classic Context Menu Mod: Reverts the context menu to a more familiar format, improving accessibility to options. Windhawk also offers a portable installation option and encourages users to create a restore point before installation to safeguard against potential issues. The platform features a marketplace for various modules, allowing users to customize their experience further.
Winsage
May 20, 2025
The Model Context Protocol (MCP) is a lightweight, open protocol functioning as JSON-RPC over HTTP, facilitating standardized discovery and invocation of tools. MCP defines three roles: MCP Hosts (applications accessing capabilities), MCP Clients (initiators of requests), and MCP Servers (services exposing functionalities). Windows 11 will incorporate MCP to enable developers to create intelligent applications leveraging generative AI. An early preview of MCP capabilities will be available for developer feedback. MCP introduces security risks, including cross-prompt injection, authentication gaps, credential leakage, tool poisoning, lack of containment, limited security review, registry risks, and command injection. To address these, Windows 11's MCP Security Architecture will establish security requirements for MCP servers, ensuring user safety and transparency, enforcing least privilege, and implementing security controls like proxy-mediated communication, tool-level authorization, a central server registry, and runtime isolation. MCP servers must comply with security requirements, including mandatory code signing, unchanged tool definitions at runtime, security testing, mandatory package identity, and declared privileges. An early private preview of MCP server capability will be offered to developers post-Microsoft Build for feedback, with a secure-by-default enforcement strategy planned for broader availability. Microsoft aims to enhance defenses continuously and collaborate with partners to bolster MCP's security framework.
Tech Optimizer
May 19, 2025
A researcher known as es3n1n explored Windows security mechanisms to bypass antivirus software validation checks in the Windows Security Center (WSC). He used tools like dnSpy and Process Monitor to analyze how legitimate antivirus solutions register with WSC. He confirmed that WSC validates the signatures of processes calling its APIs. Previously, es3n1n faced controversy when his project, no-defender, was removed from GitHub due to a DMCA takedown request from a software vendor.
Winsage
May 17, 2025
In this week's roundup of applications for Windows 10 and 11, it is noted that consumer support for Windows 10 will end in October 2025, but users can purchase a year of extended support and receive three years of security updates for Microsoft 365 apps. New applications highlighted include: - DiskCopy: Free disk and partition cloning software for backing up partitions or entire disks, facilitating data migration. - IrfanView: An image viewer that now includes batch file multithreading and new hotkeys in its latest version. - Registry Finder: A freeware tool for managing the Windows Registry, with improved search capabilities and usability.
Search