~ $ whoami

Welcome to anir0y’s infosec blog — malware analysis, exploit development, and security research. Hack the planet.
Diagram showing how a trojanized Atera RMM MSI installer disguised as a bank eStatement establishes persistent remote access via AWS IoT Core MQTT and PubNub channels

Dissecting a Weaponized Atera Installer: How a Fake Bank Statement Grants Full Remote Access

A trojanized Atera RMM installer disguised as a bank eStatement PDF grants attackers persistent remote access including terminal, remote desktop, and arbitrary code execution — all through legitimately signed, commercially trusted infrastructure. Zero public detections at time of analysis. Likely Luna Moth / Silent Ransom Group campaign.

April 7, 2026 · 9 min · 1805 words · Animeh Roy
Diagram illustrating how TeamPCP compromised Trivy security scanner to backdoor LiteLLM Python package via CI/CD pipeline credential theft

How TeamPCP Poisoned Security Scanners to Backdoor LiteLLM

On March 24, 2026, threat actor TeamPCP published backdoored versions of the LiteLLM Python package (3.4M daily downloads) after compromising Trivy and Checkmarx security scanners to steal PyPI credentials from CI/CD pipelines. The malware harvested credentials, deployed Kubernetes worms, and established persistent C2 — all triggered by a Python .pth file that fires on every interpreter startup.

March 26, 2026 · 11 min · 2192 words · Animeh Roy
Diagram showing how malicious npm lifecycle scripts execute attacker code through the dependency tree during package installation

Poisoned Packages: How npm Lifecycle Scripts Became a Supply Chain Weapon

Microsoft Threat Intelligence published a technique profile on malicious npm lifecycle scripts — the mechanism behind Shai-Hulud 2.0, Contagious Interview, and multiple North Korean campaigns. This post breaks down how lifecycle scripts work as an attack vector, the real-world campaigns exploiting them, and a layered defense strategy for dev teams and CI/CD pipelines.

March 21, 2026 · 8 min · 1540 words · Animeh Roy

SWE-CI: Can AI Agents Actually Maintain Code Long-Term?

The Problem with Current Coding Benchmarks Most benchmarks for LLM coding agents — HumanEval, SWE-bench, Terminal-bench — share a fundamental blind spot: they only test whether an agent can produce a one-shot fix. Pass the test suite once, and you’re done. ...

March 19, 2026 · 7 min · 1360 words · Animesh Roy

LeakyLooker: 9 Critical Google Looker Studio Vulnerabilities Exposed

Introduction Google Looker Studio, a powerful Business Intelligence platform, connects live to your data sources—BigQuery, PostgreSQL, MySQL, Google Sheets, Cloud Storage—enabling real-time dashboards and reports. But a series of nine critical cross-tenant vulnerabilities (dubbed “LeakyLooker”) turned this strength into a major attack surface. Attackers could execute arbitrary SQL, exfiltrate sensitive data, and modify records without victim interaction or permission. ...

March 18, 2026 · 11 min · 2318 words · Animesh Roy

Gemini Embedding 2: What's Changed and Why Security Teams Should Care

Introduction If you work in threat detection, malware analysis, or threat intelligence, you’ve likely wrestled with a fundamental problem: how do you find connections between thousands of threats at scale without breaking your budget? This is where embeddings come in. Embeddings—numerical representations of text, code, and other data—let security teams compare and correlate threats efficiently. But previous embedding models had trade-offs. You could get good quality or keep costs reasonable, but rarely both. ...

March 14, 2026 · 10 min · 1957 words · Animesh Roy
Annotated screenshot of the phishing staging page showing fake PDF toolbar and redirect mechanism

Quishing in the Wild: Anatomy of a Corporate HR Lure Using QR Codes, AWS S3, and Cloudflare Turnstile

TLP: WHITE — This analysis is cleared for public release. All victim PII has been redacted. No credentials were submitted during analysis. IOCs are provided at the end for detection use. Overview A live QR phishing (“quishing”) campaign was captured in the wild targeting corporate employees via a weaponized PDF disguised as an employee handbook. This isn’t a commodity phish — it’s a toolkit-grade, multi-stage attack built specifically to defeat automated email scanners, security sandboxes, and network proxies. ...

March 11, 2026 · 8 min · 1554 words · Animesh Roy
Coruna iOS exploit kit timeline showing proliferation from surveillance vendor to nation-state actor to financially motivated threat group

Coruna: The iOS Exploit Kit That Went From Spyware Vendor to Mass Crypto Theft

Google GTIG and iVerify independently disclosed Coruna, an iOS exploit kit containing 23 exploits across 5 full chains targeting iOS 13 through 17.2.1. Originally built for a commercial surveillance vendor, it proliferated to a Russian espionage group (UNC6353) for watering hole attacks against Ukraine, then to a Chinese financially motivated actor (UNC6691) mass-deploying it via fake crypto sites to steal wallet credentials. This post breaks down the exploit chains, payload architecture, detection artifacts, and IOCs.

March 8, 2026 · 8 min · 1647 words · Animeh Roy
Fake Stewart Title closing document portal hosted on lovable.app with progress bar and Open Document button

Dissecting a Real Estate BEC Phishing Chain: From Fake Stewart Title Closing Docs to Multi-Layer Encrypted AiTM Router

A BEC phishing email impersonating a Stewart Title escrow officer sends fake closing documents via a compromised law firm. Five-stage chain abusing Lovable (AI app builder), a CAPTCHA gate, triple-encrypted JavaScript with anti-debug traps and a remote kill switch, a server-side AiTM credential router, and a pixel-perfect Google Sign-In proxy capturing credentials and session tokens in real-time.

February 25, 2026 · 22 min · 4505 words · Animeh Roy
Fake Google Drive phishing page hosted on systeme.io impersonating a Secured Google Drive document sharing interface

Dissecting a BEC Phishing Chain: From Fake Payment Advice to Real-Time Google AiTM Credential Harvester

A real-world BEC phishing email impersonating a payment advice notification. Three-stage attack chain abusing systeme.io, a fake CAPTCHA gate, and a real-time Adversary-in-the-Middle Google credential harvester with full 2FA interception.

February 24, 2026 · 11 min · 2325 words · Animeh Roy
Privacy Policy Terms of Service