Origin

34 posts

Origin banner
Origin

Origin

@originhq

Endpoint capabilities for the era of semantic security.

Katılım Şubat 2025
11 Takip Edilen999 Takipçiler
Origin
Origin@originhq·
Windows Insider builds now have a native, OS-level broker for MCP servers. We reverse engineered Odr.exe to understand how it validates clients, manages consent, and controls access - uncovering undocumented COM interfaces and a full ETW audit trail. originhq.com/blog/msft-odr-…
English
2
25
58
5.2K
Origin
Origin@originhq·
New on the blog: Semantic delivery of traditional tradecraft. How are agents changing offensive operations? @depletionmode explores the gap between using AI to automate attacks vs. agents becoming the attack vector itself. Full write-up + video: originhq.com/blog/praxis-cr…
English
0
2
7
836
Origin
Origin@originhq·
We built Brainworm: malware that lives entirely inside of an AI agent's context window. No binaries. No scripts. Once loaded, it registers with C2 and executes tasks using the agent's own tools. Welcome to the era of semantic malware. 🧠🪱 Blog: originhq.com/blog/brainworm
English
27
204
829
114.2K
Origin
Origin@originhq·
Understanding complex execution flows is essential for designing, exploring, and securing applications and operating systems. In our most recent post, @matterpreter introduces Marco, a new tool for inter-binary control flow graphing or large systems. originhq.com/blog/introduci…
English
0
1
4
768
Origin
Origin@originhq·
New on the blog: @jdu2600 introduces Process Preluding: a timing gap in how TI ETW gets enabled. Create a process without a thread → no creation callback and limited TI ETW logging for that process. Technical write-up + PoC and defensive guidance 📃 originhq.com/blog/process-p…
English
0
13
31
3.3K
Origin
Origin@originhq·
ICYMI: @33y0re dug into some undocumented ETW internals and found a way to consume from Secure ETW providers (e.g., Microsoft-Windows-Threat-Intelligence) without needing to be AM-PPL without patching kernel structures. originhq.com/blog/securityt…
English
0
1
8
858
Origin retweetledi
David Kaplan
David Kaplan@depletionmode·
Cooking up something exciting... @originhq
David Kaplan tweet media
English
0
1
3
487
Origin
Origin@originhq·
Computer use agents like Claude Code are transforming endpoint interactions for humans - and potentially attackers too. Today, we're releasing cua-kit: a post-exploitation toolkit to explore their offensive security implications. originhq.com/blog/cua-kit-a…
English
2
7
14
4.1K
Origin
Origin@originhq·
@B_Shamshirsaz We believe that this applies beyond AV and includes both static and behavioral signatures, both precise and robust. Both are built on the assumption that we can predict what evil looks like and that we can distinguish it from benign instances.
English
0
0
0
109
Behnam Shamshirsaz
Behnam Shamshirsaz@B_Shamshirsaz·
@originhq Signature based detection was obsolete since many years ago but antivirus companies didn’t want to update their solutions.
English
1
0
0
190
Origin
Origin@originhq·
Signature-based detection has failed as adversaries mutate indicators and adapt tradecraft faster than defenses. Computer use agents embedded in daily workflows push this over the edge as dual-use insiders, indistinguishable from normal activity. preludesecurity.com/blog/the-era-o…
English
2
14
46
5.9K
Origin
Origin@originhq·
We believe that: 1. The potential economic upsides of the productivity boosts that Computer Use Agents offer incentivize us to provide them with more access to our computers to increase the amount of context they can have. 2. They represent a new type of interpreter that dramatically closes the gap between intent and execution, is self-corrective, and yields nondeterministic outputs that create massive amounts of "noise" 3. Their ability to generate and execute new tools on the fly, combined with expanded access, challenges the very foundation of a signature-based model of detection As these systems become increasingly intertwined with how we use computers, we must consider what it means to detect their misuse through out-of-context interactions with the host. If you're interested in collaborating on tooling or joining our team, please contact research@preludesecurity.com
English
1
2
15
1.5K
Origin
Origin@originhq·
In this simple example, we show that Claude Code can read the iMessage database on the latest version of macOS, even with a leading EDR running on the system, illustrating the impact of an adversary who can remotely control the agent. We do this using Terminator, an internal research tool we built while studying the security implications of computer use agents. In this setup, the terminal application has previously been granted FDA, a subtle misconfiguration that effectively gives the agent access to unexpected context.
English
5
29
152
17.9K
Origin
Origin@originhq·
In @33y0re's latest post on Windows ARM64 Pointer Authentication, he dissects how PAC fortifies stack integrity and thwarts exploits at the hardware level. Explore the mechanics of this critical security layer and its role in modern Windows defenses. preludesecurity.com/blog/windows-a…
English
0
10
37
3.7K
Origin
Origin@originhq·
This method demonstrates how hardware-level telemetry, coupled with contextual reasoning, can surface malicious activity that signature-based approaches will always miss as malware authors innovate in response. 📃Full write-up → preludesecurity.com/blog/unexpecte…
English
0
11
22
2.6K
Origin
Origin@originhq·
By tracing execution of private memory and reconstructing its provenance, our agent surfaced the broader chain: the encryptor escalated privileges, spawned a new instance of itself, and then created a third process that deleted the encryptor from disk. All three of these component parts utilized the same dynamic import technique, revealing a coherent attack sequence.
English
1
0
4
699
Origin
Origin@originhq·
While testing our agent against malware observed in the wild, we detected a LockBit encryptor not via file signatures or static IOCs, but by observing out-of-context execution of private memory using hardware telemetry. 🧵
English
1
8
31
5.9K