- John Hammond
- Posts
- Cybersecurity Shenanigans #021: Zero-days, VS Code extensions, and AI-speed ransomware š«
Cybersecurity Shenanigans #021: Zero-days, VS Code extensions, and AI-speed ransomware š«
Read this month's cybersecurity scoop.
š Hey friend,
I think hackers looked at the calendar and said, āOh sh*t, this is a short month. Better wreak all the havoc we can in those 28 days.ā š
Between Microsoft shipping an emergency Office fix because a zero-day is already being exploited in the wild, dev tooling catching fire with VS Code extension bugs, and ransomware groups using AI to work smarter, not harderā¦this has been an insanely busy month. Not sure whoās been busier, to be honest: hackers or defenders?
Anyway, in this edition of Shenanigans, I pulled some highlights (lowlights?) of news headlines and broke down some of the big stuff happening in cyberspace.
So grab your drink of choice, and letās dig in.
ā JH
News & Commentary
Just dropped on YouTube: Russia is hacking zero-days (again) š„²
Hot off the press on my YouTube channel: Microsoft recently released an emergency out-of-band fix for CVE-2026-21509 following Januaryās Patch Tuesday. Yay.
This oneās an MS Office security feature bypass vulnerability. And while Microsoft doesnāt provide too many details in their security bulletin (Shocked? Me neither!), hereās what Iāve gathered.
It boils down to āreliance on untrusted inputs,ā letting an attacker bypass a local security feature. Still, the severity isnāt anything to shake a stick at: This one clocks in around a 7.8 CVSS and, more importantly, itās not theoretical. Itās actively being exploited.
Whatās especially gnarly is the execution chain. The malicious document leverages OLE / COM object behavior to reach out over WebDAV to an external resource, pulling down a file (often a Windows shortcut / LNK), which then kicks off additional downloads and execution. The whole point is to turn āI opened a documentā into āI just ran untrusted code from the internet,ā while sidestepping the protections youād expect to stop that.
And the post-exploitation story? Weāve seen it before many times: staged payloads disguised as normal files (even things like splashscreen.png), COM hijacking by changing a CLSID registry path, scheduled task persistence, and even behavior that restarts Explorer to make sure the hijack triggers reliably. Thereās also mention of adversaries leaning on legitimate third-party infrastructure (including cloud storage) as part of their control plane: the classic āliving off trusted servicesā move that makes network filtering harder if youāre not already thinking about it.
You might be able to guess the guidance here: patch. Mitigations like registry blocks can help as a stopgap, but the real fix is updating Office. If you want to go one step further, there are community scripts (built around tools like oletools) that can help scan Office documents for the specific OLE object / CLSID patterns associated with this technique.
Hereās the video I just posted if youād like to dig deeper:
Four popular VS Code extensions shown to have critical flaws š«
If youāre one of the 125 million VS Code users whoās downloaded the Live Server, Code Runner, Markdown Preview Enhanced, or Microsoft Live Preview extensions, Iām sorry for what Iām about to say. š
These extensions contain vulnerabilities that could let an attacker steal local files and potentially even execute code on remote machines. Ugh.
The Hacker News does a great job of breaking down the technical details of whatās going on for each extension:
a Live Server flaw (CVE-2025-65717) that can exfiltrate files if a developer is tricked into visiting a malicious site while the local server is running on
localhost:5500a Markdown Preview Enhanced bug (CVE-2025-65716) that enables arbitrary JavaScript via a crafted markdown file
a Code Runner issue (CVE-2025-65715) that can lead to code execution if someone can socially engineer changes to
settings.jsona Microsoft Live Preview issue that could expose sensitive local files via malicious web content while the extension is running, which Microsoft reportedly fixed in version 0.4.16 back in September 2025 (without a CVE)
TL;DR: Dev tooling is part of your attack surface. Extensions are luxuries of convenience, but at the end of the day, they sit right next to your code, your terminals, and your browser. And thatā¦can be a spicy combo when vulnerabilities surface. š
If youāve downloaded any of these extensions, update what you can and consider uninstalling any extensions (for any program, really) that you donāt really need.
Ransomware groups are speeding up attacks thanks to AI š¤
Iām back on my AI soapbox again. š
In last monthās Shenanigans, I talked about a discovery from Check Point Research: a single dev used AI to generate 88,000 lines of code to form a new Linux malware framework called VoidLink.
A new research report from Palo Alto Networks shows that ransomware groups are now moving four times faster than they were ONE year ago. For example, some of the fastest intrusions are resulting in data exfiltration within 72 minutes of initial access.
I donāt even chug my morning Monster that fast.
This is being made possible by AI. Itās helping threat actors with reconnaissance, phishing, scripting, and operational execution. In other words, threat actors are wisely turning to AI to help with the boring, repetitive stuff so they can focus their efforts elsewhere. And that results in more sophisticated attacks.
One important trend I want to touch on: Attackers are more frequently abusing trusted integrations to compromise SaaS apps. (Sound familiar?) These integrations already have legitimate, privileged access, which means attackers are less often brute-forcing their way through the door and more often justā¦walking through the door you unintentionally built for them.
That means we have to be vigilant with making sure we trust and monitor the extensions, applications, and integrations we use.
Sponsor

Get insights from 1800+ security pros in Voice of Security 2026
AI is everywhere in security, but workloads keep climbing.
To find out why, Tines surveyed 1,800+ security leaders and practitioners worldwide for their largest Voice of Security report to date. The data shows that while AI adoption and enthusiasm are high, teams have yet to unlock its full impact. A few key stats:
81% saw workloads increase in the past year.
Teams still spend 44% of their time on manual or repetitive work.
76% report burnout, driven primarily by heavy workloads.
Learn how security teams are responding in the full Voice of Security 2026 report.

Email being clipped?
Hereās some actually helpful advice: You can view the email in your browser: https://johnhammond.beehiiv.com/p/cybersecurity-shenanigans-021.
(And as always, thanks for nothing, Clippy. š)
Latest Content
YouTube Videos
// One of the worldās most popular social media platforms has been sitting on an open redirect vulnerability for over a year. Itās fine, everythingās fine. š« |
// In this video, I cover who the āKrabby Wrathbunā AI agent is, how it got into a Matplotlib PR, and the chaos that followed: a bot-fueled meltdown, prompt-injection trolling, and a fake āsecurity auditā pile-on. š¦ |
// One word: āWhoops!ā |
Just Hacking Training š¤
February Announcements
Dark Web 2 is Here ā 20% Off ALL Month!
Sorry it took so long, but I think youāll be pleased with the end result. DW2 ā CTI Researcher is ready for your hoodie and your hacker mindset with real links, more exposure of criminal activity, and hands-on exercises in cloud-based VMs for you to hunt from a protected environment.
See for yourself with 3 Free Preview Lessons:
š Index Sites and Aggregators
š„· Overview of Infostealer Malware
š¼ Career Opportunities (I highly recommend this one!)
Opportunity to Save 25% on Dark Web Path
The Dark Web Path consists of DW1, Dark Web and Cybercrime Investigations ($125), and Dark Web 2 ā CTI Researcher ($175). Both are 20% off if purchased individually, $100 and $140 respectively.
Get 25% off when you buy them together in the Dark Web Bundle (just $225)!
New Free Upskill Challenges!
New series with Dean Macris and James Campbell on the expansive world of Maritime Cybersecurity. James starts us off with this first UC on ship security. Look for future UCs and even a full, hands-on course! |
2nd Free Upskill Challenge by Andrew Pla, MS MVP and Host of The PowerShell Podcast. Learn to parse APIs in PS7 to open new automation ideas. |
Continuing Series of Free Upskill Challenges on "Pentesting for the Masses" exploring common hacking tools for the job. This time G1zm0 tackles Nessus. |
San Franciscoā¦Here We Come!
Iāll be in San Francisco as part of JHTās Annual Sponsorship of the IoT Village. Come say hi at BSidesSF March 21 ā 22 and also at RSAC March 23 ā 26. Get some swag and play with brand new, hands-on mini workshops! |
Weāre also supporting WiCyS (Women in CyberSecurity) as a Strategic Partner for 2026. This includes their presence at RSAC as well as several special events and contests throughout the year. Stay tuned for some big announcements! |
Save Big with Bundles!
⢠The āMishaalā Bundle: Get EVERYTHING Mishaal Khan has on JHT for only $345 (25% Off)! At a fraction of what he charges for a single in-person course, you get 4 courses (3 OSINT, 1 OpSec) & 2 geoINT Hack-Alongs.
⢠Mastering Active Directory Security (MADS) Volumes 1 ā 3: (20% Off)
⢠WMD Intro Path includes courses 1 ā 3: (46% Off)
⢠7 CTF Bundle: 50% Off
⢠7 Hack-Along Bundle: 75% Off
Forget the Noise. Get to Just Hacking!
ContinuumCon is back! š
Kind of!! As ābackā as you can get for a cybersecurity conference that doesnāt end. š
ContinuumCon is a virtual, hands-on cybersecurity conference running June 12ā14, 2026. Itās built around practical workshops and interactive labs across core blue-team and reverse-engineering domains. Itās hosted by Level Effect and my team at Just Hacking Training, with community happening in Discord and content organized by tracks like DFIR, Detection Engineering, Reverse Engineering, Threat Hunting, Malware Analysis, CTI, SecOps, Tactical GRC, and AI/ML.
If you want the best parts of a con (learning by doing, labs that actually work, and content you can come back to when your brain is ready), thatās the vibe we strive for at ContinuumCon. Show up live for the energy, then keep the workshops for when itās 2AM and youāve decided today is the day you finally learn detection engineering. š
Got feedback?
Are you loving this thing? Can it be improved? Either way, I want to know.
Please reply to this email and let me know what youāre loving ā and what youād love to see in the next edition.
Thank you!








Social