Expel
banner
expelsecurity.bsky.social
Expel
@expelsecurity.bsky.social
50 followers 4 following 130 posts
The leading MDR provider trusted by some of the world’s most renowned brands to expel adversaries, minimize risk, and build security resilience. 🔗 expel.com
Posts Media Videos Starter Packs
Halloween might be the spookiest day in October but this month's Patch Tuesday is a close second.

175 new CVEs from Microsoft, 8 marked critical, 6 zero-days, 2 already exploited in the wild.

But not to fear, our threat intel team breaks down the 3 you should patch first. expel.com/blog/patch-t...
Patch Tuesday: October 2025 (Expel’s version)
This month, we're highlighting top critical vulnerabilities, including six zero-day vulnerabilities, and one in Cisco IOS.
expel.com
Reposted by Expel
We encountered a unique variant of the ClickFix malware technique. The catch? The user is social engineered into running a PowerShell script which downloads no files, makes no web requests, and embeds no payload.

Regardless, it's still able to install a malicious loader.

expel.com/blog/cache-s...
Cache smuggling: When a picture isn’t a thousand words
We recently observed an innovative campaign using the ClickFix attack tactic for cache smuggling. Here's what you need to know.
expel.com
This technique isn't widespread yet but we've seen it before. Part 2 drops soon; we'll show you how attackers abuse a legitimate signed executable to load highly evasive shellcode.

Full analysis by Marcus Hutchins (@malwaretech.com), Principal Threat Researcher: expel.com/blog/cache-s...
Cache smuggling: When a picture isn’t a thousand words
We recently observed an innovative campaign using the ClickFix attack tactic for cache smuggling. Here's what you need to know.
expel.com
Defense recommendations:
→ Alert on unexpected processes touching browser cache
→ Restrict PowerShell to users who need it
→ Monitor for suspicious PowerShell execution patterns
→ Block newly created/newly seen domains
→ Educate users on ClickFix social engineering
This bypasses a lot of security tools:
• No explicit file downloads to scan
• No PowerShell web requests to flag
• Just an "image" getting cached (normal behavior) and a script reading local files (also normal)

Simple. Effective. Evasive.
The webpage fetches what claims to be an image (Content-Type: image/jpeg). Browser dutifully caches it.

Open it in a hex editor? No JPG header. Just a zip archive wrapped in those magic strings, sitting in your cache waiting to be extracted.
Here's where it gets interesting: The PowerShell script doesn't download anything. It searches your browser's cache for data wrapped between two strings: "bTgQcBpv" and "mX6o0lBw"

That data? A zip file the page already smuggled into your cache as a fake JPG.
When you click "Open File Explorer," it copies what looks like a harmless file path to your clipboard:

\Public\Support\VPN\ForticlientCompliance.exe

But 139 spaces are hiding a PowerShell command above it that your eyes never see.
The lure pretends to be a Fortinet VPN Compliance Checker. Makes sense. Fortinet's VPN is used by enterprises so compromising it means access to corporate networks.

The page looks unassuming. The command doesn't.
⚠️ Our threat intel team just caught attackers using a clever new trick to bypass security tools: cache smuggling.

Instead of downloading malware, they hide it in fake images that browsers automatically cache. Then PowerShell extracts and runs it—no web requests needed.
This evolution builds on our foundation of integrating actionable threat intel into daily operations. We’re accelerating our capabilities, dedicating expert resources to surface context that benefits customers and the security community.

Learn more: expel.com/intel
(7/7)
Expel Intel | Cybersecurity threat intelligence
Expel’s dedicated threat intelligence team and program, transforming real-world incident findings into actionable defense strategies.
expel.com
We're also bringing @malwaretech.com into the mix. Marcus’ expertise in malware analysis and reverse engineering adds serious firepower to our ability to understand and counter evolving threats. 👀 Read his first blog post with Expel: expel.com/blog/cache-s...
(6/7)
Cache smuggling: When a picture isn’t a thousand words
We recently observed an innovative campaign using the ClickFix attack tactic for cache smuggling. Here's what you need to know.
expel.com
Our threat intelligence isn't academic. It’s built by operators, for operators. We share what we learn from stopping real attacks. The community gets stronger when we all learn from the same adversaries.
(5/7)
Our approach: When our SOC identifies threats across customer environments, Expel Intel digs deeper, documents what matters, and publishes the findings. When zero-days emerge, we hunt and share results. When attack patterns shift, we explain what's happening and what to do.
(4/7)
For years, our threat intel team has been behind the scenes turning real incidents into actionable defense strategies for our customers. We're expanding our focus to share what we're learning with the broader security community.
(3/7)
You’ve likely seen some of our work.

👉 Added clarity around a specific trojan (ManualFinder): www.reddit.com/r/cybersecur...
👉 Distinguished BaoLoader from other malware via code-signing certificates: expel.com/blog/the-his...
👉 Investigating Latrodectus malware: x.com/ExpelSecurit...
(2/7)
The security industry is drowning in threat feeds that don't actually help you stop attacks. We've been working to fix that for years.

Today, we’re taking the wraps off our expanded threat intel program: Expel Intel.
(1/7)
50k events/day. 0.1% true positive rate. 50 real threats buried.

That's what happens when you optimize for integration count, not detection quality. Vendors brag about "300+ integrations" while analysts burn out investigating false positives.

Start counting what matters: expel.com/blog/stop-co...
While traditional tools may not tell the difference between a user who is compromised and one who isn’t, Expel MDR for Email can. Our email MDR coverage correlates unusual login locations, suspicious contacts, and deleted emails. Learn more: expel.com/blog/stories...
Stories from the SOC: When threats come from inside the house
MDR email coverage is more than just flagging spam to contain threats. Here's what happens when malicious emails come from within an org.
expel.com
Your email gateway is designed to catch threats from outside. But when attackers compromise a legitimate employee account and send phishing emails internally, most detection tools fail. Internal phishing is harder to detect because the senders are trusted.
Your email security quarantined the malicious email. 🚨📧 Victory, right?

Not quite so. Several employees already clicked the link and installed attacker-controlled tools.
We took public threat intelligence about "LapDogs" malware, ran it through our customer environments, and discovered compromised home routers connecting to corporate networks including devices belonging to critical infrastructure employees.
Chinese threat actors were building a network of SOHO routers and marking their territory with TLS certs that spoofed the LAPD.

Our threat hunters found them anyway. 🕵️
⚠️ We’ve recently witnessed new activity in the realm of potentially unwanted programs (PUPs), which are dropping malware, executing commands, and turning your machine into someone else's proxy network.

Read our ongoing investigation here: expel.com/blog/you-don...
You don’t find ManualFinder, ManualFinder finds you
We're investigating ManualFinder, a trojan malware we're seeing in new activity, likely coming from potentially unwanted programs (PUPs).
expel.com