How modern threats bypass detection by abusing trust ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­    ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­ ­  
ThreatLocker: Zero Trust Weekly

This week in Zero Trust

Here are your weekly tips to stay ahead of cyber threats.

Estimated reading time:  6-7 minutes

 

In this issue:

  • How to build the right security stack: The right defenses in the right order
  • The rise of vibe hacking: And how it outpaces EDR and signature defenses
  • VS Code abuse: Emerging method for arbitrary code execution
  • The cost of weak cybersecurity: Lessons & hardening checklist 
  • Threats you need to know: Google disrupts IPIDEA and security risks behind AI browsers
View in browser

Manage preferences

From the CEO

On the seizure of RAMP

 

"Shutting down sites like RAMP is often described as a game of whack-a-mole, but taking a platform like this offline does slow cybercriminal growth and creates a real barrier for newer entrants into cybercrime." - Danny Jenkins

 

RAMP was a long-running underground forum used by ransomware-as-a-service gangs, extortionists, and initial access brokers. RAMP's clear web and Tor-based sites were both replaced with law enforcement notices last week.

From the ThreatLocker blog

 How modern attacks bypass detection and what actually stops them

 

How to give defenders visibility and control without bogging down systems

  • What you need to know: The right security stack includes the right tools for your environment and layering them in a way that enhances visibility, improves control, and reduces risk without slowing down systems. The first line of defense is the firewall. From there, visibility is centralized through a SIEM acting as a hub for security data. Ultimately, the product layer of a SOC needs to be strategic. Each layer should fit within the broader framework of protection, detection, and response. 
  • Why it matters: As cyber threats become more complex, your security stack must be strong and efficient. With the right stack, security teams can detect threats faster, stop malicious actions before they escalate, and maintain performance and usability for end users.
  • Key takeaways: Perimeter defense -> centralized visibility -> endpoint protection -> application control -> detection and response -> data loss prevention -> UEBA (user and entity behavior analytics)

How AI-driven cybercrime bypasses EDR and signature defenses

  • What you need to know: Vibe hacking is a new class of AI-driven cyberattack where attackers leverage LLMs and autonomous AI coding assistants to plan, generate, and execute multi-stage attacks with minimal human technical skill. Instead of traditional campaigns that rely on handcrafted exploits and malware, these AI tools can write code, adapt to defenses, and pivot tactics in real time, producing unique payloads that evade signature-based detection and traditional EDR systems. Real-world incidents in 2025: Claude Code-powered extortion campaign against 17 organizations; LameHug malware that uses live LLM-generated commands.
  • Why it matters: Attackers can use the same generative AI that boosts developer productivity to orchestrate complex campaigns automatically. Signature-based tools and traditional EDR struggle against constantly morphing AI-crafted code that doesn't match known malicious patterns. And because AI can generate unique and benign-looking scripts, these attacks blend into normal activity, making them harder to detect. 
  • Key takeaways: Security teams must shift toward default-deny. Applying Zero Trust controls that focus on only allowing what is explicitly approved is more effective than chasing new threat variants. 

JSON abuse enables multi-stage infostealer deployment

  • What you need to know: The ThreatLocker Threat Intelligence team discovered attackers are abusing legitimate JSON-based configuration and task files to deliver and execute malicious code in stages. Instead of dropping obvious malware, threat actors embed malicious instructions inside files that are normally trusted by systems and applications. These JSON “code tasks” can trigger scripts, downloads, or command execution that quietly pulls down infostealers and other payloads over time. Because the files themselves appear benign and are often part of normal workflows, they bypass many traditional detection techniques.
  • Why it matters: This attack technique blurs the line between malicious code and legitimate configuration data. Signature-based defenses and traditional EDR tools are less effective when the initial file isn’t malware but a trusted format doing what it’s “supposed” to do. By chaining together small, seemingly harmless actions, attackers can deploy full infostealer campaigns while avoiding alerts and delaying detection until data has already been exfiltrated.
  • What you can do: Security teams can’t rely solely on file reputation or malware signatures. Defenders need visibility into what actions files are allowed to trigger, not just whether a file looks malicious. Restricting script execution, controlling child processes, and only allowing approved applications and behaviors are critical controls to stopping multi-stage attacks that hide inside trusted formats.

The ripple effect from stolen data is profound and long-lasting

  • What you need to know: Union Home Mortgage (UHM) disclosed a data breach in 2025 in which unauthorized access exposed names, SSNs, driver’s license or state ID numbers, dates of birth, passport numbers, and banking details. A class-action lawsuit followed, alleging that UHM failed to apply reasonable safeguards such as encryption, network segmentation, timely patching, and continuous monitoring.
  • Why it matters: Even when breach volumes are smaller than mega incidents, the impact on individuals and organizations can be significant, from regulatory exposure and litigation to long-term credit monitoring costs and insurance consequences. This breach also highlights that basic security controls still matter, and weak or inconsistent implementation of widely accepted frameworks (NIST CSF, CIS controls, GLBA Safeguards) creates gaps attackers can exploit.
  • What you can do: Enforce least privilege and just-in-time admin access and encrypt sensitive data at rest and in transit. Monitor vendors, specify security requirements in contracts, and validate. Read the full analysis for the complete hardening checklist. 

A fast response isn't fast enough.

Make your cybersecurity stronger than this

You decide who—or what—gets in.

See why prevention beats response

Threats you need to know

Attacks that blend into normal behavior and abuse trust

 

Google disrupts one of the world's largest residential proxy networks

  • What you need to know: Google’s Threat Intelligence Group announced it has disrupted IPIDEA, a massive residential proxy network—a global botnet built from millions of consumer devices whose internet connections were being repurposed to relay malicious traffic for cybercriminals and nation-state groups. IPIDEA operated through software development kits embedded in apps and binaries that enrolled devices as “proxy exit nodes,” allowing attackers to route malicious traffic through real, trusted residential IPs and mask the origin of their operations. 

  • Why it matters: Residential proxy networks like IPIDEA are a stealthy infrastructure multiplier for attackers. By masking malicious traffic behind legitimate IP addresses, threat actors can evade detection, bypass IP-based defenses, execute credential attacks, and target corporate cloud and SaaS environments with reduced risk of attribution or blocking. This makes traditional IP reputation controls less reliable and also means automated attacks can blend into normal traffic and bypass basic network filters.
  • Key takeaways: Attackers can leverage hijacked proxies to evade blocklists and geofencing, so don't rely on source IP alone. Instead, prioritize behavioral, identity, and authentication signals. Since proxy networks like this enable large-scale credential stuffing and account takeover, monitor for anomalous login patterns, enforce MFA, and assume trusted IPs can still be hostile. 

AI-powered browser abuse

  • What you need to know: Modern web browsers are increasingly being abused as attack platforms, not just entry points. Through malicious browser extensions, injected scripts, and AI-powered automation, attackers can perform actions like credential harvesting, session hijacking, internal reconnaissance, and automated abuse of SaaS applications. Because the activity originates from a legitimate user’s browser session, it often bypasses endpoint agents and traditional network-based detection.

  • Why it matters: This shifts risk squarely to the identity and session layer. Browser-based attacks blend seamlessly into normal user behavior, using valid credentials, trusted devices, and approved SaaS tools. That makes signature-based malware detection, IP filtering, and traditional EDR far less effective. If an attacker controls the browser, they effectively inherit the user’s access, including cloud apps, internal portals, and admin consoles.
  • Key takeaways: Monitor for anomalous session behavior like rapid automation, unusual navigation paths, and unusual access patterns. Restrict extensions, block unauthorized scripts, and verify behavior continuously, so trust is never assumed after login. Only allow what is needed and block everything else.
ThreatLocker Zero Trust World 2026, Orlando, FL, March 4-6

Registration is live, and now is the best time to book. These are sessions you won't want to miss:

  • Rubber Ducky Advanced Techniques—keep the hardware

  • How to Lose a Domain in 45 Minutes: Active Directory Hacking (Spencer Alessi)
  • Invisible Gateways: Exploiting IoT (Phillip Wylie)
  • Zero Trust vs Next-Gen Malware (Leo - The PC Security Channel)

  • Security Now: The Call is Coming from Inside the House (Steve Gibson & Leo Laporte—followed by a meet and greet)
Be part of the action at ZTW26

Use code ZTWWEEKLY26 to save $200 on your registration.

Cyber Hero Frontline, a magazine by ThreatLocker

Written for cyber defenders, by cyber defenders.

  • ThreatLocker intelligence brief

  • Expert interviews
  • Global policy & industry focus
  • Security insights
  • How to by ThreatLocker
Read Cyber Hero Frontline
ThreatLocker: Zero Trust Platform | Zero Trust Weekly

ThreatLocker, 1950 Summit Park Dr, Floor 4, Orlando, Florida 32810, United States

Manage preferences

Connect with us

                             

©2026 ThreatLocker Inc., All Rights Reserved