410 Followers
0 Following
110 Posts
Securing every bit of your data
websitehttps://quarkslab.com
locationParis, France

"Intego X9: Never trust my updates"

Read @coiffeur0x90's research showing how XPC interprocess communications and the update mechanism of the Intego antivirus for MacOS can be abused for local privilege escalation.

https://blog.quarkslab.com/intego_lpe_macos_3.html

"How does it even work?"

The question that keeps hackers' hearts pumping, blood pressure rising, and curiosity growing.

This is @virtualabs's reverse engineering journey into a cheap smartwatch that measures at least one of those.

https://blog.quarkslab.com/nerd-life-weeks-firmware-teardown-we-were-right.html

SPONSOR

πŸ“£ Today, we are delighted to announce the @quarkslab Gold level sponsoring 😍

Since day one (9 years ago!), @quarkslab supports us, it is an incredible help for an organization like us πŸ™ Thank you so much!

πŸ“„ @quarkslab provides to companies Security Audit capabilities (pentest, code & architecture) & Consulting expertise powered by its cutting edge R&D. It can also help you with Qshield, its comprehensive security suite designed to safeguard intellectual property (IP), data, devices, and software against modern cyber threats.

πŸ”₯ @quarkslab produces year after year a fantastic number of cyber open source projects and contributions (ex: FLOSS audits) πŸ‘

Two 2026 examples:

⚑️Sighthouse: a tool designed to assist reverse engineers by retrieving information and metadata from programs and identifying similar functions.

πŸ‘‰ https://github.com/quarkslab/sighthouse

⚑️Bitcoin Core audit : @quarkslab conducted the first public third-party security assessment of Bitcoin Core, the canonical implementation of the Bitcoin network.

πŸ‘‰ https://blog.quarkslab.com/bitcoin-core-audit.html

One bit flip to corrupt it all: Exploitation of an old Linux kernel vulnerability using PageJack, a modern technique to create Use After Free bugs.
Here Jean Vincent shows you how
https://blog.quarkslab.com/pagejack-in-action-cve-2022-0995-exploit.html

If you glitch one, can you glitch many?
Extracting automotive firmware is a challenge.
@Phil_BARR3TT explains how he bypassed the IDCODE protection in several variants of the RH850 MCU family using both voltage glitching and side-channel analysis βš‘οΈπŸš—

https://blog.quarkslab.com/bypassing-debug-password-protection-on-the-rh850-family-using-fault-injection.html

Reverse engineers often spend a lot of time deciphering third-party firmware libraries. At RE//verse 2026 (Fri, 5 PM), Benoit & Sami will introduce SightHouse, an open-source tool to automatically identify third-party functions and speed up analysis.
Join us!

Another antivirus πŸ›‘οΈ, another unfulfilled promise 😣. @kaluche_ turns Avira's protection into a privilege escalation playground. This time: not 1, not 2, but 3 LPE vectors πŸ†™ via symlink abuse (CVE-2026-27748, CVE-2026-27750) and unsafe deserialization (CVE-2026-27749).

Find out more: https://blog.quarkslab.com/avira-deserialize-delete-and-escalate-the-proper-way-to-use-an-av.html

Why macOS AVs shouldn’t trust PIDs πŸ˜„πŸ - new post by @Coiffeur0x90

Intego X9: XPC validation falls back to PID β†’ PID reuse + posix_spawn() shenanigans 😏 β‡’ confused deputy / privileged methods abused 🀑🧨

Lesson: PID β‰  identity.
Check it out πŸ”— https://blog.quarkslab.com/intego_lpe_macos_2.html

You've never been more right to doubt your MacOS antivirus software πŸ˜₯
Our latest research by @coiffeur0x90 shows how Intego can be abused for Local Privilege Escalation
Yes, the antivirus.
Yes, as root.

https://blog.quarkslab.com/intego_lpe_macos_1.html

"Dr. Bytecode or: How I Learned to Stop Worrying and Obfuscate Java"

A tale about how @farenain started his journey in Java software obfuscation.

https://blog.quarkslab.com/how-to-write-your-first-obfuscator-of-java-bytecode.html