#WindowsSandbox

2025-03-18

Also, all this ninja work to go through #WindowsSandbox to escape detection to finally raise a huge red flag by communicating over #Tor. It probably made sense for this target but still, what a let down...

2025-03-18

#ESETresearch has uncovered the #MirrorFace Operation AkaiRyū, which extends the group’s usual focus beyond Japan into Europe. The initial lure centered around Expo 2025 in Japan, compromising a Central European diplomatic institute.
welivesecurity.com/en/eset-res

Surprisingly, #MirrorFace used #ANEL – a backdoor historically linked only to #APT10 – highlighting a shift in the group’s tactics and reinforcing suspicions that MirrorFace could be part of the APT10 umbrella.
Operation AkaiRyū began with targeted spearphishing emails referencing the victim’s past correspondence and Expo 2025 , persuading recipients to download malicious attachments.
Once the files were opened, a layered compromise chain ensued . Collaborating with the victim allowed us to perform in-depth analysis, shedding light on MirrorFace’s post-compromise behavior – from credential harvesting to dropping additional tools for lateral movement.

#MirrorFace used an intricate execution chain to stealthily run a highly tweaked #AsyncRAT within #WindowsSandbox, hampering detection efforts. This is the first time we’ve seen MirrorFace employ AsyncRAT.
In another twist, #MirrorFace utilized #VSCode remote tunnels, a tactic enabling covert access and command execution on compromised machines. This approach has also been seen with other China-aligned cyberespionage groups.
The group primarily leveraged #ANEL as a first-stage backdoor, #HiddenFace – MirrorFace’s flagship backdoor – was dropped later in the attack to bolster persistence . Notably absent this time was #LODEINFO, which #MirrorFace typically employs.

We presented our findings about Operation AkaiRyū conducted by #MirrorFace at @jpcert_ac on January 22, 2025: jsac.jpcert.or.jp.
IoCs available in our GitHub repo: github.com/eset/malware-ioc/tr

📰 «El espacio aislado de Windows está ahí para usarlo»
🔗 proxy.jesusysustics.com/2025/0

Windows 10 y 11 tienen otro PC dentro de tu PC para ejecutar aplicaciones de la forma más segura: cómo usar Windows Sandbox genbeta.com/paso-a-paso/window

El espacio aislado de Windows (Windows Sandbox) nos permite virtualizar una versión por defecto del Sistema de usar y tirar. Tan pronto lo cierras, se olvida todos los cambios que has hecho, así que es ideal para jugar con fuego de forma controlada.

Hace cinco años que hablé sobre esta fantástica herramienta y viene bien recordarla al ser tan útil y socorrida, pero no viene instalada por defecto. Aquí se explican los pocos pasos que hay que seguir para activarlo y unos pequeños «trucos» al usarlo.

#️⃣ #máquinaVirtual #Microsoft #SistemaOperativo #virtualización #Windows #WindowsSandbox

Sandbox IT SolutionsSandboxITSolutions
2025-02-04
ゆなす🧑‍💻☕🍷🍶🍾🍹🍺juners@oransns.com
2024-08-17
2024-08-15

So, Godot 4.3 released.

godotengine.org/releases/4.3/

Good news for security-concerned gamers: since now there's a DirectX 12 renderer, Godot projects moving forward should hopefully work on Windows Sandbox (on Windows 10) without issue! Previously I found it simply impossible to get a Godot game working on Windows Sandbox due to requiring Vulkan or OpenGL, but this should slowly stop being an issue with newer Godot games.

…conversely, now GDScript has a basic form of source-code minification, which while it can help game developers protect their IP, it may also make games somewhat harder to reverse-engineer, particularly to figure out if the game contains malicious behavior.

Still arguably an overall security win, though.

#godot #cybersecurity #gamedev #windows #windowssandbox #reverseengineering

2023-08-19

I shouldn't have to throw your #OpenSource software into #WindowsSandbox and disable networking to get it to behave.

2023-05-28

Ever used Windows Sandbox? In my latest #blog post I talk about what it is, how I use it, and provide some example configuration files.

#Windows #Sandbox #WindowsSandbox

blog.jonsdocs.org.uk/2023/05/2

annajayne 🏳️‍⚧️🙏🏳️‍🌈annajayne
2023-04-17

I was experimenting with Windows Sandbox over the weekend, and as a result I now have a sandbox config which launches it with drives mapped and both Winget and Chocolatey installed. 😁

The only hiccup I've run into is that Winget is being stubborn (there are some dependency issues) on Windows 10. 🤔

On Windows 11 however it's absolutely fine. 👍😎👍

A screenshot of Windows 11 Sandbox, showing both the Winget and Chocolatey package managers installed.
heise online (inoffiziell)heiseonline@squeet.me
2022-03-10
heise+ | Notfall-Windows aus der Sandbox einsatzfähig machen und nutzen

Windows 10 und 11 bringen eine Sandbox mit, um darin nicht vertrauenswürdige Software ausführen zu können. Wir zeigen was geht anhand unseres Notfall-Windows.
Notfall-Windows aus der Sandbox einsatzfähig machen und nutzen
ACiTacit
2020-05-31

เจอของเล่นใหม่

2018-12-19

So, basically #bhyve for #Windows?
___________

#Microsoft unveils #WindowsSandbox: Run any app in a disposable virtual machine

First leaked a few months ago, the new feature should be coming to insiders imminently.

arstechnica.com/gadgets/2018/1

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst