Enterprise Security Weekly (Audio) Breaking in with CrashFix, supply chain security, and CMMC phase 1 - David Zendzian, Anna Pham, Jacob Horne - ESW #449
13 snips
Mar 9, 2026 Jacob Horne, a defense-contracting cybersecurity evangelist familiar with CMMC and NIST, explains CMMC phase 1 enforcement and verification risks. David Zendzian, VMware Tanzu security lead, breaks down SBOMs and continuous compliance for supply chain security. Anna Pham, Huntress threat hunter and malware reverser, dissects the CrashFix/ClickFix browser-extension attack and its clipboard‑paste trickery.
AI Snips
Chapters
Transcript
Episode notes
Malicious Adblocker Copied uBlock Code To Hide Malicious Logic
- Anna found the malicious extension by inspecting its JavaScript and discovered it blended open-source uBlock code with hidden malicious logic.
- The extension intentionally delayed visible symptoms so users wouldn't link the crash to the recent install.
Attackers Tailor Payloads Based On Domain Membership
- Enterprise targets get different payloads: domain-joined hosts are often given tools to escalate in AD, while consumer hosts receive credential stealers or RATs.
- CrashFix adapts behavior based on domain membership to prioritize enterprise compromise.
Lock Down Browsers And Whitelist RMM Tools
- Reduce extension risk by using enterprise browsers or lockdown policies that enforce default deny for installs.
- Whitelist only approved RMM tools and block arbitrary extensions on corporate machines.
