TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Quarkslab

Milking the last drop of Intego - Time for Windows to get its LPE

Lucas Laise · 2026-04-06 · Read original ↗

ATT&CK techniques detected

8 predictions
T1070.004File Deletion
97%
“##r c : \ foobar echo 123 > c : \ foobar \ deleteme1. txt echo 123 > c : \ foobar \ deleteme2. txt scan for duplicates in optimization - > scan specific location and select c : \ foobar. scan specific location. wait for the scan to finish, check our controlled directory and run s…”
T1068Exploitation for Privilege Escalation
83%
“milking the last drop of intego - time for windows to get its lpe introduction it was a sunny sunday afternoon when my colleague mathieu farrell told me about how he discovered three vulnerabilities on the macos version of intego ( available at 1, 2 and 3 ). while browsing their …”
T1068Exploitation for Privilege Escalation
77%
“at \ rpc control \ deleteme2. txt pointing to c : \ config. msi. deletefilew ( ) fails because of nt symlink. fallback to std : : filesystem : : remove ( ) which follows the nt symlink. removedirectoryw ( ) executes as system and deletes c : \ config. msi function returns true, e…”
T1070.004File Deletion
72%
“technical background intego ' s optimization module intego includes an optimization module that scans for duplicate files and offers to delete them. this feature is usable by unprivileged users and it works as follows : user runs the optimization scan on a specific location. inte…”
T1485Data Destruction
61%
“technical background intego ' s optimization module intego includes an optimization module that scans for duplicate files and offers to delete them. this feature is usable by unprivileged users and it works as follows : user runs the optimization scan on a specific location. inte…”
T1070.004File Deletion
52%
“keyboard by pressing ctrl + alt + del. dll is successfully dropped. procmon capture confirms the delete action as system. access to system command prompt. vulnerability analysis analyzing iavservice. exe reveals the issue in the deletion workflow : time - of - check : getfileattr…”
T1070.004File Deletion
41%
“here, waiting for user to confirm deletion iavfiledeleteex _ killprocessusingfile ( filepath _ wstring _ ptr ) ; temp _ filepath. assign ( * filepath _ wstring _ ptr ) ; / / time - of - use deletion _ succeeded = iavfilesutil _ removefile ( & temp _ filepath ) ; temp _ filepath. …”
T1548.002Bypass User Account Control
31%
“folder c : \ config. msi via a reparse point. attacker recreates c : \ config. msi and places. rbs and. rbf rollback scripts and files in it. an msi installation is triggered and forced to fail, causing a rollback action. windows installer ( system ) will load rollback files and …”

Summary

Exploitation of an arbitrary directory deletion via symlink following in the antivirus Intego.