We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
Immoral Fiber: Unlocking & Discovering New Offensive Capabilities of Fibers
Discover how attackers leverage Windows fibers to evade detection, including two new offensive techniques: Phantom Thread and Poison Fiber. Learn key advantages and detection challenges.
- 
    Fibers are mini-threads (stackful coroutines) that provide an alternate code execution method, operating as a user-mode concept invisible to kernel 
- 
    Key advantages of using fibers for offensive operations: - No thread artifacts or kernel callbacks
- Less common than threads, making detection more difficult
- No ETW-specific providers targeting fibers
- Simple API with low barrier to entry
- Can avoid thread-specific detection heuristics
 
- 
    Two new offensive techniques developed: - Phantom Thread: Allows injection into dormant fibers while maintaining legitimate stacks
- Poison Fiber: Enables remote callback injection through fiber local storage
 
- 
    Defensive challenges with fibers: - Limited open source tooling available
- No built-in Windows API for remote enumeration
- Traditional thread-based detection methods don’t apply
- Call stack collection needs different signatures
- Immature detection capabilities overall
 
- 
    Implementation considerations: - Need to validate fiber objects carefully
- Must handle fiber callbacks properly to avoid crashes
- Can mask malicious activity by switching between innocent and malicious fiber stacks
- Possible to chunk payloads across multiple callbacks
- Clean-up mechanisms important to avoid artifacts
 
- 
    Fiber usage remains relevant despite Microsoft’s recommendations against it: - Still used in browsers and audio software
- Microsoft itself uses fibers in system processes
- Growing interest from attackers as an evasion technique