When Attackers Play the Long Game: From Hijacked Linux Devices to SOC Exhaustion
When Attackers Play the Long Game: From Hijacked Linux Devices to SOC Exhaustion
I’ve been digging through this week’s security news, and there’s a fascinating thread connecting several incidents that really highlights how sophisticated threat actors have become. It’s not just about the attack vectors anymore – it’s about how they’re weaponizing our own processes against us.
The Infrastructure Play: SocksEscort Gets Shut Down
Let’s start with some good news. US and European law enforcement just disrupted the SocksEscort proxy network, which had been running on compromised Linux edge devices infected with AVRecon malware. What caught my attention here isn’t just the takedown – it’s the infrastructure choice.
These weren’t your typical Windows endpoints or cloud servers. The attackers specifically targeted Linux edge devices, probably because they’re often overlooked in traditional endpoint monitoring. Think about it: how many of us are running comprehensive EDR on every Linux router, IoT gateway, or embedded device in our environment? The attackers knew these devices would fly under the radar while providing the persistent network access they needed.
This connects to a broader trend I’m seeing where threat actors are getting smarter about hiding in plain sight, using legitimate-looking infrastructure that doesn’t trigger our usual alerts.
The Human Element: Why We’re Bad at Vetting People
Speaking of flying under the radar, there’s an interesting piece from SecurityWeek about why security professionals struggle with social vetting. The core argument is that we need to apply the same analytical rigor to human intelligence that we do to technical indicators of compromise.
I’ve seen this play out in my own work. We’ll spend hours correlating IP addresses and file hashes, but when someone mentions “I heard from a guy who knows a guy that this might be related to APT X,” we often take it at face value or dismiss it entirely. There’s rarely that middle ground of structured analysis we apply to everything else.
The article suggests treating human intelligence like any other IOC – documenting sources, assessing reliability, and cross-referencing claims. It’s not about being paranoid; it’s about being consistent in our analytical approach.
Signal Accounts Under Attack: The Social Engineering Angle
This human factor becomes even more critical when we look at the recent Signal account takeovers. Signal’s encryption is solid, but attackers are bypassing it entirely through social engineering tactics targeting the account recovery process.
What’s particularly concerning is that government officials and journalists are being specifically targeted. These aren’t random attacks – someone is building target lists and crafting personalized approaches. The technical security is irrelevant if you can convince someone to hand over their account through a well-crafted social engineering campaign.
Code Execution in AI Infrastructure
On the technical side, we’ve got two new CVEs (CVE-2026-3059 and CVE-2026-3060) affecting SGLang, a framework for serving large language models. Both involve unsafe pickle deserialization, which is honestly a vulnerability class that should have died years ago.
But here’s what worries me: as organizations rush to deploy AI and ML capabilities, we’re seeing the same security mistakes we made with web applications 15 years ago. SGLang is processing untrusted input through pickle deserialization, which is basically handing attackers a loaded gun. With the current AI hype, how many other ML frameworks are making similar shortcuts?
The Meta-Attack: Weaponizing Our Workload
Here’s where it gets really interesting. The Hacker News piece about attackers weaponizing SOC workloads describes something I’ve been noticing more frequently. Sophisticated phishing campaigns aren’t just trying to fool end users – they’re specifically designed to exhaust the analysts investigating them.
Think about it: if a phishing investigation that should take five minutes instead takes twelve hours because the attacker has layered in just enough legitimate-looking elements to force deep analysis, they’ve essentially launched a denial-of-service attack against your SOC. While your team is burning cycles on one elaborate fake, three real attacks might slip through.
This is next-level thinking. The attackers understand our processes well enough to turn them into weapons. They know we’ll investigate thoroughly (because we’re professionals), so they make that investigation as resource-intensive as possible.
What This Means for Us
Looking at these incidents together, I see a pattern of attackers who really understand how we work and are specifically targeting our blind spots and processes. They’re hiding in infrastructure we don’t monitor well, exploiting our inconsistent approach to human intelligence, targeting high-value individuals through social engineering, taking shortcuts in new technology deployments, and turning our own diligence against us.
The defense isn’t just better tools – it’s better processes and a more holistic view of how attackers actually operate. We need to think like they do: not just about individual vulnerabilities, but about the entire system we’re trying to protect, including ourselves.
Sources
- US disrupts SocksEscort proxy network powered by Linux malware
- The Human IOC: Why Security Professionals Struggle with Social Vetting
- Your Signal account is safe – unless you fall for this trick
- VU#665416: SGLang (sglang) is vulnerable to code execution attacks via unsafe pickle deserialization
- Attackers Don’t Just Send Phishing Emails. They Weaponize Your SOC’s Workload