BlackBox (Security) Archiv
4.09K subscribers
183 photos
393 videos
167 files
2.67K links
👉🏼 Latest viruses and malware threats
👉🏼 Latest patches, tips and tricks
👉🏼 Threats to security/privacy/democracy on the Internet

👉🏼 Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
iMessage: End-to-end encryption leveraged by iCloud backup.

Apple itself states that all communication via iMessage is end-to-end encrypted (E2EE). Unfortunately, the messenger is not open source and thus the security cannot be independently confirmed. That being said, messages are only actually E2E encrypted if the iCloud backup feature is disabled for iMessage. By default, iMessage messages that are readable with a private key stored on the local device are namely transmitted to the iCloud.

Before being transferred to the iCloud, the messages are decrypted locally (with the private key) and then transferred to the iCloud via TLS channel. There they are encrypted again with a key that is, however, managed by Apple or is known there. This enables Apple to read all iMessage messages or forward them to the authorities. E2E encryption reduced to absurdity.

So, if you want your iMessage messages to actually remain E2EE, you have to manually deactivate the backup function for iMessages in iOS.

However, this problem does not only apply in connection with iMessage, but also with other messengers whose messages are transferred to the iCloud as a backup.

💡And what do we learn from this:
Manufacturers often advertise security and data protection features in their external presentation, which, on closer inspection, only serve marketing purposes and practically have little to no effect - except under certain conditions. Now you can check whether you have already manually deactivated the backup of iMessage messages on your device.

https://www.kuketz-blog.de/imessage-ende-zu-ende-verschluesselung-durch-icloud-backup-ausgehebelt/

#imessage #icloud #backup #encryption
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
Code in huge ransomware attack written to avoid computers that use Russian, says new report

"They don't want to annoy the local authorities, and they know they will be able to run their business much longer if they do it this way," said an expert.

WASHINGTON —
The computer code behind the massive ransomware attack by the Russian-speaking hacking ring REvil was written so that the malware avoids systems that primarily use Russian or related languages, according to a new report by a cybersecurity firm.

It's long been known that some malicious software includes this feature, but the report by Trustwave SpiderLabs, obtained exclusively by NBC News, appears to be the first to publicly identify it as an element of the latest attack, which is believed to be the largest ransomware campaign ever.

"They don't want to annoy the local authorities, and they know they will be able to run their business much longer if they do it this way," said Ziv Mador, Trustwave SpiderLabs' vice president of security research.

https://www.nbcnews.com/politics/national-security/code-huge-ransomware-attack-written-avoid-computers-use-russian-says-n1273222

👉🏼 read the report:
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/diving-deeper-into-the-kaseya-vsa-attack-revil-returns-and-other-hackers-are-riding-their-coattails/

#ransomware #revil #usa #russia
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
US offers Julian Assange time in Australian prison instead of American supermax if he loses London extradition fight Appeal against January decision to be heard by High Court

Julian Assange will remain in a British prison for now after the US government won permission to appeal against a January court ruling that freed him from extradition to America.

News of the appeal came as the US Department of Justice offered Assange a deal that would keep him out of the notoriously cruel US supermax prisons, according to The Times.

The High Court this morning granted the US permission to appeal against a ruling by Westminster Magistrates' Court that Assange couldn't be extradited because he would commit suicide if handed over to the Americans. The WikiLeaker-in-chief's legal team lost on every other legal ground against extradition.

US authorities gained that permission on three grounds, including a deal that would rule out his being sent to a federal supermax in Colorado or being automatically subject to extra-harsh punishments within prison.

"The United States has also provided an assurance that the United States will consent to Mr Assange being transferred to Australia to serve any custodial sentence imposed on him," said the High Court's ruling.

https://www.theregister.com/2021/07/08/assange_us_to_appeal_extradition_ruling/

#assange #usa #australia #london
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
Inside the FBI, Russia, and Ukraine’s failed cybercrime investigation

Russia and Ukraine promised to cooperate and help catch the world’s most successful hackers. But things didn’t quite go to plan.

The American cops took the slower, cheaper train from Kyiv to Donetsk.

After repeatedly traveling between Ukraine and the United States, there were more comfortable ways to make this final, 400-mile journey. But the five FBI agents felt like luxury tourists compared to most travelers onboard. They could afford spacious private rooms while locals were sleeping 10 to a cabin. The train moved haltingly, past empty country and villages that, to the Americans at least, looked as if they’d been frozen in the Cold War.

The overnight trek was set to take 12 hours, but it had truly begun two years earlier, in 2008, at the FBI offices in Omaha, Nebraska. That’s where the agents had started trying to understand a cybercrime explosion that was targeting Americans and pulling in millions of dollars from victims. At that point, with at least $79 million stolen, it was by far the biggest cybercrime case the FBI had ever seen. Even today, there are few to match its scale.

Bit by bit, the American investigators began to sketch a picture of the culprits. Soon Operation Trident Breach, as they called it, homed in on a highly advanced organized-crime operation that was based in Eastern Europe but had global reach. As evidence came in from around the world, the Bureau and its international partners slowly put names and faces to the gang and started plotting the next step.

As the train made its way across Ukraine, Jim Craig, who was leading his very first case with the FBI, couldn’t sleep. He passed the time moving between his cabin and the drinks car, a baroque affair with velvet curtains. Craig stayed awake for the entire trip, staring out the window into the darkness as the country passed by.

For more than a year, Craig had traveled all over Ukraine to build a relationship between the American, Ukrainian, and Russian governments. It had been an unprecedented effort to work together and knock down the rapidly metastasizing cybercrime underworld. US agents exchanged intelligence with their Ukrainian and Russian counterparts, they drank together, and they planned a sweeping international law enforcement action.

https://www.technologyreview.com/2021/07/08/1027999/fbi-russia-ukraine-cybercrime-investigation-ransomware/

#fbi #russia #ukraine #cybercrime #investigation #ransomware
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
SOS (Stephen's OS)

This is my personal operating system project. It targets the 32-bit ARMv7-A architecture. The main target board is qemu, but progress is being made on the Raspberry Pi 4B target! Despite being very imited, this one-person project has actually made a great deal of progress and continues to improve.

To build and run this, you need two important pieces of software:
QEMU 4.2+, and an ARM cross compiler. These dependencies are straightforward on Arch Linux, but Ubuntu users should see more detailed setup instructions in Ubuntu.md.

https://github.com/brenns10/sos

#sos #raspberry
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
Biden signs new order cracking down on Big Tech

President Joe Biden has signed an executive order aimed at cracking down on big tech firms and promoting competition.

The move points to Mr Biden's desire for tougher scrutiny of Big Tech, which the administration has accused of "undermining competition".

"Capitalism without competition isn't capitalism. It's exploitation," Mr Biden said at Friday's signing event.

The order includes 72 actions and recommendations involving ten agencies.

It suggests that problems have arisen because of large tech firms collecting too much personal information, buying up potential competitors and competing unfairly with small businesses.

💡Several recommendations it sets out include:

- Greater scrutiny of mergers in the tech sector
- New rules to be set out by the Federal Trade Commission (FTC) on data collection
- Barring unfair methods of competition on internet marketplaces.

The Biden administration is also targeting a number of other sectors with the order.

https://www.bbc.co.uk/news/business-57783824

#usa #biden #BigTech #crackdown
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
The FBI’s honeypot Pixel 4a gets detailed in new report

FBI honeypot phones are now public—and showing up on the secondary market.

Last month, authorities disclosed that the FBI and Australian Federal Police secretly operated an "encrypted device company" called "Anom." The company sold 12,000 smartphones to criminal syndicates around the world. These were pitched as secure devices but were actually honeypot devices that routed all messages to an FBI-owned server. The disclosure was light on details, but now that it's public, Anom phones are being unloaded on the secondary market. That means us normal people are finally getting a look at them, starting with this Vice article detailing one of the devices.

The FBI has basically weaponized what the Android modding community has been doing for years. Some Android phones have unlockable bootloaders, which let you wipe out the original operating system and replace it with your own build of an OS, called a custom ROM. The Anom device Vice got was a Google Pixel 4a, one of the most developer-friendly devices out there. The FBI's custom ROM shows an "ArcaneOS" boot screen, and it replaced the normal Google Android distribution with the FBI's skin of Android 10.

https://arstechnica.com/gadgets/2021/07/how-the-fbi-weaponized-android-modding-with-anom-devices/

#fbi #honeypot #android #anom #report
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
SSRN-id3881279.pdf
979.2 KB
Surveilling the Gamers: Privacy Impacts of the Video Game Industry

With many million users across all age groups and income levels, video games have become the world’s leading entertainment industry. Behind the fun experience they provide, it goes largely unnoticed that modern game devices pose a serious threat to consumer privacy. To illustrate the industry’s potential for illegitimate surveillance and user profiling, this paper offers a classification of data types commonly gathered by video games.

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3881279

#surveillance #privacy #profiling #gamers #videogames #pdf
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
Tracking The White House YouTube channel

A website for tracking YouTube's removal of dislikes on White House videos

Verifying the accuracy of the data

I encourage visitors to this site, especially reporters, to verify the deletion phenomenon for themselves. To do so, go to the official White House YouTube channel and find a new video that is a few hours old. Click on the video and go to its page. Take a screenshot of the likes and dislikes, being sure that your computer's/phone's clock is visible in the screenshot (example). Once per hour, come back to the page, reload it so that the newest totals appear, and take another screenshot.

Do that over the course of the day, and you will almost certainly see that YouTube deletes dislikes repeatedly. Check back the next day, and you will see the deletions continuing throughout that day as well. Finally, check your screenshots against the video's chart at 81m.org (based on the timestamp in each of your screenshots), and you will see that the two data sources, your screenshots and my charts, line up for the official likes and dislikes. (There might be small discrepancies due to our respective samples being taken a few minutes apart.)

If you want to go further:

My real likes and real dislikes stats are simply computed from all the increases to likes/dislikes (but ignoring decreases). You can check the arithmetic in the "Last ... stats" table on each video page at 81m.org. You can download the full data on each page as CSV, TSV, or JSON files if you want to do your own charting. Also note that my real likes and real dislikes statistics almost always line up very closely for the videos in the comparison data, like those by PewDiePie.

https://81m.org/

#tracking #whitehouse #youtube #manipulation
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
Without Banks, Cannabis Companies Are Turning to Crypto

Here's one way that cryptocurrencies can help businesses that can't access traditional financial services.

Medicinal cannabis is now legal in 36 states, and 17 states allow recreational use.

However, banking is difficult for cannabis companies. Banks are nervous about working with cannabis businesses because federal law still prohibits the sale and distribution of marijuana -- no matter what local legislators say.

As a result, cannabis cash could be considered laundered money, and banks are reluctant to expose themselves to that kind of risk. Similarly, credit card companies and payment processors don't want to be liable if there's any kind of lawsuit.

There is a cannabis banking bill in the pipeline that may make things easier. But in the meantime, some cannabis companies are turning to cryptocurrencies to meet their banking needs.

https://www.fool.com/the-ascent/cryptocurrency/articles/without-banks-cannabis-companies-are-turning-to-crypto/

#cannabis #banking #crypto
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
Today OONI data shows that #Cuba started blocking WhatsApp, Telegram & Signal amid protests.

Blocking appears to be happening by injecting a TCP RST packet during the TLS handshake.

https://nitter.pussthecat.org/OpenObservatory/status/1414622433156476930#m

#cuba #blocking #telegram #whatsapp #signal
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
Bogdan Botezatu from Bitdefender in conversation with Tarnkappe.info (Interview)

Bitdefender security researcher Bogdan Botezatu on government malware, surveillance and a second firewall alongside Windows Defender.

Bogdan Botezatu is working at Bitdefender as an IT security expert since May 2008. Botezatu has many years of experience in the areas of cyberware as well as mobile and social network malware.

Botezatu kindly answers the many questions of the Tarnkappe.info community. In Bucharest, he works for Bitdefender as Director of Threat Research & Reporting. Botezatu runs his own blog and is reachable via LinkedIn, Twitter and Facebook, for example.

https://tarnkappe.info/bogdan-botezatu-from-bitdefender-in-conversation-with-tarnkappe-info/

#interview #bitdefender
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
You make a privacy-first service → You get banned on Google

TL;DR:
Google and Microsoft have super opaque and unpredictable ad moderation.

There are unofficial policies that indirectly ban the advertising of privacy-first services.

DuckDuckGo and StartPage.com use their platforms.

If you’re banned (like I am), unban is highly unlikely to happen, and the chances of your success are extremely low.

This topic is unpleasant, so there won’t be a lot of jokes. You need to have a lot of courage and composure to make jokes about your deadly wound when you’re still severely bleeding.

https://dkzlv.medium.com/google-bans-privacy-first-services-b9452e281439

#DeleteGoogle #google #privacy
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
Media is too big
VIEW IN TELEGRAM
Introduction: Singleboard Computers vs Microcontrollers (Explained)

Singleboard computers vs Microcontrollers explained.

Singleboard computers like Pine64 A64 LTS or Raspberry Pi run entire operating systems such as Linux, FreeBSD, whereas microcontrollers such as the ESP32 focus on specialized tasks yet use much less power.

There are many ways to get into this and I will be doing series coming up to help people get into Singleboard computers and Microcontrollers using security/privacy benefits I think you will find useful.

https://devtube.dev-wiki.de/videos/watch/405263e6-c746-4ffe-88b0-9a4b2e922ead

#rasperry #pine #microcontrollers #ESP32
📽@cRyPtHoN_INFOSEC_FR
📽
@cRyPtHoN_INFOSEC_EN
📽
@cRyPtHoN_INFOSEC_DE
📽
@BlackBox_Archiv
Brazil’s Anti-Piracy “Operation 404” Leads to Arrests, Shutdowns, and Site Blocking

Brazilian law enforcement agencies have announced the third wave of anti-piracy "Operation 404." With support from the United States and the UK, the authorities blocked or shut down 334 websites and 94 piracy apps, while making five arrests. The blocking targets include 1337x and The Pirate Bay but those domains were not seized.

In the fall of 2019, Brazilian law enforcement conducted a large anti-piracy campaign codenamed ‘Operation 404,’ referring to the well-known HTTP error code.

With help from international law enforcement, the authorities took down hundreds of sites and apps and arrested several suspects.

A year later a new wave of anti-piracy action followed. Under the banner “Operation 404 #2”, law enforcement authorities blocked or seized the domain names of more than 300 pirate sites and streaming apps.
Operation 404 #3

Last week, Brazil’s Ministry of Justice announced the third wave of Operation 404. With 11 search and seizure warrants in hand, law enforcement officials blocked or seized the domains of 334 websites, 94 piracy apps, and 20 IP addresses.

https://torrentfreak.com/brazils-anti-piracy-operation-404-leads-to-arrests-shutdowns-and-site-blocking-210712/

#AntiPiracy #brazil #shutdown #siteblocking #1337x #PirateBay
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
Hackers Move to Extort Gaming Giant EA

After trying to sell a cache of stolen data, hackers are now dumping some of the information publicly in the hopes of forcing EA to pay a ransom.

The hackers who previously stole a wealth of data from gaming giant Electronic Artshave moved from trying to sell that data to now releasing parts of it publicly. In one message on a forum accompanying the data dump, the hackers say explicitly they are trying to extort EA as well.

"Few week ago we send email for ransome [sic] to EA but we dont get any response so we will posting the src [source]," one of the posts from the hackers reads. A compressed, 1.3GB cache the hackers released appears to include references to internal EA tools and the company's Origin store, according to a copy viewed by Motherboard.

"If they dont contact us or dont pay us we will keep posting it," the hackers threatened. The data they stole totals in at around 780GB, Motherboard previously reported. That data includes source code for the Frostbite engine, used in games such as Battlefield; internal development tools, and software development kits (SDKs). The hackers also provided Motherboard with screenshots that appear to show data related to The Sims.

https://www.vice.com/en/article/m7e57n/hackers-extort-ea-fifa

#ea #games #hacked #hacker #ransom
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
Media is too big
VIEW IN TELEGRAM
Fast API resolving of REvil Ransomware related to Kaseya attack

This sample of REvil Ransomware is performing dynamically resolving of API functions via API name hashing. In this video I will show you 4 fast methods how you can do the API resolving of REvil Ransomware related to Kaseya attack.

3 methods are for IDAPro (renimp.idc + memsnapshot, Universal Unpacker Manual Reconstruct, Pe-Tree) and last 1 method (x64dbg + Scylla plugin)

https://www.youtube.com/watch?v=QYQQUUpU04s

#revil #ransomware #kaseya #api #resolving #video
📽@cRyPtHoN_INFOSEC_FR
📽
@cRyPtHoN_INFOSEC_EN
📽
@cRyPtHoN_INFOSEC_DE
📽
@BlackBox_Archiv
A Conversation with Daniel Ellsberg - by Edward Snowden.mpeg
35.8 MB
A Conversation with Daniel Ellsberg - The whistleblower who started it all

For the Fourth of July, I reached out to an old friend, Daniel Ellsberg, to experiment with recording little conversations for you about big topics. Production quality will be a bit rough around the edges until I get the hang of it, but I hope you enjoy it.

https://edwardsnowden.substack.com/p/ellsberg1

#snowden #ellsberg #whistleblower #podcast
🎙@cRyPtHoN_INFOSEC_FR
🎙
@cRyPtHoN_INFOSEC_EN
🎙
@cRyPtHoN_INFOSEC_DE
🎙
@BlackBox_Archiv
Linux version of HelloKitty ransomware targets VMware ESXi servers

The ransomware gang behind the highly publicized attack on CD Projekt Red uses a Linux variant that targets VMware's ESXi virtual machine platform for maximum damage.

As the enterprise increasingly moves to virtual machines for easier backup and resource management, ransomware gangs are evolving their tactics to create Linux encryptors that target these servers.

VMware ESXi is one of the most popular enterprise virtual machine platforms. Over the past year, there has been an increasing number of ransomware gangs releasing Linux encryptors targeting this platform.

https://www.bleepingcomputer.com/news/security/linux-version-of-hellokitty-ransomware-targets-vmware-esxi-servers/

#hellokitty #linux #ransomware
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
Security Analysis of Telegram (Symmetric Part)

We performed a detailed security analysis of the encryption offered by the popular Telegram messaging platform. As a result of our analysis, we found several cryptographic weaknesses in the protocol, from technically trivial and easy to exploit to more advanced and of theoretical interest.

For most users, the immediate risk is low, but these vulnerabilities highlight that Telegram fell short of the cryptographic guarantees enjoyed by other widely deployed cryptographic protocols such as TLS. We made several suggestions to the Telegram developers that enable providing formal assurances that rule out a large class of cryptographic attacks, similarly to other, more established, cryptographic protocols.

We disclosed the following vulnerabilities to the Telegram development team on 16 April 2021 and agreed with them on a disclosure on 16 July 2021:

https://mtpsym.github.io/

💡 Read as well: Four cryptographic vulnerabilities in Telegram
https://t.iss.one/BlackBox_Archiv/2391

#telegram #messenger #security #vulnerabilities #disclosure
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
Hooking Candiru Another Mercenary Spyware Vendor Comes into Focus

💡 Summary:

Candiru is a secretive Israel-based company that sells spyware exclusively to governments. Reportedly, their spyware can infect and monitor iPhones, Androids, Macs, PCs, and cloud accounts.

Using Internet scanning we identified more than 750 websites linked to Candiru’s spyware infrastructure. We found many domains masquerading as advocacy organizations such as Amnesty International, the Black Lives Matter movement, as well as media companies, and other civil-society themed entities.

We identified a politically active victim in Western Europe and recovered a copy of Candiru’s Windows spyware.

Working with Microsoft Threat Intelligence Center (MSTIC) we analyzed the spyware, resulting in the discovery of CVE-2021-31979 and CVE-2021-33771 by Microsoft, two privilege escalation vulnerabilities exploited by Candiru. Microsoft patched both vulnerabilities on July 13th, 2021.

As part of their investigation, Microsoft observed at least 100 victims in Palestine, Israel, Iran, Lebanon, Yemen, Spain, United Kingdom, Turkey, Armenia, and Singapore. Victims include human rights defenders, dissidents, journalists, activists, and politicians.

We provide a brief technical overview of the Candiru spyware’s persistence mechanism and some details about the spyware’s functionality.

Candiru has made efforts to obscure its ownership structure, staffing, and investment partners. Nevertheless, we have been able to shed some light on those areas in this report.

https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/

#candiru #mercenary #spyware #israel
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv