BlackBox (Security) Archiv
4.04K subscribers
183 photos
393 videos
167 files
2.67K links
๐Ÿ‘‰๐Ÿผ Latest viruses and malware threats
๐Ÿ‘‰๐Ÿผ Latest patches, tips and tricks
๐Ÿ‘‰๐Ÿผ Threats to security/privacy/democracy on the Internet

๐Ÿ‘‰๐Ÿผ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
Zippyshare - Inofrmation about the closure of the project

Hey Folks,

Weโ€™ve decided that weโ€™re shutting down the project at the end of the month. Please make backups of your important files, you have about two weeks to do so. Until then, the site will run without any changes.

There are several reasons for the closure:

โ€“ Since 2006 we have been on the market in an unchanged form, that is, as ad financed/free file hosting. However, you have been visiting in less and less over the years, as the arguably very simple formula of the services we offer is slowly running out of steam. I guess all the competing file storage service companies on the market look better, offer better performance and more features. No one needs a dinosaur like us anymore.

https://blog.zippyshare.com/

#zippyshare
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ˜ฑ14๐Ÿ‘3
I Think I Found a Privacy Exploit in ChatGPT

tl;dr:
I found that if you pass empty prompts to ChatGPT it spits back results anyway At first I thought they might be hallucinations but now I believe I'm also getting back other people's responses

https://tane.dev/2023/04/i-think-i-found-a-privacy-exploit-in-chatgpt/

#chatgpt #exploit #privacy
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘17
Indian government gives itself the power to โ€œfact-checkโ€ and delete social media posts

Journalists, opposition parties, and advocacy groups are worried what this โ€œabsolute powerโ€ means for press freedom in India

The Indian government on April 6 announced a state-run fact-checking unit that will have sweeping powers to label any piece of information related to the government as โ€œfake, false or misleadingโ€ and have it removed from social media. The country has tweaked its tech rules that now require platforms such as Facebook, Twitter, and Instagram to take down content flagged by the fact-checking body. Internet service providers are also expected to block URLs to such content. Failure to comply could result in the platforms losing safe harbor protection that safeguards them from legal action against any content posted by their users, said Indiaโ€™s minister of information technology, Rajeev Chandrasekhar.

โ€œThe amended rules now also make it obligatory on the intermediaries to not to publish, share or host fake, false or misleading information in respect of any business of the Central Government. [This] fake, false or misleading information will [be] identified by the notified Fact Check Unit of the Central Government,โ€ the government said in a press release.

https://restofworld.org/2023/indian-government-fact-check-delete-social-media/

https://www.pib.gov.in/PressReleasePage.aspx?PRID=1914358

#india
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ”ฅ10๐Ÿ‘3๐Ÿ˜ฑ2โค1
Global Surveillance: The Secretive Swiss Dealer Enabling Israeli Spy Firms

The international mobile system is exposed and a loophole allows hackers, cybercriminals and states to geolocate targets and even hijack email and web accounts. Israelis can be found among the victims - and the attackers

https://www.haaretz.com/israel-news/security-aviation/2023-05-10/ty-article-magazine/.premium/global-surveillance-the-secretive-swiss-dealer-enabling-israeli-spy-firms/00000188-0005-dc7e-a3fe-22cdf2900000

#surveillance
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ˜ฑ5โค1๐Ÿ”ฅ1
Google Unlocked

Google Unlocked is an open source browser extension, which unlocks hidden google search results.

The extension scans hidden search results that were censored by Google due to complaints. Use it wisely.

https://github.com/Ibit-to/google-unlocked

#google #search #osint
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘2
Media is too big
VIEW IN TELEGRAM
How to be Invisible Online (and the hard truth about it)

Don't be fooled ... Occupy The Web (OTW) tells us the hard truth about being anonymous online. The brutal truth: Will using your neigbors wifi keep you anonymous? Can you hide from the NSA? Can you hide from Google and other companies? Will Tor help you? Will Proxy Chains help? Which phone do you need to use - Android or iPhone or something else? Which operating system - Windows, macOS or Linux? What is the truth? What do you need to use?

https://www.youtube.com/watch?v=LEbAxsYRMcQ

#video #otw #invisible #online
๐ŸŽฅ@cRyPtHoN_INFOSEC_IT
๐ŸŽฅ
@cRyPtHoN_INFOSEC_FR
๐ŸŽฅ
@cRyPtHoN_INFOSEC_EN
๐ŸŽฅ
@cRyPtHoN_INFOSEC_DE
๐ŸŽฅ
@BlackBox_Archiv
๐Ÿ‘7โค2
Compromised from Within: The Unauthorized Restoration of TorGuardโ€™s Telegram Channel

This is the comprehensive, substantiated account of how TorGuardโ€™s deleted Telegram Channel was improperly resurrected and handed over to a known fraudster, by a paid insider at Telegram. We bring forth irrefutable evidence, shedding light on this disturbing violation, which calls into question the integrity of Telegramโ€™s internal security mechanisms.

https://medium.com/@TorGuard/compromised-from-within-the-unauthorized-restoration-of-torguards-telegram-channel-dce4c5836

#telegram #torguard
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ˜ฑ2
Compromised from Within (Part 2): Telegram Support Finally Responds

In this follow-up post, we clarify misunderstandings about channel deletion on Telegram, learned through interactions with Reddit users, Telegram Support, and Telegram CEO Pavel Durov. It appears you canโ€™t delete channels with over 1K subscribers โ€” only Telegram Support can, shedding new light on our previous โ€œunauthorized channel restorationโ€ misunderstanding.

https://medium.com/@TorGuard/compromised-from-within-part-2-telegram-support-finally-responds-a30b7e66e859

#telegram #torguard
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ”ฅ4๐Ÿ‘3
File Archiver In The Browser

This article explores a phishing technique that emulates a file archiver software in the browser while using a .zip domain.

Introduction

Last week Google released several new top-level domains (TLDs) including .dad, .phd, .mov and .zip. Many members of the security community began posting about concerns they had with TLDs that can be mistaken for file extensions, specifically, .mov and .zip. The intention of this article isnโ€™t to discuss my opinion on the topic, instead, Iโ€™ll be showcasing how it can be used to enhance phishing engagements.

With this phishing attack, you simulate a file archiver software (e.g. WinRAR) in the browser and use a .zip domain to make it appear more legitimate.

https://mrd0x.com/file-archiver-in-the-browser/

#tlds #poc #phishing
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘3โค1
Media is too big
VIEW IN TELEGRAM
Documenting the rise of facial recognition in the UK

Facial recognition surveillance turns us into walking ID cards, and treats members of the public like suspects in a high-tech police line up.

Our new detailed report, Biometric Britain: The Expansion of Facial Recognition Surveillance, lays out how police, retailers, tech companies and even some schools are investing huge sums of money into this intrusive technology.

https://bigbrotherwatch.org.uk/campaigns/stop-facial-recognition/#report

https://www.youtube.com/watch?v=bX-Yxy1ESAQ

#surveillance #uk
๐ŸŽฅ@cRyPtHoN_INFOSEC_IT
๐ŸŽฅ
@cRyPtHoN_INFOSEC_FR
๐ŸŽฅ
@cRyPtHoN_INFOSEC_EN
๐ŸŽฅ
@cRyPtHoN_INFOSEC_DE
๐ŸŽฅ
@BlackBox_Archiv
๐Ÿ˜ฑ5โค2๐Ÿ‘2
MullvadVPN - Removing the support for forwarded ports

Today we announce that we no longer support port forwarding. New port forwards will no longer be supported, and existing ports will be removed 2023-07-01.

https://mullvad.net/en/blog/2023/5/29/removing-the-support-for-forwarded-ports/

#mullvad #vpn
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘5๐Ÿ˜ฑ3
When Hackers hack the Hackers - Malware Analysis for a group targeting Malware Developers

Last year, our experts had the opportunity to observe the execution of non-standard processes in a sandbox-like, isolated virtual machine (VM). Further analysis of these processes revealed Command & Control (C2) connections using Discord for communication. As we continued to analyse the C2 agent, we also gained access to the attacker's Discord channel and were able to take a look at all the commands and modules executed for many more compromised systems.

This attacker/group was very different to the ones we typically see while doing Incident Response for our customers in terms of the motivation and goals. It seemed, that this attacker was mainly compromising Malware developers and or Offensive Security related people to steal and sell code from the target systems. In this post, the malware analysis process, as well as attacker activities and Indicators of Compromise (IoCs) are presented.

https://www.r-tec.net/r-tec-blog-when-hackers-hack-the-hackers.html

#malware
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘2
From โ€œHeavy Purchasersโ€ of Pregnancy Tests to the Depression-Prone: We Found 650,000 Ways Advertisers Label You

A spreadsheet on ad platform Xandrโ€™s website revealed a massive collection of โ€œaudience segmentsโ€ used to target consumers based on highly specific, sometimes intimate information and inferences

What words would you use to describe yourself? You might say youโ€™re a dog owner, a parent, that you like Taylor Swift, or that youโ€™re into knitting. If you feel like sharing, you might say you have a sunny personality or that you follow a certain religion.

๐Ÿ‘€ https://web.archive.org/web/20230525225839/https://docs.xandr.com/en-US/bundle/monetize_monetize-standard/page/topics/data-marketplace-buyer-overview.html

๐Ÿ‘€ https://web.archive.org/web/20230525225541mp_/https://xandr-be-prod.zoominsoftware.io/bundle/monetize_monetize-standard/page/attachments/data-marketplace-buyer-overview/data_marketplace_public_segments_pricing_05212021.xlsx

https://themarkup.org/privacy/2023/06/08/from-heavy-purchasers-of-pregnancy-tests-to-the-depression-prone-we-found-650000-ways-advertisers-label-you

#privacy #advertising #thinkabout
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘1
LLMs are good at playing you

Large language models (LLMs) are eerily human-like: in casual conversations, they mimic humans with near-perfect fidelity. Their language capabilities hold promise for some fields โ€” and spell trouble for others. But above all, the modelsโ€™ apparent intellect makes us ponder the fate of humanity. I donโ€™t know what the future holds, but I think it helps to understand how often the models simply mess with our heads.

Recall that early LLMs were highly malleable: that is, they would go with the flow of your prompt, with no personal opinions and no objective concept of truth, ethics, or reality. With a gentle nudge, a troll could make them spew out incoherent pseudoscientific babble โ€” or cheerfully advocate for genocide. They had amazing linguistic capabilities, but they were just quirky tools.

https://lcamtuf.substack.com/p/llms-are-better-than-you-think-at

#llm
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘4๐Ÿ‘Ž2โค1