Investigating the Emerging Access-as-a-Service Market https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/investigating-the-emerging-access-as-a-service-market
Trendmicro
Investigating the Emerging Access-as-a-Service Market
We examine an emerging business model that involves access brokers selling direct access to organizations and stolen credentials to other malicious actors.
The hidden side of Seclogon part 2: Abusing leaked handles to dump LSASS memory https://splintercod3.blogspot.com/p/the-hidden-side-of-seclogon-part-2.html
Extracting passwords from hiberfil.sys and memory dumps https://diverto.github.io/2019/11/05/Extracting-Passwords-from-hiberfil-and-memdumps
diverto.github.io
Extracting passwords from hiberfil.sys and memory dumps
When in password hunting mode and having access to the filesystem of the target, most people would reach out to SAM and/or extracting cached credentials.
While this can usually be the way to go, it can pose a huge challenge, as the result can depend on the…
While this can usually be the way to go, it can pose a huge challenge, as the result can depend on the…
A new StrongPity variant hides behind Notepad++ installation https://blog.minerva-labs.com/a-new-strongpity-variant-hides-behind-notepad-installation
CSPM, CIEM, CWPP, and CNAPP: Guess who in cloud security landscape https://sysdig.com/blog/cnapp-cloud-security-sysdig/
Sysdig
Who’s Who in Cloud Security? CSPM, CIEM, CWPP & CNAPP Explained
CNAPP platforms – are steadily gaining traction as the best solutions to address Cloud Native security. This blog will explain them in depth.
Pwn2Own Local Escalation of Privilege Category — Ubuntu Desktop Exploit https://flatt.tech/assets/reports/210401_pwn2own/whitepaper.pdf
Process Ghosting https://pentestlaboratories.com/2021/12/08/process-ghosting/
Pentest Laboratories
Process Ghosting
Understanding how endpoint products work to identify malicious actions can lead to the discovery of security gaps which can be used for evasion during red team operations. The technique Process Her…
Nice explanation on the basics » A simple x86_64 stack based buffer overflow exploitation with gdb https://oxagast.org/posts/simple-buffer-overflow-exploitation-walkthrough-gdb/
oxagast.org oxasploits
A simple x86_64 stack based buffer overflow exploitation with gdb
Background
Malicious IFilter: a DLL waiting patiently (not even loaded) until the file with a particular extension appears, then it executes as the LOCALSYSTEM https://github.com/gtworek/PSBits/tree/master/IFilter
GitHub
PSBits/IFilter at master · gtworek/PSBits
Simple (relatively) things allowing you to dig a bit deeper than usual. - gtworek/PSBits
FIN13: A Cybercriminal Threat Actor Focused on Mexico https://www.mandiant.com/resources/fin13-cybercriminal-mexico
Google Cloud Blog
FIN13: A Cybercriminal Threat Actor Focused on Mexico | Mandiant | Google Cloud Blog
Threat news: TeamTNT stealing credentials using EC2 Instance Metadata https://sysdig.com/blog/teamtnt-aws-credentials/
Sysdig
Threat news: TeamTNT stealing credentials using EC2 Instance Metadata
TeamTNT malware targeted a Kubernetes Pod and attempted to steal AWS credentials using the EC2 instance metadata.
Is your web browser vulnerable to data theft? XS-Leak explained https://blog.malwarebytes.com/explained/2021/12/is-your-web-browser-vulnerable-to-data-theft-xs-leak-explained/
Malwarebytes Labs
Is your web browser vulnerable to data theft? XS-Leak explained
IT security researchers recently exposed new cross-site leak (XS-Leak) attacks against modern-day browsers. But what is XS-Leak anyway?
Driver-Based Attacks: Past and Present https://www.rapid7.com/blog/post/2021/12/13/driver-based-attacks-past-and-present/
Rapid7
Driver-Based Attacks: Past and Present | Rapid7 Blog
Leaking EPROCESS address of the specific SYSTEM processes https://blog.rewolf.pl/blog/?p=1683
A phishing document signed by Microsoft – part 1 https://outflank.nl/blog/2021/12/09/a-phishing-document-signed-by-microsoft/
Nice reading after all the madness » Log4Shell: RCE 0-day exploit found in log4j 2, a popular Java logging package https://www.lunasec.io/docs/blog/log4j-zero-day/
Analysis of Initial In The Wild Attacks Exploiting Log4Shell/Log4J/CVE-2021-44228 https://www.cadosecurity.com/analysis-of-initial-in-the-wild-attacks-exploiting-log4shell-log4j-cve-2021-44228/
Cado
Analysis of Initial In The Wild Attacks Exploiting Log4Shell/Log4J/CVE-2021-44228
Log4J is an open-source logging platform running on Java and built-in to many web platforms. Reports of exploitation started on December 9th.
CVE-2021-44228 vulnerability in Apache Log4j library https://securelist.com/cve-2021-44228-vulnerability-in-apache-log4j-library/105210
Securelist
CVE-2021-44228 vulnerability in Apache Log4j library
The summary of the critical vulnerability CVE-2021-44228 in the Apache Log4j library, technical details and mitigations.
Log4Shell Update: Second log4j Vulnerability Published (CVE-2021-44228 + CVE-2021-45046) https://www.lunasec.io/docs/blog/log4j-zero-day-update-on-cve-2021-45046/
Exploiting and Mitigating CVE-2021-44228: Log4j Remote Code Execution (RCE) https://sysdig.com/blog/exploit-detect-mitigate-log4j-cve/
Sysdig
Exploiting, Mitigating, and Detecting CVE-2021-44228: Log4j Remote Code Execution (RCE) | Sysdig
The CVE-2021-44228 is a CRITICAL vulnerability that allows attackers to execute arbitrary code on a machine. Updating log4j to 2.16.0.
Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/
Microsoft News
Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability
Microsoft is tracking threats taking advantage of the remote code execution (RCE) vulnerability in Apache Log4j 2. Get technical info and guidance for using Microsoft security solutions to protect against attacks.