Corrupting memory without memory corruption https://github.blog/2022-07-27-corrupting-memory-without-memory-corruption/
The GitHub Blog
Corrupting memory without memory corruption
In this post I’ll exploit CVE-2022-20186, a vulnerability in the Arm Mali GPU kernel driver and use it to gain arbitrary kernel memory access from an untrusted app on a Pixel 6. This then allows me to gain root and disable SELinux. This vulnerability highlights…
DDoS Attack Case Study: 20 Hours of Unprovoked Aggression https://blog.criminalip.io/2022/07/27/ddos-attack-case/
CIP Blog
DDoS Attack Case Study: 20 Hours of Unprovoked Aggression
Recently, there was a GET Flooding Attack-type DDoS attack case on a web services company for about 20 hours. Various attack traffic was detected on the login page, which caused a serious load on the server and ultimately paralyzed the entire login function.…
Creating Processes Using System Calls
https://www.coresecurity.com/core-labs/articles/creating-processes-using-system-calls
https://www.coresecurity.com/core-labs/articles/creating-processes-using-system-calls
Coresecurity
Creating Processes Using System Calls | Core Security
This article discusses weaponizing NtCreateUserProcess so that it can be used on defended environments in a way that is reliable and useful.
Inside Matanbuchus: A Quirky Loader https://www.cyberark.com/resources/threat-research-blog/inside-matanbuchus-a-quirky-loader
Cyberark
Inside Matanbuchus: A Quirky Loader
An in-depth analysis of Matanbuchus loader’s tricks and loading techniques Matanbuchus is a Malware-as-a-Service loader that has been sold on underground markets for more than one year....
A journey into IoT – Unknown Chinese alarm – Part 3 – Radio communications https://security.humanativaspa.it/a-journey-into-iot-unknown-chinese-alarm-part-3-radio-communications/
hn security
A journey into IoT - Unknown Chinese alarm - Part 3 - Radio communications - hn security
Disclaimer: as many other security researchers […]
A Detailed Analysis of the RedLine Stealer https://securityscorecard.com/research/detailed-analysis-redline-stealer
SecurityScorecard
A Detailed Analysis of the RedLine Stealer
RedLine is a stealer distributed as cracked games, applications, and services. See how this malware affected FileZilla, Telegram, and more.
NIST SIKE finalist for quantum safe crypto has been broken by a very efficient classical computer attack https://eprint.iacr.org/2022/975.pdf
Cryptominer detection: a Machine Learning approach https://sysdig.com/blog/how-train-crypto-miner-detection-model/
Sysdig
Cryptominer detection: a Machine Learning approach – Sysdig
Cryptominers are one of the main cloud threats today. Detecting crypto miners is a complex task, but machine learning could help to develop a robust detection algorithm.
Concealed code execution: Techniques and detection https://www.huntandhackett.com/blog/concealed-code-execution-techniques-and-detection
Huntandhackett
Concealed code execution: Techniques and detection
After months of dedicated research we cover a wide range of concealed code execution techniques and investigate their mechanisms and how to detect them.
Targeted attack on industrial enterprises and public institutions https://ics-cert.kaspersky.com/publications/reports/2022/08/08/targeted-attack-on-industrial-enterprises-and-public-institutions/
Kaspersky ICS CERT | Kaspersky Industrial Control Systems Cyber Emergency Response Team
Targeted attack on industrial enterprises and public institutions | Kaspersky ICS CERT
The attackers were able to penetrate dozens of enterprises and even hijack the IT infrastructure of some, taking control of systems used to manage security solutions. The goal of this series of attacks was cyberespionage.
Threat analysis: Follina exploit fuels 'live-off-the-land' attacks https://blog.reversinglabs.com/blog/threat-analysis-follina-exploit-powers-live-off-the-land-attacks
ReversingLabs
Threat analysis: Follina exploit fuels 'live-off-the-land' attacks
An analysis of three in-the-wild payloads delivered using the Follina exploit shows how attackers can boost efforts to avoid detection by security tools.
Enhancing Subdomain Enumeration - ENTs and NOERROR https://www.securesystems.de/blog/enhancing-subdomain-enumeration-ents-and-noerror/
Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study https://research.nccgroup.com/2022/08/11/detecting-dns-implants-old-kitten-new-tricks-a-saitama-case-study/
Researching Xiaomi’s TEE to get to Chinese money https://research.checkpoint.com/2022/researching-xiaomis-tee/
Check Point Research
Researching Xiaomi’s TEE to get to Chinese money - Check Point Research
Research By: Slava Makkaveev Introduction Have you ever wondered if it is safe to make payments from a mobile device? Can a malicious app steal money from your digital wallet? According to the latest statistics, the Far East and China accounted for two-thirds…
Process Behaviour Anomaly Detection Using eBPF and Unsupervised-Learning Autoencoders https://www.evilsocket.net/2022/08/15/Process-behaviour-anomaly-detection-using-eBPF-and-unsupervised-learning-Autoencoders/
evilsocket
Process Behaviour Anomaly Detection Using eBPF and Unsupervised-Learning Autoencoders
Process injection: breaking all macOS security layers with a single vulnerability https://sector7.computest.nl/post/2022-08-process-injection-breaking-all-macos-security-layers-with-a-single-vulnerability/
Sector 7
Process injection: breaking all macOS security layers with a single vulnerability
If you have created a new macOS app with Xcode 13.2, you may noticed this new method in the template:
- (BOOL)applicationSupportsSecureRestorableState:(NSApplication *)app { return YES; } This was added to the Xcode template to address a process injection…
- (BOOL)applicationSupportsSecureRestorableState:(NSApplication *)app { return YES; } This was added to the Xcode template to address a process injection…
Make your bets 🙂 » Wheel of Fortune Outcome Prediction – Taking the Luck out of Gambling
https://research.nccgroup.com/2022/08/16/wheel-of-fortune-outcome-prediction-taking-the-luck-out-of-gambling/
https://research.nccgroup.com/2022/08/16/wheel-of-fortune-outcome-prediction-taking-the-luck-out-of-gambling/
NCC Group Research Blog
Wheel of Fortune Outcome Prediction – Taking the Luck out of Gambling
Authored by: Jesús Miguel Calderón Marín Introduction Two years ago I carried out research into online casino games specifically focusing on roulette. As a result, I composed a detailed guide with …
The LDT, a Perfect Home for All Your Kernel Payloads https://blog.ret2.io/2022/08/17/macos-dblmap-kernel-exploitation/
RET2 Systems Blog
The LDT, a Perfect Home for All Your Kernel Payloads
With the broad adoption of Kernel Address Space Layout Randomization (KASLR) by modern systems, obtaining an information leak is a necessary component of mos...