Threat Actor “UAC-0099”: Exploiting CVE-2023-38831 Against Ukraine https://securityonline.info/threat-actor-uac-0099-exploiting-cve-2023-38831-against-ukraine/
Daily CyberSecurity
Threat Actor "UAC-0099": Exploiting CVE-2023-38831 Against Ukraine
Cyber threat actor UAC-0099 has been actively targeting Ukraine since mid-2022, according to insights from the Deep Instinct Threat Lab
Rust Binary Analysis, Feature by Feature https://research.checkpoint.com/2023/rust-binary-analysis-feature-by-feature/
Check Point Research
Rust Binary Analysis, Feature by Feature - Check Point Research
Problem Statement You attempt to analyze a binary file compiled in the Rust programming language. You open the file in your favorite disassembler. Twenty minutes later you wish you had never been born. You’ve trained yourself to think like g++ and msvc: Here’s…
👌3
CVE-2023-42465: SUDO Affected by Stack/Register Flaw, OpenSSH, OpenSSL, and MySQL are Vulnerable https://securityonline.info/cve-2023-42465-sudo-affected-by-stack-register-flaw-openssh-openssl-and-mysql-are-vulnerable/
Daily CyberSecurity
CVE-2023-42465: SUDO Affected by Stack/Register Flaw, OpenSSH, OpenSSL, and MySQL are Vulnerable
Researchers issued CVE-2023-42465 for SUDO for this vulnerability. This flaw classified as critical has been found in sudo up to 1.9.14.
🔥2
Patching DLLs with BDF https://cryptonominom.com/2023/12/22/DLL-Patching.html
Cryptonominom
Patching DLLs with BDF
TL;DR
Biometric Bypass: Chameleon Banking Trojan Evolves, Android 13 Vulnerable https://securityonline.info/biometric-bypass-chameleon-banking-trojan-evolves-android-13-vulnerable/
Cybersecurity News
Biometric Bypass: Chameleon Banking Trojan Evolves, Android 13 Vulnerable
ThreatFabric detected "Chameleon," a banking trojan first identified in early 2023. This malicious entity, thriving in the digital ecosystem
fnoios: Redirect spawned iOS application stdout and stderr to pty https://github.com/NSEcho/fnoios
GitHub
GitHub - NSEcho/fnoios: Redirect spawned iOS application stdout and stderr to pty
Redirect spawned iOS application stdout and stderr to pty - NSEcho/fnoios
Phishing for Secrets: Operation RusticWeb Casts Net on Indian Officials https://securityonline.info/phishing-for-secrets-operation-rusticweb-casts-net-on-indian-officials/
Daily CyberSecurity
Phishing for Secrets: Operation RusticWeb Casts Net on Indian Officials
Dubbed Operation RusticWeb, this campaign, uncovered in October 2023, demonstrates a nuanced approach to cyber espionage.
Parsing MSDN for (Documented) Technique Development https://signal-labs.com/parsing-msdn-for-documented-technique-dev/
Signal Labs
Parsing MSDN for (Documented) Technique Development | Advanced Offensive Cybersecurity Training
Parsing MSDN to discover potentially abusable APIs
👌1
Operation Triangulation: The last (hardware) mystery https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/
Securelist
Operation Triangulation: The last (hardware) mystery
Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.
CrushFTP - CVE-2023-43177 Unauthenticated Remote Code Execution https://blog.projectdiscovery.io/crushftp-rce/
ProjectDiscovery
CrushFTP - CVE-2023-43177 Unauthenticated Remote Code Execution — ProjectDiscovery Blog
CVE-2023-43177 is a critical vulnerability in CrushFTP. The vulnerability could potentially allow unauthenticated attackers with network access to the CrushFTP Instance to write files in the local file system and eventually in some versions could allow the…
The Present Threat of Row Hammer Attacks https://medium.com/@don.aust/the-present-threat-of-row-hammer-attacks-f504e3017047
Medium
The Present Threat of Row Hammer Attacks
In 2014 Google researchers discovered strange interference between memory locations in DDR3, DDR4, and DDR5 Random Access Memory (RAM.) On…
Building an Exploit for FortiGate Vulnerability CVE-2023-27997 https://bishopfox.com/blog/building-exploit-fortigate-vulnerability-cve-2023-27997
Bishop Fox
Building an Exploit for FortiGate Vulnerability CVE-2023-27997
Learn how Bishop Fox built a POC exploit for the pre-authentication remote code injection vulnerability in the Fortinet SSL VPN published by Lexfo.
BPF Memory Forensics with Volatility 3 https://lolcads.github.io/posts/2023/12/bpf_memory_forensics_with_volatility3/
lolcads tech blog
BPF Memory Forensics with Volatility 3
BPF Memory Forensics with Volatility 3 Introduction and Motivation Have you ever wondered how an eBPF rootkit looks like? Well, here’s one, have a good look:
Upon receiving a command and control (C2) request, this specimen can execute arbitrary commands on…
Upon receiving a command and control (C2) request, this specimen can execute arbitrary commands on…
🔥1
Scheduled Task Tampering https://ipurple.team/2024/01/03/scheduled-task-tampering/
Purple Team
Scheduled Task Tampering
The HAFNIUM threat actor is using an unconventional method to tamper scheduled tasks in order to establish persistence via modification of registry keys in their malware called Tarrask. The benefit…
Bitwarden Heist - How to Break Into Password Vaults Without Using Passwords https://blog.redteam-pentesting.de/2024/bitwarden-heist/
RedTeam Pentesting - Blog
Bitwarden Heist - How to Break Into Password Vaults Without Using Passwords
Sometimes, making particular security design decisions can have unexpected consequences. For security-critical software, such as password managers, this can easily lead to catastrophic failure: In this blog post, we show how Bitwarden’s Windows Hello …
SMTP Smuggling: New Flaw Lets Attackers Bypass Security and Spoof Emails https://thehackernews.com/2024/01/smtp-smuggling-new-threat-enables.html
Telerecon: A reconnaissance framework for researching and investigating Telegram. https://github.com/sockysec/Telerecon
GitHub
GitHub - sockysec/Telerecon: A reconnaissance framework for researching and investigating Telegram.
A reconnaissance framework for researching and investigating Telegram. - GitHub - sockysec/Telerecon: A reconnaissance framework for researching and investigating Telegram.
❤1
Security: [0-day] heap overflow in vp8_encode_frame after frame re-sizing https://issues.chromium.org/issues/40073300