Bling Libra’s Tactical Evolution: The Threat Actor Group Behind ShinyHunters Ransomware #BlingLibra #ShinyHunters #Ransomware #AWS #ThreatActor https://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/
Unit 42
Bling Libra’s Tactical Evolution: The Threat Actor Group Behind ShinyHunters Ransomware
We analyze a recent incident by Bling Libra, the group behind ShinyHunters ransomware as they shift from data theft to extortion, exploiting AWS credentials.
State-backed attackers and commercial surveillance vendors repeatedly use the same exploits https://blog.google/threat-analysis-group/state-backed-attackers-and-commercial-surveillance-vendors-repeatedly-use-the-same-exploits/
Google
State-backed attackers and commercial surveillance vendors repeatedly use the same exploits
We’re sharing an update on suspected state-backed attacker APT29 and the use of exploits identical to those used by Intellexa and NSO.
Bypassing airport security via SQL injection #AirportSecurity #SQLInjection #KCM #CASS #CybersecurityVulnerability https://ian.sh/tsa
Bypassing airport security via SQL injection
We discovered a serious vulnerability in the Known Crewmember (KCM) and Cockpit Access Security System (CASS) programs used by the Transportation Security Administration.
Analysis of CVE-2024-43044 — From file read to RCE in Jenkins through agents #CVE202443044 #JenkinsRCE #ArbitraryFileRead #JenkinsSecurity #CodeExploit https://blog.convisoappsec.com/en/analysis-of-cve-2024-43044
Conviso AppSec
Analysis of CVE-2024-43044 — From file read to RCE in Jenkins through agents
The Jenkins team released an advisory (CVE-2024-43044) for an arbitrary file read vulnerability that allows an agent to be able to read files
On the Security of Halo2 Proof System #Halo2 #ZKPs #ZeroKnowledgeProofs #SecurityAnalysis #PostQuantumSecurity https://research.kudelskisecurity.com/2024/09/24/on-the-security-of-halo2-proof-system/
Kudelski Security Research
On the Security of Halo2 Proof System
Introduction Zero-Knowledge Proofs (ZKPs) enable individuals to prove that they know or possess a piece of information without revealing the actual data. In this process, a “prover” gen…
North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit #NorthKoreanHackers #ChromeZeroDay #FudModuleRootkit #CybersecurityNews #MicrosoftDetection https://thehackernews.com/2024/08/north-korean-hackers-deploy-fudmodule.html
The Wild West of Proof of Concept Exploit Code (PoC) #PoCExploitCode #QualysTRU #CVE20246387 #HESIODexploit https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
Mind the Patch Gap: Exploiting an io_uring Vulnerability in Ubuntu #UbuntuPatchGap #io_uringVulnerability #DataOnlyExploit #CVE-2024-0582 #LinuxKernelBug https://blog.exodusintel.com/2024/03/27/mind-the-patch-gap-exploiting-an-io_uring-vulnerability-in-ubuntu/
Exodus Intelligence
Mind the Patch Gap: Exploiting an io_uring Vulnerability in Ubuntu - Exodus Intelligence
By Oriol Castejón Overview This post discusses a use-after-free vulnerability, CVE-2024-0582, in io_uring in the Linux kernel. Despite the vulnerability being patched in the stable kernel in December 2023, it wasn’t ported to Ubuntu kernels for over two months…
🔥1
Exploitation of a kernel pool overflow from a restrictive chunk size (CVE-2021-31969) #MemoryCorruption #WindowsVulnerability #CVE-2021-31969 #Exploit #KernelPoolOverflow https://starlabs.sg/blog/2023/11-exploitation-of-a-kernel-pool-overflow-from-a-restrictive-chunk-size-cve-2021-31969/
STAR Labs
Exploitation of a kernel pool overflow from a restrictive chunk size (CVE-2021-31969)
Introduction The prevalence of memory corruption bugs persists, posing a persistent challenge for exploitation. This increased difficulty arises from advancements in defensive mechanisms and the escalating complexity of software systems. While a basic proof…
🔥2
Exploiting Enterprise Backup Software For Privilege Escalation: Part One #ExploitingEnterpriseBackupSoftware #PrivilegeEscalation #KernelDriverVulnerability #CyberSecurity #PartOne https://northwave-cybersecurity.com/exploiting-enterprise-backup-software-for-privilege-escalation-part-one
Exploiting Enterprise Backup Software For Privilege Escalation: Part Two #KernelDriverZeroDays #PrivilegeEscalation #ExploitationPrimitives #TechnicalIntricacies #HeapSpray https://northwave-cybersecurity.com/exploiting-enterprise-backup-software-for-privilege-escalation-part-two
traceeshark: Deep Linux runtime visibility meets Wireshark #Traceeshark #Linux #Wireshark #MalwareAnalysis #SecurityVisibility https://github.com/aquasecurity/traceeshark
GitHub
GitHub - aquasecurity/traceeshark: Deep Linux runtime visibility meets Wireshark
Deep Linux runtime visibility meets Wireshark. Contribute to aquasecurity/traceeshark development by creating an account on GitHub.
👍1
CVE-2024-37084: Spring Cloud Remote Code Execution #SpringCloud #CVE-2024-37084 #SecureLayer7 #PenetrationTesting #APIScanner https://blog.securelayer7.net/spring-cloud-skipper-vulnerability/
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
CVE-2024-37084: Spring Cloud Remote Code Execution
CVE-2024-37084 is a critical security vulnerability in Spring Cloud Skipper, specifically related to how the application processes YAML input. The vulnerability arises from the use of the standard...
From a GLPI patch bypass to RCE #SensePost #GLPI #PatchBypass #RCE #SQLInjection https://sensepost.com/blog/2024/from-a-glpi-patch-bypass-to-rce/
EUCLEAK #SecureElement #Infineon #SideChannelAttack #EUCLEAK #YubiKey5Series https://ninjalab.io/eucleak/
NinjaLab
EUCLEAK - NinjaLab
Download the Writeup Illustration Romain Flamand – Flamingo Studio – [email protected] Abstract Secure elements are small microcontrollers whose main purpose is to generate/store secrets and then execute cryptographic operations. They undergo the highest…
Patch Tuesday Diffing: CVE-2024-20696 - Windows Libarchive RCE #PatchTuesday #CVE-2024-20696 #Windows #Libarchive #RCE https://clearbluejar.github.io/posts/patch-tuesday-diffing-cve-2024-20696-windows-libarchive-rce/
clearbluejar
Patch Tuesday Diffing: CVE-2024-20696 - Windows Libarchive RCE
Patch Diffing CVE-2024-20696 Windows Libarchive Remote Code Execution Vulnerability
👍3
Windows Wi-Fi Driver RCE Vulnerability – CVE-2024-30078 #Windows #WiFiDriver #RCEVulnerability #CVE-2024-30078 #Crowdfense https://www.crowdfense.com/windows-wi-fi-driver-rce-vulnerability-cve-2024-30078/
Crowdfense
Windows Wi-Fi Driver RCE Vulnerability - CVE-2024-30078 - Crowdfense
Analysis of CVE-2024-30078, a Windows Wi-Fi driver vulnerability. Detailed root cause analysis and exploitation constraints.
👍1🔥1
LazyXss: Automation tool to testing and confirm the xss vulnerability. #LazyXss #XSSvulnerability #AutomationTool #GitHub #Security https://github.com/iamunixtz/LazyXss
GitHub
GitHub - iamunixtz/LazyXss: Automation tool to testing and confirm the xss vulnerability.
Automation tool to testing and confirm the xss vulnerability. - iamunixtz/LazyXss
Calculating the size of the Windows kernel subsystems #WindowsKernelSubsystems #SubsystemSizeCalculation #WindowsInternals #ReverseEngineeringTools #KernelFunctionPrefixes https://www.linkedin.com/pulse/calculating-size-windows-kernel-subsystems-artem-baranov-jnd1e
Linkedin
Calculating the size of the Windows kernel subsystems
Introduction As we know, Windows has a proprietary hybrid kernel, written in C, C++, and Asm, called ntoskrnl.exe (also ntkrnlpa.
Going Native - Malicious Native Applications #MaliciousNativeApplications #NtAPI #RemoteProcessInjection #EarlyBootAccess #WindowsDefenderPermissions https://www.protexity.com/post/going-native-malicious-native-applications
Protexity
Going Native - Malicious Native Applications
Part I: IntroductionWindows ApplicationsWindows applications normally perform operations by interacting with the Windows Application Program Interface (WinAPI). The WinAPI then performs some processing of parameters to normalize them or calculate additional…
👍2
A journey through KiUserExceptionDispatcher #EmulationEnvironment #KiUserExceptionDispatcher #ExceptionHandling #WindowsInternals #MauricesBlog https://momo5502.com/posts/2024-09-07-a-journey-through-kiuserexceptiondispatcher/
Maurice's Blog 🐍
A journey through KiUserExceptionDispatcher
I am currently working on an emulation environment similar to Qiling.
Unlike Qiling, it emulates the entire user-space, not just the target application.
As Qiling reimplements all APIs (kernel32, vcruntime, …) outside the emulator, it gains a lot of speed…
Unlike Qiling, it emulates the entire user-space, not just the target application.
As Qiling reimplements all APIs (kernel32, vcruntime, …) outside the emulator, it gains a lot of speed…
🔥2