Intellawatch

US Officials Recommend Encryption Apps Amid Chinese Telecom Hacking cyber

from

Wired

The hacker group known as Secret Blizzard, Snake, or Turla, widely believed to work for Russia’s FSB intelligence agency, is known for using some of the most ingenious hacking techniques ever seen to spy on its victims. Before it was taken down two years ago in a law enforcement operation led by IRS criminal investigators in the US and Germany’s BKA police agency, Hydra was a uniquely sprawling dark web marketplace, one that not only served as the post-Soviet world’s biggest online bazaar for n....

DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory cyber

from

GBHackers On Security

They successfully demonstrated proof-of-concept attacks using modified SD Express adapters to gain unauthorized memory access on multiple devices, including gaming laptops and handheld consoles. DaMAgeCard vulnerability is particularly concerning because unlike previous DMA attack vectors (such as FireWire or Thunderbolt), SD card slots are widely available and accessible. They warn that as SD Express adoption grows, this could become a significant attack vector unless manufacturers take steps ....

Deloitte Denies Breach, Claims Only Single System Affected breach

from

GBHackers On Security

This statement assures clients and stakeholders that the firm’s internal infrastructure remains secure. Deloitte UK has strongly refuted claims of a major cybersecurity breach made by the ransomware group Brain Cipher. Analyse Real-World Malware & Phishing Attacks With ANY.RUN - Get up to 3 Free Licenses....

Malware Analysis : HTB Sherloc OpSalwarKameez24–1: Super-Star cyber

from

InfoSec Write-ups

This software has been intentionally included for educational purposes and is NOT intended to be executed or used otherwise. In Electron, the WebPreferences object is used to configure and control how a BrowserWindow or WebView behaves. By default, nodeIntegration is set to false for security reasons, as enabling it allows full access to Node.js APIs like require, fs, and others, which can pose security risks if the web content is not properly sanitized.....

How to Make a Clickjacking Vulnerability Scanner with Python cyber

from

InfoSec Write-ups

Clickjacking is a malicious technique attackers use to trick users into clicking something different from what they perceive. When users interact with the page, they unknowingly perform actions on the embedded site, such as liking a post, submitting a form, or even executing transactions. Data Theft: Attackers can exploit clickjacking to steal sensitive information by tricking users into submitting forms or entering credentials.....

The Dark Web Economy: How Cybercriminals Monetize Stolen Data cyber

from

InfoSec Write-ups

This underground economy thrives on the anonymity provided by onion-routing technologies, facilitating transactions of illicit goods, including personal data, without traceability. Stolen financial information is used to craft elaborate schemes aimed at draining victims’ bank accounts or making fraudulent charges on their credit cards. 🌐🔓 If you’re aiming to enhance your cybersecurity defenses, give this article a clap 👏, share it, and follow for more.....

TryHackme’s Advent of Cyber 2024 — Day 06 Writeup cyber

from

InfoSec Write-ups

Cybersecurity enthusiasts worldwide are gearing up for Advent of Cyber (AOC) 2024, an annual challenge series hosted on TryHackMe. Designed with beginners in mind, this event combines fun, learning, and the opportunity to win exciting prizes. The first step involves launching a sandboxed virtual machine (VM) where participants can safely analyze Mayor Malware’s creation.....

TryHackme’s Advent of Cyber 2024 — Day 05 Writeup cyber

from

InfoSec Write-ups

Tyler Ramsby’s TryHackMe tutorial takes us on an engaging journey to uncover vulnerabilities in a fictional Christmas wish platform for Weville. The Christmas wish platform, while cheerful, has a serious task — ensuring its safety against XML External Entity (XXE) vulnerabilities. The learning objectives include understanding XML basics, identifying XXE risks, exploiting them in a controlled environment, and applying secure remediation techniques.....

Advent of Cyber 2024 [ Day 6 ] Writeup with Answers | TryHackMe Walkthrough cyber

from

InfoSec Write-ups

....

From Newbie to Pro: My Journey to a $3,000 Bug Bounty cyber

from

InfoSec Write-ups

Photo by GuerrillaBuzz on Unsplash Two or Three years ago, I had no idea what bug bounty hunting was. I started Googling phrases like “how to start bug bounty hunting” and “bug bounty platforms for beginners.” Soon, I was creating an account on HackerOne, picking up books like Web Hacking 101, and devouring YouTube videos from ethical hackers. Reconnaissance, OWASP Top 10, Burp Suite, HTTP requests — so many terms flew over my head.....

Protect Your System: A Complete Guide to Hash-Based Search on VirusTotal cyber

from

InfoSec Write-ups

If you haven’t already incorporated hash-based search into your routine, now is the time to do so — cyber threats are evolving faster than ever. By leveraging VirusTotal’s extensive database, you can identify files based on their hash and quickly determine if they are flagged as malicious. Even the smallest change in a file will produce an entirely different hash, making this method highly reliable for identifying files.....

“The Hidden GPS Threat: Unstripped Metadata on Redacted.com led 5K Rubel in bounties” ️‍♂️ cyber

from

InfoSec Write-ups

What if every photo you uploaded to Redacted.com could unknowingly share your exact location with the world? Images uploaded to Redacted.com don’t strip their EXIF metadata, which includes sensitive details like GPS coordinates, timestamps, and device info. 🚀 Reporting this issue not only helped secure user privacy but also earned me a 5000 Rubles bounty!....

US Organization in China Falls Victim to Suspected Chinese Espionage Campaign cyber

from

Penetration Testing Online

They leveraged legitimate applications like GoogleToolbarNotifier.exe and iTunesHelper.exe to load malicious DLLs, effectively masking their activity. “ The attackers also leveraged several living-off-the-land tools,” the report notes, “[including] WMI (Windows Management Instrumentation), PsExec, [and] PowerShell.” This approach allowed them to blend in with normal network activity and evade detection. This file has been previously associated with the Crimson Palace group, known for targeting ....

Earth Minotaur: MOONSHINE Exploit Kit and DarkNimbus Backdoor Threaten Multi-Platform Security cyber

from

Penetration Testing Online

Over the years, it has evolved significantly, with Trend Micro identifying 55 active MOONSHINE servers by 2024. The report explains, “ DarkNimbus abuses Android’s Accessibility Service to monitor and pilfer conversations from instant messaging apps.” These links redirect victims to MOONSHINE servers, which assess the victim’s device and browser vulnerabilities before delivering exploit code.....

Everyday Ghidra: Symbols — Prescription Lenses for Reverse Engineers — Part 1 cyber

from

clearbluejar

Leveraging these symbols within Ghidra can significantly aid in understanding the program’s behavior. The symbols file for combase.dll is massive and includes much more information than your typical pdb from Microsoft. Stay tuned for part 2 when we walk through how to leverage Ghidra’s symbol acquisition automation.....

Sophisticated Campaign Targets Manufacturing Industry with Lumma Stealer and Amadey Bot cyber

from

Penetration Testing Online

Cyble Research and Intelligence Labs (CRIL) has uncovered a multi-stage cyberattack campaign targeting the manufacturing industry. Threat actors employed several legitimate system tools, also known as Living-off-the-Land Binaries (LOLBins), to bypass traditional security mechanisms. Persistence Mechanism: The malware created a Task Scheduler entry named “NodeJS Web Framework” to maintain control over infected systems.....

New Russian Threat Group Z-Pentest Targets Energy System Controls cyber

from

The Cyber Express

Cyble dark web researchers have documented a new Russia-linked threat group that has been breaching critical infrastructure environments and tampering with system controls. Water and wastewater systems are considered particularly vulnerable even among generally insecure critical infrastructure sectors. Within the last week, Z-Pentest’s claims have escalated to include claims of “disrupting critical systems at an oil well site, including systems responsible for water pumping, petroleum gas flari....

Supply chain compromise of Ultralytics AI library results in trojanized versions cyber

from

CSO Online

GitHub Actions workflows are a series of processes or “actions” defined in .yml files inside repositories that get executed when certain trigger events occur, such as when new code gets committed to the repository. By default, anyone can fork a project and can submit pull requests, meaning project owners need to be very careful about how they use GitHub Actions, including what actions and what triggers they allow. “But it is not hard to imagine what the potential impact and the damage could be ....

Micropatchers share 1-instruction fix for NTLM hash leak flaw in Windows 7+ cyber

from

The Register - Security

The flaw-finding biz – which develops and releases unofficial "micropatches" to close holes in software that vendors won't address – says this particular bug is an NTLM vulnerability. "The vulnerability allows an attacker to obtain user's NTLM credentials by simply having the user view a malicious file in Windows Explorer - eg, by opening a shared folder or USB disk with such file, or viewing the Downloads folder where such file was previously automatically downloaded from attacker's web page,"....

Network Abuses Leveraging High-Profile Events: Suspicious Domain Registrations and Other Scams cyber

from

Paloalto Unit43

We reported that attackers launched COVID-19-themed phishing campaigns targeting government and medical organizations or distributed Coronavirus-themed malware by tricking users into downloading malicious files. By analyzing the keywords, structure and even top-level domain (TLD) cues within these domains, we can uncover common features that indicate malicious intent. WHOIS records: While most registration information for these Olympic-themed gambling NRDs is redacted, we observed that all regi....

TA: 66729 TP: 3337 CP: 1