BlackBox (Security) Archiv
4.1K subscribers
183 photos
393 videos
167 files
2.67K links
๐Ÿ‘‰๐Ÿผ Latest viruses and malware threats
๐Ÿ‘‰๐Ÿผ Latest patches, tips and tricks
๐Ÿ‘‰๐Ÿผ Threats to security/privacy/democracy on the Internet

๐Ÿ‘‰๐Ÿผ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
Surveillance advertising in Europe: The adtech industry tracks most of what you do on the Internet. This file shows just how much

The advertising industry has more than 650,000 labels to target people. Reading through them reveals how even the most sensitive aspects of our life are monitored. EU-based data brokers play a vital role in this system.

Everything we do on the Internet is being recorded and analyzed in order to achieve one goal: to show us targeted advertising. This is a reality to which many people have become accustomed in exchange for free services. However, very few people understand exactly where our data ends up when we visit websites, use apps or make digital payments. Targeted advertising moves in mysterious ways. Thatโ€™s another fact weโ€™ve become accustomed to.

๐Ÿ‘‰๐Ÿผ Download: https://web.archive.org/web/20230525225541mp_/https://xandr-be-prod.zoominsoftware.io/bundle/monetize_monetize-standard/page/attachments/data-marketplace-buyer-overview/data_marketplace_public_segments_pricing_05212021.xlsx

https://netzpolitik.org/2023/surveillance-advertising-in-europe-the-adtech-industry-tracks-most-of-what-you-do-on-the-internet-this-file-shows-just-how-much/

#surveillance #advertising #eu
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘11โค1
The Death of Infosec Twitter

โ€œInfosec twitterโ€ has been used to describe the vibrant, active and often enthusiastic community of security practitioners working in and around the industry. Itโ€™s been a source of insight, inspiration and entertainment for many and for years. Therefore, it is with a bit of sadness that I must announce that the death of infosec twitter is upon us.

https://www.cyentia.com/the-death-of-infosec-twitter/

#infosec
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘5๐Ÿ‘Ž1
Debunking Runa Sandvik โ€” CatalanGate Spyware

In April 2022, the world was informed about 65 suspected instances of espionage in Catalonia. The revelation came through a report and data jointly released by The Citizen Lab, a public policy institution at The University of Toronto, and Amnesty Tech, a cybersecurity division of Amnesty International. Following their investigation, these special interest groups leveled direct accusations against the Spanish government, alleging the utilization of surveillance technology developed by Israeli cyber intelligence firms NSO Group and Candiru, LTD to target Catalan civil society.

https://jonathandata1.medium.com/debunking-runa-sandvik-pegasus-spyware-catalangate-40a3cd2ebc53

#nso #pegasus #spyware #catalangate
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘1๐Ÿ”ฅ1
Hackers are infecting Call of Duty players with a self-spreading malware

Hackers are infecting players of an old Call of Duty game with a worm that spreads automatically in online lobbies, according to two analyses of the malware.

On June 26, a user on a Steam forum alerted other players of Call of Duty: Modern Warfare 2 that hackers โ€œattack using hacked lobbies,โ€ and suggested running an antivirus. The malware mentioned in the thread appears to be on the malware online repository VirusTotal.

Another player claimed to have analyzed the malware and wrote in the same forum thread that the malware appears to be a worm, based on a series of text strings inside the malware. A game industry insider, who asked to remain anonymous because they were not allowed to speak to the press, confirmed that the malware contains those strings, indicating a worm.

https://techcrunch.com/2023/07/27/hackers-are-infecting-call-of-duty-players-with-a-self-spreading-malware

#malware #alert
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘5
CannaPower - Pirate Site Not Impressed by Global DNS Blocking Order

Sony Music's legal efforts have produced a major breakthrough. As the result of a German blocking order, DNS provider Quad9 now blocks global access to music piracy site CannaPower. The operator of the site doesn't appear to be impressed so far, noting that it doesn't really hurt traffic. "They will never get us down," the operator says, adding that moving to the Tor network remains an option as well.

https://torrentfreak.com/pirate-site-not-impressed-by-global-dns-blocking-order-230803/

#cannapower
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘7โค2๐Ÿ˜ฑ1
<Lolek> Hosted, a notorious bulletproof hosting provider who was a competitor to the infamous CyberBunker, has been seized by the United States Federal Bureau-Investigation, IRS Criminal Investigation unit, and Poland's Central Bureau of Combating Cybercrime (CBZC)

https://nitter.net/vxunderground/status/1688965817654775820#m

Via Twitter

#lolek #bulletproof #hosting #seized
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘4โค1๐Ÿ‘Ž1
Ransomware Diaries: Volume 3 โ€“ LockBitโ€™s Secrets

In this volume of the Ransomware Diaries, I will share interesting, previously unknown details of the LockBit ransomware operation that LockBit has tried very hard to cover up. Until now, you have been lied to about LockBitโ€™s true capability. Today, I will show you the actual current state of its criminal program and demonstrate with evidence-backed analysis that LockBit has several critical operational problems, which have gone unnoticed.

This time, besides using fake personas, I have spoken directly with the gang and many of its affiliate partners. I also reached out to victims. I learned what happens behind the scenes during the ransom negotiations and the relationships LockBit has with its affiliate partners and competing rival gangs. LockBit has secrets it does not want either party to know. Now, I look forward to sharing them with you!

Before I begin, I need to share a significant event that took place as I finalized this report. In August 2023, LockBitโ€™s leadership vanished and was unreachable to fellow gang members, including its affiliate partners, for the first two weeks of August. During that time, several of LockBitโ€™s close associates shared concerns that the gangโ€™s leadership was on the run or dead. Then, on August 13, LockBit reappeared on private channels as if it never happened. Still, during the time LockBit was gone, LockBits data leak site and infrastructure were up, but no one was actively managing it.

๐Ÿ‘‰๐Ÿผ Volume 3: https://analyst1.com/ransomware-diaries-volume-3-lockbits-secrets/

๐Ÿ‘‰๐Ÿผ Volume 2: https://analyst1.com/ransomware-diaries-volume-3-lockbits-secrets/#Part_II_The_Victims%E2%80%99_Story

๐Ÿ‘‰๐Ÿผ Volume 1: https://analyst1.com/ransomware-diaries-volume-1/

#ransomware #lockbit
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘2โค1
Big Ass Data Broker Opt-Out List

This list was started on September 29, 2017 and was most recently updated in May 2023 to add information on sites that require you to click links sent via email or to receive an automated call and enter a four-digit number on your phone in order to complete an opt-out request.

https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List

#bigdata
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘3โค2
๐Ÿ‘3โค1๐Ÿ˜ฑ1
CRYPTOGRAPHY BUG BOUNTY

TYPE #1 Reward
: $300K - $1M
TYPE #2 Reward: $12,000

We've extensively researched cryptography and developed a simple standalone linux app that doesn't require network access, you can also monitor network to ensure security. App is automated and controllable through bash. bugs type #2 is only have one purpose but finding a type #1 bugs, which serves a dual purpose: advancing the development of the new generation of blockchain and type #1 data refers to cryptocurrencies that have remained transaction-free since 2009, guaranteeing their lack of ownership... If you discover type #1 bug, you could be rewarded generously and your life could greatly improve. we firmly believe that more hands and our collective knowledge hold immense power.

System requirements: README
Special Bonus: If someone discovers bug type #2 for the second time, they shall be rewarded twofold.

Contract me: @THEALFA

Reports: 0 Last paid: $0
Last updated: 1 SEP 2023
๐Ÿ‘7๐Ÿ‘Ž4
Itโ€™s Official: Cars Are the Worst Product Category We Have Ever Reviewed for Privacy

Ah, the wind in your hair, the open road ahead, and not a care in the worldโ€ฆ except all the trackers, cameras, microphones, and sensors capturing your every move. Ugh. Modern cars are a privacy nightmare.

Car makers have been bragging about their cars being โ€œcomputers on wheels" for years to promote their advanced features. However, the conversation about what driving a computer means for its occupants' privacy hasnโ€™t really caught up. While we worried that our doorbells and watches that connect to the internet might be spying on us, car brands quietly entered the data business by turning their vehicles into powerful data-gobbling machines. Machines that, because of their all those brag-worthy bells and whistles, have an unmatched power to watch, listen, and collect information about what you do and where you go in your car.

https://foundation.mozilla.org/en/privacynotincluded/articles/its-official-cars-are-the-worst-product-category-we-have-ever-reviewed-for-privacy/

#privacy #security
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ”ฅ8๐Ÿ˜ฑ7๐Ÿ‘3
Hacking Meduza: Pegasus spyware used to target Putinโ€™s critic

An investigation by Access Now and the Citizen Lab at the Munk School of Global Affairs at the University of Toronto (the Citizen Lab) has revealed that the iPhone of journalist Galina Timchenko, head of Meduza, a leading Russian independent media outlet based in Latvia, has been infected with Israeli firm NSO Groupโ€™s Pegasus spyware. The spyware attack took place two weeks after the Russian government declared Meduza an โ€œundesirable organizationโ€ for its critical coverage of Vladimir Putinโ€™s regime and the war in Ukraine. At the same time, some European political leaders were publicly arguing for surveillance of all Russians in exile. This is the first documented case of a Pegasus infection of a Russian journalist.

https://www.accessnow.org/publication/hacking-meduza-pegasus-spyware-used-to-target-putins-critic/

#pegasus #spyware
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘7โค4๐Ÿ˜ฑ1
GameLauncher: A WIP replacement for samsungs gamelauncher which respects your privacy

GameLauncher is an app to see all your games in one place but without tracking.

GameLauncher is an open-source replacement for proprietary game-launchers from samsung and other manufacturers. It works without a network connection and collects absolutely no data about you. Simply launch the app and all your apps will be there. Still WIP!

https://github.com/0xFOSSMan/GameLauncher

#foss #opensource #gamelauncher
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘2
Using silent SMS to localize LTE users

Proof of concept implementation

In this blog post, Iโ€™ll dive into an intriguing technique โ€“ using silent SMS messages to track LTE usersโ€™ locations. Weโ€™ll see how an attacker could send silent SMS messages with a defined pattern and analyze LTE traffic to verify the victim location.

https://mandomat.github.io/2023-09-21-localization-with-silent-SMS/

#silentsms #proofofconcept #lte #sms
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘6๐Ÿ˜ฑ6
Your childโ€™s privacy is worth more than likes

Sharenting and its implications for children's privacy

Some parents love to share pictures and videos of their children online. Pictures of the newborn baby or that first smile; a video with the first steps, the first visit to the swimming pool, parties, trips, family moments; then perhaps posts with funny stories, intriguing questions, and even sensitive conversations, such as a teenager revealing to the parent that they are non-binary. This behavior even has a name: sharenting, or documenting your childโ€™s life online. And it has serious implications for children's privacy.

https://www.theprivacywhisperer.com/p/your-childs-privacy-is-worth-more

#privacy #children #sharenting
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘9
Beware of investment spam messages in the name of BlackBox (Security) Archiv!

For some time now, someone has been posing as BlackBox (Security) Archiv to distribute Bitcoin spam.

Please don't fall for it! BlackBox would never write to its readers in private chats. If you receive such a message, please report the user to Telegram and then delete the chat.

Stay safe, watch your back and don't get tricked! :)

๐Ÿ“ก
@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘15
paper-cameraready.pdf
1.2 MB
Thou Shalt Not Reject: Analyzing Accept-Or-Pay Cookie Banners on the Web

Privacy regulations have led to many websites showing cookie
banners to their users. Usually, cookie banners present the user
with the option to โ€œacceptโ€ or โ€œrejectโ€ cookies. Recently, a new form
of paywall-like cookie banner has taken hold on the Web, giving
users the option to either accept cookies (and consequently user
tracking) or buy a paid subscription for a tracking-free website
experience.

In this paper, we perform the first completely automated analysis
of cookiewalls, i.e., cookie banners acting as a paywall.

https://www.devashishgosain.com/assets/files/paper-cameraready.pdf

#pdf #cookies #banner
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘2
Reflections of the Israel-Palestine Conflict on the Cyber World

In the midst of the ongoing Israel-Palestine conflict, a notable upsurge of hacktivist collectives has emerged, announcing an unceasing barrage of digital assaults directed at a wide range of targets from both sides of the conflict.

This situation unfolds as a response to the ongoing Israel-Palestine conflict, which involves Palestinian militant groups led by Hamas initiating a large-scale offensive originating from the Gaza Strip and targeting Israel.

Although the cyber world sometimes seems like a stand-alone entity, it must be a reflection of the physical world, so just like the hacktivism resurgence that came with the Ukraine-Russia war, this sad conflict situation for humanity will also show an increasing business of war in the cyber world.

https://socradar.io/reflections-of-the-israel-palestine-conflict-on-the-cyber-world/

Read as well:
https://www.dnaindia.com/india/report-israel-palestine-conflict-how-indian-hackers-sunk-their-cyber-fangs-into-hamas-palestinian-national-bank-3063682

#cyberwar
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘4
An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploit

In April this year Google's Threat Analysis Group, in collaboration with Amnesty International, discovered an in-the-wild iPhone zero-day exploit chain being used in targeted attacks delivered via malicious link. The chain was reported to Apple under a 7-day disclosure deadline and Apple released iOS 16.4.1 on April 7, 2023 fixing CVE-2023-28206 and CVE-2023-28205.


Over the last few years Apple has been hardening the Safari WebContent (or "renderer") process sandbox attack surface on iOS, recently removing the ability for the WebContent process to access GPU-related hardware directly. Access to graphics-related drivers is now brokered via a GPU process which runs in a separate sandbox.


Analysis of this in-the-wild exploit chain reveals the first known case of attackers exploiting the Safari IPC layer to "hop" from WebContent to the GPU process, adding an extra link to the exploit chain (CVE-2023-32409)

https://googleprojectzero.blogspot.com/2023/10/an-analysis-of-an-in-the-wild-ios-safari-sandbox-escape.html

#ios #exploit
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘2