BlackBox (Security) Archiv
4.1K subscribers
183 photos
393 videos
167 files
2.67K links
๐Ÿ‘‰๐Ÿผ Latest viruses and malware threats
๐Ÿ‘‰๐Ÿผ Latest patches, tips and tricks
๐Ÿ‘‰๐Ÿผ Threats to security/privacy/democracy on the Internet

๐Ÿ‘‰๐Ÿผ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
Your childโ€™s privacy is worth more than likes

Sharenting and its implications for children's privacy

Some parents love to share pictures and videos of their children online. Pictures of the newborn baby or that first smile; a video with the first steps, the first visit to the swimming pool, parties, trips, family moments; then perhaps posts with funny stories, intriguing questions, and even sensitive conversations, such as a teenager revealing to the parent that they are non-binary. This behavior even has a name: sharenting, or documenting your childโ€™s life online. And it has serious implications for children's privacy.

https://www.theprivacywhisperer.com/p/your-childs-privacy-is-worth-more

#privacy #children #sharenting
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘9
Beware of investment spam messages in the name of BlackBox (Security) Archiv!

For some time now, someone has been posing as BlackBox (Security) Archiv to distribute Bitcoin spam.

Please don't fall for it! BlackBox would never write to its readers in private chats. If you receive such a message, please report the user to Telegram and then delete the chat.

Stay safe, watch your back and don't get tricked! :)

๐Ÿ“ก
@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘15
paper-cameraready.pdf
1.2 MB
Thou Shalt Not Reject: Analyzing Accept-Or-Pay Cookie Banners on the Web

Privacy regulations have led to many websites showing cookie
banners to their users. Usually, cookie banners present the user
with the option to โ€œacceptโ€ or โ€œrejectโ€ cookies. Recently, a new form
of paywall-like cookie banner has taken hold on the Web, giving
users the option to either accept cookies (and consequently user
tracking) or buy a paid subscription for a tracking-free website
experience.

In this paper, we perform the first completely automated analysis
of cookiewalls, i.e., cookie banners acting as a paywall.

https://www.devashishgosain.com/assets/files/paper-cameraready.pdf

#pdf #cookies #banner
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘2
Reflections of the Israel-Palestine Conflict on the Cyber World

In the midst of the ongoing Israel-Palestine conflict, a notable upsurge of hacktivist collectives has emerged, announcing an unceasing barrage of digital assaults directed at a wide range of targets from both sides of the conflict.

This situation unfolds as a response to the ongoing Israel-Palestine conflict, which involves Palestinian militant groups led by Hamas initiating a large-scale offensive originating from the Gaza Strip and targeting Israel.

Although the cyber world sometimes seems like a stand-alone entity, it must be a reflection of the physical world, so just like the hacktivism resurgence that came with the Ukraine-Russia war, this sad conflict situation for humanity will also show an increasing business of war in the cyber world.

https://socradar.io/reflections-of-the-israel-palestine-conflict-on-the-cyber-world/

Read as well:
https://www.dnaindia.com/india/report-israel-palestine-conflict-how-indian-hackers-sunk-their-cyber-fangs-into-hamas-palestinian-national-bank-3063682

#cyberwar
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘4
An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploit

In April this year Google's Threat Analysis Group, in collaboration with Amnesty International, discovered an in-the-wild iPhone zero-day exploit chain being used in targeted attacks delivered via malicious link. The chain was reported to Apple under a 7-day disclosure deadline and Apple released iOS 16.4.1 on April 7, 2023 fixing CVE-2023-28206 and CVE-2023-28205.


Over the last few years Apple has been hardening the Safari WebContent (or "renderer") process sandbox attack surface on iOS, recently removing the ability for the WebContent process to access GPU-related hardware directly. Access to graphics-related drivers is now brokered via a GPU process which runs in a separate sandbox.


Analysis of this in-the-wild exploit chain reveals the first known case of attackers exploiting the Safari IPC layer to "hop" from WebContent to the GPU process, adding an extra link to the exploit chain (CVE-2023-32409)

https://googleprojectzero.blogspot.com/2023/10/an-analysis-of-an-in-the-wild-ios-safari-sandbox-escape.html

#ios #exploit
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘2
Persistent cross-site scripting vulnerabilities in Liferay Portal

In 2023 we found multiple vulnerabilities in Liferay Portal, a digital experience platform for enterprise websites. It is a free and open-source software project. A few thousand installations on the Internet not suppressing the Liferay-Portal HTTP response header can be found via special purpose search engines.

The Liferay Portal in the Community Version is the foundation for the web interface of Liechtenstein's electronic health portal. That's the reason we got involved with the portal software โ€“ not as a customer pentest project, but out of interest. We wrote a blog post about the Liechtenstein's electronic health portal (blog post is in German). We reported our findings regarding the Liferay Portal to Liferay in order to get them addressed. Now we are releasing technical details about the vulnerabilities.

Another vulnerability we mentioned in the health portal is a Denial of Service attack, where a nested Graph QL query is not restricted by the portal and which consumes available resources leading to a Denial of Service. This vulnerability is known to Liferay.

Just so there are no misunderstandings: We did not try to use these vulnerabilities against Liechtenstein's electronic health portal.

https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/

#vulnerabilities #liferay
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘2
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ’ก So, ad blockers violate YouTube ToS? Good, because user agent spoofers don't.
Change your user agent to Windows Phone to disable ads. ๐Ÿ’ก

https://files.enderman.ch/scripts/yt-antiadblocker.mp4

#antiadblocker #youtube #adblocker
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
โค16๐Ÿ”ฅ8๐Ÿ‘3
A step-by-step Android penetration testing guide for beginners

Greetings fellow hackers, my name is Sandy, Security Analyst and Bug bounty hunter.


As Iโ€™m presently engaged in Android penetration testing, Iโ€™d like to relay my experiences with you, as they may prove beneficial in addressing some of the inquiries, I had difficulty resolving answers too, without more introductions letโ€™s get started.

https://infosecwriteups.com/a-step-by-step-android-penetration-testing-guide-for-beginners-8435e5e969a3

#android #pentest
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘4โค3
Marketing Company Claims That It Actually Is Listening to Your Phone and Smart Speakers to Target Ads

A marketing team within media giant Cox Media Group (CMG) claims it has the capability to listen to ambient conversations of consumers through embedded microphones in smartphones, smart TVs, and other devices to gather data and use it to target ads, according to a review of CMG marketing materials by 404 Media and details from a pitch given to an outside marketing professional. Called โ€œActive Listening,โ€ CMG claims the capability can identify potential customers โ€œbased on casual conversations in real time.โ€

https://www.404media.co/cmg-cox-media-actually-listening-to-phones-smartspeakers-for-ads-marketing/

๐Ÿ‘‰๐Ÿผ https://webcache.googleusercontent.com/search?q=cache:G8IWWik_R1YJ:https://www.cmglocalsolutions.com/blog/active-listening-an-overview&hl

๐Ÿ‘‰๐Ÿผ https://webcache.googleusercontent.com/search?q=cache:ZA57uuvQNT8J:https://www.cmglocalsolutions.com/blog/how-voice-data-works-and-how-you-can-use-it-in-your-business&hl

#advertising #targeted #privacy
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘3โค1
Operation Triangulation: The last (hardware) mystery

Today, on December 27, 2023, we (Boris Larin, Leonid Bezvershenko, and Georgy Kucherin) delivered a presentation, titled, โ€œOperation Triangulation: What You Get When Attack iPhones of Researchersโ€, at the 37th Chaos Communication Congress (37C3), held at Congress Center Hamburg. The presentation summarized the results of our long-term research into Operation Triangulation, conducted with our colleagues, Igor Kuznetsov, Valentin Pashkov, and Mikhail Vinogradov.

This presentation was also the first time we had publicly disclosed the details of all exploits and vulnerabilities that were used in the attack. We discover and analyze new exploits and attacks using these on a daily basis, and we have discovered and reported more than thirty in-the-wild zero-days in Adobe, Apple, Google, and Microsoft products, but this is definitely the most sophisticated attack chain we have ever seen.

https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/

#operationtriangulation #attack #iphone
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘6
The Battle for Biometric Privacy

The pushback against ubiquitous surveillance and targeted deepfaking has begunโ€”but regulation may fail to keep up with AI advances.


In 2024, increased adoption of biometric surveillance systems, such as the use of AI-powered facial recognition in public places and access to government services, will spur biometric identity theft and anti-surveillance innovations. Individuals aiming to steal biometric identities to commit fraud or gain access to unauthorized data will be bolstered by generative AI tools and the abundance of face and voice data posted online.

https://www.wired.com/story/the-battle-for-biometric-privacy/

#biometric #privacy #deepfake
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘5
You can not simply publicly access private secure links, can you?

turns out, you can even search for them with powerful search engines!


Popular malware/url analysis tools such as urlscan.io, Hybrid Analysis, and Cloudflare radar url scanner store a large number of links for intelligence gathering and sharing. However, it is not as widely known that these services also store a large amount of private and sensitive links, thanks to:

- Sensitive links accidentally submitted for scanning by users unaware that they are public information

- Misconfigured scanners and extensions that submit private links scanned from emails as public data

https://vin01.github.io/piptagole/security-tools/soar/urlscan/hybrid-analysis/data-leaks/urlscan.io/cloudflare-radar%22/2024/03/07/url-database-leaks-private-urls.html

#securelinks #security #tools #urlscan #analysis
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘5โค3
Docker Security โ€“ Step-by-Step Hardening (Docker Hardening)

This article provides practical recommendations for configuring Docker platform aimed at increasing its security. It also suggests tools helpful in automation of some tasks related to securing Docker.


My intention is to guide the reader step by step through the process of preparing a secure configuration. As such, this guide may prove to be more extensive than other similar publications. However, this is a conscious choice. My goal is not merely to present a dry list of parameters and ready-made configuration snippets, but to provide the reader with a fuller context. I want the reader to understand why certain modifications are necessary and what benefits their implementation will bring.

https://reynardsec.com/en/docker-platform-security-step-by-step-hardening/

#docker #hardening #guide
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ‘4
Ransomware Diaries Volume 5: Unmasking LockBit

Before you read this volume of the Ransomware Diaries, please understand that LockBitSuppโ€™s identity only became known earlier today. Therefore, please make your own assessment and validate my findings before using this research for real-world actions. I have been chasing LockBit for a long time and when I found out the DoJ planned to release this information, I decided to publish my research quicker than I intended.

https://analyst1.com/ransomware-diaries-volume-5-unmasking-lockbit/

#lockbit
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
โค1๐Ÿ‘1
Proton Mail Discloses User Data Leading to Arrest in Spain

Proton Mail has come under scrutiny for its role in a legal request involving the Spanish authorities and a member of the Catalan independence organization, Democratic Tsunami.


https://restoreprivacy.com/protonmail-discloses-user-data-leading-to-arrest-in-spain/

#protonmail
๐Ÿ“ก@cRyPtHoN_INFOSEC_IT
๐Ÿ“ก
@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
๐Ÿ˜ฑ9๐Ÿ‘2