■■■■□ CVE-2021-37973: Chrome Update Released to Patch Actively Exploited Zero-Day Vulnerability.
Use after free in Portals. Reported by Clément Lecigne from Google TAG, with technical assistance from Sergei Glazunov and Mark Brand from Google Project Zero on 2021-09-21 (https://bugs.chromium.org/p/chromium/issues/detail?id=1251727)
https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_24.html
https://thehackernews.com/2021/09/urgent-chrome-update-released-to-patch.html
Use after free in Portals. Reported by Clément Lecigne from Google TAG, with technical assistance from Sergei Glazunov and Mark Brand from Google Project Zero on 2021-09-21 (https://bugs.chromium.org/p/chromium/issues/detail?id=1251727)
https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_24.html
https://thehackernews.com/2021/09/urgent-chrome-update-released-to-patch.html
■■■■■ This is one of the entries to the BGGP 2021 Polyglot File challenge.
It uses a novel technique of directly embedding data within the compressed image data stream of a PNG. This means you can literally see the bytes of the embedded files!
● It literally took about a minute for me to understand. 😂
https://twitter.com/David3141593/status/1441365353431384066
It uses a novel technique of directly embedding data within the compressed image data stream of a PNG. This means you can literally see the bytes of the embedded files!
● It literally took about a minute for me to understand. 😂
https://twitter.com/David3141593/status/1441365353431384066
Twitter
Dаvіd Вucһаnаn
This is one of my entries to the BGGP 2021 Polyglot File challenge. It uses a novel technique of directly embedding data within the compressed image data stream of a PNG. This means you can literally see the bytes of the embedded files! twitter.com/netspooky/stat…
■■■■■ Researchers compile list of vulnerabilities abused by ransomware groups.
https://twitter.com/uuallan/status/1438899102448820224
https://www.bleepingcomputer.com/news/security/researchers-compile-list-of-vulnerabilities-abused-by-ransomware-gangs
https://twitter.com/uuallan/status/1438899102448820224
https://www.bleepingcomputer.com/news/security/researchers-compile-list-of-vulnerabilities-abused-by-ransomware-gangs
■■■■□ subcrawl: find, scan and analyze open directories.
https://github.com/hpthreatresearch/subcrawl
https://github.com/hpthreatresearch/subcrawl
GitHub
GitHub - hpthreatresearch/subcrawl: SubCrawl is a modular framework for discovering open directories, identifying unique content…
SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data with optional output modules, such as MISP. - hpthreatresearc...
■□□□□ Data-Leak: European Union 🇪🇺 formally blames Russia 🇷🇺 for the GhostWriter operation.
https://hackademicus.nl/european-union-formally-blames-russia-for-the-ghostwriter-operation/
https://hackademicus.nl/european-union-formally-blames-russia-for-the-ghostwriter-operation/
hackademicus.nl
Hackademicus is under construction
it's all about security stupid!
■■■■■ Disclosure of three 0-day iOS vulnerabilities and critique of Apple 🍎 Security Bounty program.
https://twitter.com/illusionofcha0s
https://habr.com/en/amp/post/579714
https://twitter.com/illusionofcha0s
https://habr.com/en/amp/post/579714
■■■■□ HCRootkit / Sutersu Linux Rootkit Analysis.
https://www.lacework.com/blog/hcrootkit-sutersu-linux-rootkit-analysis/
https://www.lacework.com/blog/hcrootkit-sutersu-linux-rootkit-analysis/
Fortinet
Cloud-Native Application Protection Platform (CNAPP)
Lacework FortiCNAPP is the most comprehensive cloud-native application protection platform available. AI-driven and organically developed, it empowers organizations to easily secure everything from code to cloud.
■■■■■ VMware CVE-2021-22005 Technical & Impact analysis.
https://censys.io/blog/vmware-cve-2021-22005-technical-impact-analysis/
https://censys.io/blog/vmware-cve-2021-22005-technical-impact-analysis/
Censys
VMware CVE-2021-22005 Technical & Impact analysis
■■■■■ 🔧 Tool: The WiFiWart is an open source WiFi penetration device masquerading as a regular wall charger. It features a 1.2Ghz Cortex A7 MPU with two WiFi chips onboard. The electrical, mechanical and software is all completely open source. The elec is design in Kicad, hardware in FreeCAD and software will be all GNU/Linux based. Eventually there will be three PCBs in this repository. Rather than placing redundant information in this file, I would encourage readers to check out the blog series listed below for a very in depth walk through.
https://github.com/Machine-Hum/wifiwart
https://github.com/Machine-Hum/wifiwart
GitHub
GitHub - o7-machinehum/wifiwart: Linux SBC featuring two wifi radios, masquerading as a USB charger.
Linux SBC featuring two wifi radios, masquerading as a USB charger. - o7-machinehum/wifiwart
cKure
■■■■■ 🔧 Tool: The WiFiWart is an open source WiFi penetration device masquerading as a regular wall charger. It features a 1.2Ghz Cortex A7 MPU with two WiFi chips onboard. The electrical, mechanical and software is all completely open source. The elec is…
■■■□□ Supporting articles for (https://t.me/cKure/9506)
https://machinehum.medium.com/im-putting-a-wifi-router-into-a-wall-charger-part-1-882df714bbf3
https://machinehum.medium.com/im-putting-a-wifi-router-into-a-wall-charger-part-2-bf04c779c905
https://machinehum.medium.com/im-not-putting-a-wifi-router-into-a-phone-charger-7b36e90ee08d
https://machinehum.medium.com/im-putting-a-wifi-router-into-a-wall-charger-part-1-882df714bbf3
https://machinehum.medium.com/im-putting-a-wifi-router-into-a-wall-charger-part-2-bf04c779c905
https://machinehum.medium.com/im-not-putting-a-wifi-router-into-a-phone-charger-7b36e90ee08d
Telegram
cKure
■■■■■ 🔧 Tool: The WiFiWart is an open source WiFi penetration device masquerading as a regular wall charger. It features a 1.2Ghz Cortex A7 MPU with two WiFi chips onboard. The electrical, mechanical and software is all completely open source. The elec is…
■■■□□ Autodiscover, a protocol used by Microsoft Exchange for automatic configuration of clients such as Microsoft Outlook, has a design flaw that causes the protocol to “leak” web requests to Autodiscover domains outside of the user’s domain but in the same TLD (i.e. Autodiscover.com).
https://www.guardicore.com/labs/autodiscovering-the-great-leak/
https://www.guardicore.com/labs/autodiscovering-the-great-leak/
Akamai
Cloud Computing, Security, Content Delivery (CDN) | Akamai
Akamai is the cybersecurity and cloud computing company that powers and protects business online.
■■■■□ CVE-2021-30869: Erye Hernandez of Google Threat Analysis Group, Clément Lecigne of Google Threat Analysis Group, and Ian Beer of Google Project Zero.
https://support.apple.com/en-us/HT212825
https://twitter.com/ShaneHuntley/status/1441102086385455112
https://support.apple.com/en-us/HT212825
https://twitter.com/ShaneHuntley/status/1441102086385455112
Apple Support
About the security content of Security Update 2021-006 Catalina
This document describes the security content of Security Update 2021-006 Catalina.
■■■■■ Financially motivated actor breaks certificate parsing to avoid detection.
Mr. Neel Mehta found an attacker using certificates that OpenSSL won't parse but Windows will accept.
https://blog.google/threat-analysis-group/financially-motivated-actor-breaks-certificate-parsing-avoid-detection/amp/
Mr. Neel Mehta found an attacker using certificates that OpenSSL won't parse but Windows will accept.
https://blog.google/threat-analysis-group/financially-motivated-actor-breaks-certificate-parsing-avoid-detection/amp/
Google
Financially motivated actor breaks certificate parsing to avoid detection
Financially motivatedt threat actor breaks certificate parsing to avoid detection
■■■■■ Report: Technical assessment of the security of Chinese 5G handsets sold in Lithuania - in built backdoors, censorship etc (*ANALYSIS OF PRODUCTS MADE BY Huawei, Xiaomi and OnePlus).
PDF: https://www.nksc.lt/doc/en/analysis/2021-08-23_5G-CN-analysis_env3.pdf
PDF: https://www.nksc.lt/doc/en/analysis/2021-08-23_5G-CN-analysis_env3.pdf
cKure
■■■■■ Report: Technical assessment of the security of Chinese 5G handsets sold in Lithuania - in built backdoors, censorship etc (*ANALYSIS OF PRODUCTS MADE BY Huawei, Xiaomi and OnePlus). PDF: https://www.nksc.lt/doc/en/analysis/2021-08-23_5G-CN-analysis_env3.pdf
2021-08-23_5G-CN-analysis_env3.pdf
1 MB
■■□□□ Cyber-Attack on United States 🇺🇸 as Port of Houston Attacked Employing Zoho Zero-Day Vulnerability.
CISA officers on 23rd of September reported about a potential government-backed hacker organization that has tried to break the Port of Houston networks, one of the major port agencies in the United States, employing zero-day vulnerabilities in a Zoho user authentication device.
https://www.ehackingnews.com/2021/09/port-of-houston-attacked-employing-zoho.html
CISA officers on 23rd of September reported about a potential government-backed hacker organization that has tried to break the Port of Houston networks, one of the major port agencies in the United States, employing zero-day vulnerabilities in a Zoho user authentication device.
https://www.ehackingnews.com/2021/09/port-of-houston-attacked-employing-zoho.html
■■■■□ 📢 HashDB beta goes live.
HashDB is a free community-sourced library of hashing algorithms used in malware, with an IDA plugin!
⚙️API
https://hashdb.openanalysis.net/
🧩IDA Plugin
https://github.com/OALabs/hashdb-ida
👾 Add Custom Algorithms
https://github.com/OALabs/hashdb
Source: https://twitter.com/herrcore/status/1441515001282535427
HashDB is a free community-sourced library of hashing algorithms used in malware, with an IDA plugin!
⚙️API
https://hashdb.openanalysis.net/
🧩IDA Plugin
https://github.com/OALabs/hashdb-ida
👾 Add Custom Algorithms
https://github.com/OALabs/hashdb
Source: https://twitter.com/herrcore/status/1441515001282535427
GitHub
GitHub - OALabs/hashdb-ida: HashDB API hash lookup plugin for IDA Pro
HashDB API hash lookup plugin for IDA Pro. Contribute to OALabs/hashdb-ida development by creating an account on GitHub.