cKure Red
2.5K subscribers
71 photos
46 videos
21 files
458 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
Cyber-War by Russia 🇷🇺: Samples of the destructive MBR wiper targeting Ukraine 🇺🇦

Samples: https://samples.vx-underground.org/APTs/2022/2022.02.23(2)/
Re-ReBreakCaptcha: Breaking Google’s ReCaptcha v2 using.. Google.. Again – East-Ee Security (By Yair Mizrahi).

https://east-ee.com/2022/02/28/1367/
Verbatim viz
Anonymous!

"We successfully staged a cyber attack against the Belarusian railway infrastructure, designed to halt Russian military movements. Trains stopped in Minsk, Orsha, and Osipovichi

The railway system uses Windows XP.
"
Russia 🇷🇺 vs Ukraine 🇺🇦 Cyber-War

https://twitter.com/AnonUkraine_/status/1498251582760267776
⚠️ Leaked stolen Nvidia cert can sign Windows malware.

An Nvidia code-signing certificate was among the mountain of files stolen and leaked online by criminals who ransacked the GPU giant's internal systems.

https://go.theregister.com/feed/www.theregister.com/2022/03/05/nvidia_stolen_certificate/
cKure Red
⚠️ Leaked stolen Nvidia cert can sign Windows malware. An Nvidia code-signing certificate was among the mountain of files stolen and leaked online by criminals who ransacked the GPU giant's internal systems. https://go.theregister.com/feed/www.theregist…
Malware now using stolen NVIDIA code signing certificates.

According to samples uploaded to the VirusTotal malware scanning service, the stolen certificates were used to sign various malware and hacking tools, such as Cobalt Strike beacons, Mimikatz, backdoors, and remote access trojans.

https://www.bleepingcomputer.com/news/security/malware-now-using-stolen-nvidia-code-signing-certificates/
There are active credentials being harvested via Stealer malware.

The undermentioned is a list of government sites affected.

https://docs.google.com/spreadsheets/u/0/d/1KC615oNu1GJN4hymAR1Hxe1M46WG_FW4UMmHWbD3y3s/htmlview
The_Art_Of_War.pdf
412.2 KB
An ancient guide to all warfare. By Sun Tzu.

I had heard about it as a child and read it once I was trained as a hacker. I can say; it makes sense.
cKure Red pinned a file
This media is not supported in your browser
VIEW IN TELEGRAM
Dirty Pipe -> kernel r/w+selinux disabled+root shell on Pixel 6 Pro and Sasmsung S22 latest update.

Source: https://twitter.com/i/status/1503422980612923404
Automated pentesting / BugBounty.

https://yogeshojha.github.io/rengine/
Zero-Day in a Vmware product leads to unauthenticated remote code execution via Web interface.

Vmware is aware about the bug and is patching.

There is no patch to the Zero-Day. However, workarounds include use of WAF and disabling features.
☆ FORCEDENTRY: Sandbox Escape. A blog by Google's elite Project zero.

The article documents samples share by CitizenLab of the malware the Israel 🇮🇱 based state-sponsored Cyber-Crime syndicate 'NSO-Group' is infecting devices of people. Which often results in their death or harm to them or their relatives.

https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html