Cyber-War: Iran 🇮🇷 has been hit with a strong SCADA based cyber-attack as multiple organisations capitulate under the physical damages that have been caused.
Please note that this is 1-sided information by the threat actor who did not contact us directly.
In their message; they said, "Today, we, "Gonjeshke Darande", carried out cyberattacks against Iran's steel industry which affiliated with the IRGC and the Basij: the Khouzestan Steel Company (KSC), the Mobarakeh Steel Company (Isfahan) (MSC) and the Hormozgan Steel Company (HOSCO). These companies are subject to international sanctions and continue their operations despite the restrictions. These cyberattacks, being carried out carefully so to protect innocent individuals, are in response to the aggression of the Islamic Republic.
As you can see in attached video, these cyberattacks have been carried out carefully so to protect innocent individuals. We also expose here evidence of our access to these companies."
Please note that this is 1-sided information by the threat actor who did not contact us directly.
In their message; they said, "Today, we, "Gonjeshke Darande", carried out cyberattacks against Iran's steel industry which affiliated with the IRGC and the Basij: the Khouzestan Steel Company (KSC), the Mobarakeh Steel Company (Isfahan) (MSC) and the Hormozgan Steel Company (HOSCO). These companies are subject to international sanctions and continue their operations despite the restrictions. These cyberattacks, being carried out carefully so to protect innocent individuals, are in response to the aggression of the Islamic Republic.
As you can see in attached video, these cyberattacks have been carried out carefully so to protect innocent individuals. We also expose here evidence of our access to these companies."
cKure Red
Video
● Ckure is able to confirm the cyber-attack on Iran 🇮🇷 to be authentic.
Weaponizing and Abusing Hidden Functionalities
Contained in Office Document Properties.
https://www.offensive-security.com/offsec/macro-weaponization/
Contained in Office Document Properties.
https://www.offensive-security.com/offsec/macro-weaponization/
OffSec
Weaponizing and Abusing Hidden Functionalities Contained in Office Document Properties | OffSec
TJ shows us how adversaries use macro weaponization techniques to abuse hidden functionalities contained in Office document properties.
Bypassing Firefox's HTML Sanitizer API.
https://portswigger.net/research/bypassing-firefoxs-html-sanitizer-api
https://portswigger.net/research/bypassing-firefoxs-html-sanitizer-api
PortSwigger Research
Bypassing Firefox's HTML Sanitizer API
The HTML Sanitizer is a great new API that allows web developers to filter untrusted HTML natively in the browser rather than use a JavaScript library such as DOM Purify. Microsoft created a similar A
Massive ayber-attack launched by 'DragonForce Malaysia' 🇲🇾 and 'Hacktivist Indonesia' 🇮🇩 on India 🇮🇳 as a revenge amid remarks by ruling party (BJP) spokesperson Nupur Sharma on the prophet (Islam).
Around 2K websites were taken down (data stolen and defaced). These include a vast variety of governed sites.
As per source, details of Nupur Sharma were leaked including contact details and location.
As of now the attack has not stopped and over a dozen hackers participated in the onslaught.
India has cited help from Interpol and help from authorities in Malaysia 🇲🇾 and Indonesia 🇮🇩
Around 2K websites were taken down (data stolen and defaced). These include a vast variety of governed sites.
As per source, details of Nupur Sharma were leaked including contact details and location.
As of now the attack has not stopped and over a dozen hackers participated in the onslaught.
India has cited help from Interpol and help from authorities in Malaysia 🇲🇾 and Indonesia 🇮🇩
Mangle, a tool 🔧 that manipulates aspects of compiled executables (.exe or DLL). Mangle can remove known Indicators of Compromise (IoC) based strings and replace them with random characters, change the file by inflating the size to avoid EDRs, and can clone code-signing certs from legitimate files. In doing so, Mangle helps loaders evade on-disk and in-memory scanners.
https://github.com/optiv/Mangle
https://github.com/optiv/Mangle
GitHub
GitHub - optiv/Mangle: Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from…
Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs - optiv/Mangle
Cyber-Attack amid Cyber-War by Russia 🇷🇺 as apparently for about 12 hours Rostelecom hijacked part of the traffic destinated to Apple 🍎
https://www.manrs.org/2022/07/for-12-hours-was-part-of-apple-engineerings-network-hijacked-by-russias-rostelecom/
https://www.manrs.org/2022/07/for-12-hours-was-part-of-apple-engineerings-network-hijacked-by-russias-rostelecom/
MANRS
For 12 Hours, Was Part of Apple Engineering’s Network Hijacked by Russia’s Rostelecom? - MANRS
For a little over 12 hours on 26-27 July, a network operated by Russia’s Rostelecom started announcing routes for part of Apple’s network. The effect was that Internet users in parts of the Internet trying to connect to Apple’s services may have been redirected…
Data-Leak: 4TB of proprietary data from Israel 🇮🇱 based Cellebrite (Cellebrite Mobilogy & Cellebrite TFS backup) leaked by anonymous source.
Notably, Cellebrite Mobilogy shares code with Cellebrite Universal Forensics Extraction Device or Cellebrite UFED, used by law enforcement agencies. Source: Soufiane.
Notably, Cellebrite Mobilogy shares code with Cellebrite Universal Forensics Extraction Device or Cellebrite UFED, used by law enforcement agencies. Source: Soufiane.