cKure Red
2.5K subscribers
71 photos
46 videos
21 files
458 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
Cyber-War: Iran 🇮🇷 has been hit with a strong SCADA based cyber-attack as multiple organisations capitulate under the physical damages that have been caused.

Please note that this is 1-sided information by the threat actor who did not contact us directly.

In their message; they said, "Today, we, "Gonjeshke Darande", carried out cyberattacks against Iran's steel industry which affiliated with the IRGC and the Basij: the Khouzestan Steel Company (KSC), the Mobarakeh Steel Company (Isfahan) (MSC) and the Hormozgan Steel Company (HOSCO). These companies are subject to international sanctions and continue their operations despite the restrictions. These cyberattacks, being carried out carefully so to protect innocent individuals, are in response to the aggression of the Islamic Republic.

As you can see in attached video, these cyberattacks have been carried out carefully so to protect innocent individuals. We also expose here evidence of our access to these companies."
cKure Red pinned a photo
cKure Red
Video
Ckure is able to confirm the cyber-attack on Iran 🇮🇷 to be authentic.
OSINT: IntelTechniques Search Tools.

https://inteltechniques.com/tools/
Massive ayber-attack launched by 'DragonForce Malaysia' 🇲🇾 and 'Hacktivist Indonesia' 🇮🇩 on India 🇮🇳 as a revenge amid remarks by ruling party (BJP) spokesperson Nupur Sharma on the prophet (Islam).

Around 2K websites were taken down (data stolen and defaced). These include a vast variety of governed sites.

As per source, details of Nupur Sharma were leaked including contact details and location.

As of now the attack has not stopped and over a dozen hackers participated in the onslaught.

India has cited help from Interpol and help from authorities in Malaysia 🇲🇾 and Indonesia 🇮🇩
● Leaked Indian data. Data blurred for pricacy resons.
Mangle, a tool 🔧 that manipulates aspects of compiled executables (.exe or DLL). Mangle can remove known Indicators of Compromise (IoC) based strings and replace them with random characters, change the file by inflating the size to avoid EDRs, and can clone code-signing certs from legitimate files. In doing so, Mangle helps loaders evade on-disk and in-memory scanners.

https://github.com/optiv/Mangle
Data-Leak: 4TB of proprietary data from Israel 🇮🇱 based Cellebrite (Cellebrite Mobilogy & Cellebrite TFS backup) leaked by anonymous source.

Notably, Cellebrite Mobilogy shares code with Cellebrite Universal Forensics Extraction Device or Cellebrite UFED, used by law enforcement agencies. Source: Soufiane.