cKure Red
2.5K subscribers
71 photos
46 videos
21 files
458 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
Massive ayber-attack launched by 'DragonForce Malaysia' 🇲🇾 and 'Hacktivist Indonesia' 🇮🇩 on India 🇮🇳 as a revenge amid remarks by ruling party (BJP) spokesperson Nupur Sharma on the prophet (Islam).

Around 2K websites were taken down (data stolen and defaced). These include a vast variety of governed sites.

As per source, details of Nupur Sharma were leaked including contact details and location.

As of now the attack has not stopped and over a dozen hackers participated in the onslaught.

India has cited help from Interpol and help from authorities in Malaysia 🇲🇾 and Indonesia 🇮🇩
● Leaked Indian data. Data blurred for pricacy resons.
Mangle, a tool 🔧 that manipulates aspects of compiled executables (.exe or DLL). Mangle can remove known Indicators of Compromise (IoC) based strings and replace them with random characters, change the file by inflating the size to avoid EDRs, and can clone code-signing certs from legitimate files. In doing so, Mangle helps loaders evade on-disk and in-memory scanners.

https://github.com/optiv/Mangle
Data-Leak: 4TB of proprietary data from Israel 🇮🇱 based Cellebrite (Cellebrite Mobilogy & Cellebrite TFS backup) leaked by anonymous source.

Notably, Cellebrite Mobilogy shares code with Cellebrite Universal Forensics Extraction Device or Cellebrite UFED, used by law enforcement agencies. Source: Soufiane.
Zero-Day: Paracosme (CVE-2022-33318) is the zero-click remote code execution memory corruption exploit to compromise ICONICS Genesis64 on stage at Pwn2Own2022 Miami.

https://www.zerodayinitiative.com/advisories/ZDI-22-1041/
Zero-Day: 3 in-the-wild 0-days patched in the last two days:
* CVE-2022-2856 in Chrome discovered by twitter.com/ashl3y_shen & twitter.com/0xbadcafe1 of Google TAG
* CVE-2022-32893 in Safari
* CVE-2022-32894 in iOS/macOS kernel

https://docs.google.com/spreadsheets/u/0/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/htmlview#gid=1662223764
DPRK state-sponsored actors are using cryptographically signed MacOS (Apple 🍎) executables to impersonate coinbase and lure potential jobseekers in installing their spyware.