cKure Red
2.39K subscribers
70 photos
34 videos
21 files
449 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
Top_C_C_Methods_1699929574.pdf
8.1 MB
Command and control methods with details.
cKure Red pinned a file
An Indian hack-for-hire group targeted the United States, China, Myanmar, Pakistan, Kuwait, and other countries as part of a wide-ranging espionage, surveillance, and disruptive operation for over a decade.

The Appin Software Security (aka Appin Security Group), according to an in-depth analysis from SentinelOne, began as an educational startup offering offensive security training programs, while carrying out covert hacking operations since at least 2009.

https://thehackernews.com/2023/11/indian-hack-for-hire-group-targeted-us.html

https://thehackernews.com/2013/05/first-large-cyber-espionage-activity.html
ISRAEL GAZA CONFLICT THE CYBER PERSPECTIVE.pdf
1.8 MB
Documentation of cyber activity amid the Israel Palestine war.
Shadowy hacking group targeting Israel shows outsized capabilities. Islarel Palestine conflict.

A sophisticated campaign that has targeted Israel for at least 8 years shows evidence of improving its capabilities.

https://cyberscoop.com/hacking-israel-wild-card/
Indian government asks Reuters news agency 📰 to take down an article titled "How an Indian startup hacked the world 🌍"

Reuters had published the article and removed it after the Indian court order.

Reuters released the details about this: https://www.reuters.com/investigates/special-report/usa-hackers-appin/

It is likely that the article mentioned criminal activity by the startup that involved people in power and access.
cKure Red pinned «How an Indian startup (Appin) hacked the world 🌍 https://web.archive.org/web/20231117025741/https://www.reuters.com/investigates/special-report/usa-hackers-appin/»
Whatsapp Spoofing impersonate of reply message

All official WhatsApp clients, upon receiving a "Message Reply" payload (QuotedMessage), do not validate whether the "ContextInfo" of this "QuotedMessage" is valid/exists ("StanzaId" and "Participant"). This allows a malicious actor to send in private chats or groups a "QuotedMessage" of a message that never existed on behalf of another person. This is highly critical and dangerous.

https://github.com/lichti/whats-spoofing

PoC: https://youtu.be/_WL6hpAvNh8
Exploring Hell's Gate.

Hell's Gate makes it possible to execute direct syscalls based on dynamically retrieving the required SSNs via a combination of walking the Process Environment Block (PEB), parsing the Export Address Table (EAT) from ntdll.dll, opcode comparison from the syscall stub of the native functions and extracting the SSNs.


https://redops.at/en/blog/exploring-hells-gate