cKure Red
2.5K subscribers
71 photos
46 videos
21 files
458 links
The director's cut on critical feeds from InfoSec world ๐ŸŒŽ

Main Channel: @cKure

โ˜•๏ธ or queries email us
๐Ÿ“จ i@ckure.org
Download Telegram
Pwn2own Austin, United States ๐Ÿ‡บ๐Ÿ‡ธ with ~750K USD ๐Ÿ’ต rewarded in 2 days.

Day 1 results (21 Zero-Day bugs):
https://youtu.be/jAckZAL5Dos

Day 2 results (14 Zero-Day bugs):
https://youtu.be/V3Xoo8IK0-I
cKure Red pinned ยซPwn2own Austin, United States ๐Ÿ‡บ๐Ÿ‡ธ with ~750K USD ๐Ÿ’ต rewarded in 2 days. Day 1 results (21 Zero-Day bugs): https://youtu.be/jAckZAL5Dos Day 2 results (14 Zero-Day bugs): https://youtu.be/V3Xoo8IK0-Iยป
Russia ๐Ÿ‡ท๐Ÿ‡บ: Ukraine ๐Ÿ‡บ๐Ÿ‡ฆ has doxed today five members of the Gamaredon APT, which it says it linked to the Sevastopol branch of the FSB in the Crimean Peninsula.

https://therecord.media/ukraine-discloses-identity-of-gamaredon-members-links-it-to-russias-fsb/
Apparently a zero-day exploit being circulated online that can takeover Instagram accounts.

The phishing link contains ig.me (a lookalike which is not owned by Instagram). The hack allows the attacker to takeover the victims account.

More details as they arrive.
cKure Red
Pwn2own Austin, United States ๐Ÿ‡บ๐Ÿ‡ธ with ~750K USD ๐Ÿ’ต rewarded in 2 days. Day 1 results (21 Zero-Day bugs): https://youtu.be/jAckZAL5Dos Day 2 results (14 Zero-Day bugs): https://youtu.be/V3Xoo8IK0-I
Pwn2own Austin, United States ๐Ÿ‡บ๐Ÿ‡ธ with ~1.1M USD ๐Ÿ’ต rewarded in 4 days with 61 Zero-Day vulnerabilities.

Day 1 results (21 Zero-Day bugs):
https://youtu.be/jAckZAL5Dos

Day 2 results (14 Zero-Day bugs):
https://youtu.be/V3Xoo8IK0-I

Day 3 results (14 Zero-Day bugs):
https://youtu.be/5ap_6F5hxwg

Day 4 results (12 Zero-Day bugs):
https://youtu.be/bURfbHHmMZI
cKure Red pinned ยซPwn2own Austin, United States ๐Ÿ‡บ๐Ÿ‡ธ with ~1.1M USD ๐Ÿ’ต rewarded in 4 days with 61 Zero-Day vulnerabilities. Day 1 results (21 Zero-Day bugs): https://youtu.be/jAckZAL5Dos Day 2 results (14 Zero-Day bugs): https://youtu.be/V3Xoo8IK0-I Day 3 results (14 Zero-Dayโ€ฆยป
CVE-2021-30869: Cyber-Attack by China ๐Ÿ‡จ๐Ÿ‡ณ as a macOS Zero-Day, exploited in watering hole attacks on users in Hong Kong ๐Ÿ‡ญ๐Ÿ‡ฐ

Google revealed that threat actors recently exploited a zero-day vulnerability in macOS to deliver malware to users in Hong Kong.

https://blog.google/threat-analysis-group/how-we-protect-users-0-day-attacks/
Data-Leak: Breaking from Israel ๐Ÿ‡ฎ๐Ÿ‡ฑ as Unit-8200 (the elite cyber espionage, intelligence agency) of the government is listed on the Moses Staff hacking group's website under breached organizations. If true, this could mean leakage of possible state secrets and international deals. This group is believed to be affiliated to Iran ๐Ÿ‡ฎ๐Ÿ‡ท, possibly state sponsored. Iran never denied these claims.

For reference purposes: Unit-8200 has 10K employees.
cKure Red
Photo
Sample data share by the Moses-Staff group.
Pakistan ๐Ÿ‡ต๐Ÿ‡ฐ | Zero-Day | Cyber-War: The 32bit version of CVE-2021-1732 was recently uploaded to Virus Total from Pakistan. The 0-day exploit was used by Bitter APT and developed by the US-based offensive company Exodus Intelligence (aka โ€œMosesโ€).

https://www.virustotal.com/gui/file/ee2d53303e2c5a2787dad11e3a0abce5ea0ff9a4219e963e69a4054a11efc628

Source: CP-Research
Watering hole incident | United Kingdom ๐Ÿ‡ฌ๐Ÿ‡ง | Cyber-War: Advanced cyber warfare group hacked a popular UK new site 'Middle East Eye' that often posts content disapproved by GCC / Middle East countries. The site is blocked in many Middle Eastern nations.

The hacked site served malicious JavaScript that ran in systems of the visitors of the compromised site. The attack vector was based from a known criminal group; 'Candiru' which is declared ๐Ÿ“œ criminal by the United States ๐Ÿ‡บ๐Ÿ‡ธ and is under sanctions. Candiru is another Cyber-Crime syndicate from Israel ๐Ÿ‡ฎ๐Ÿ‡ฑ that operates under Israeli weapons control laws.

This attack apparently stems out from one of the customers of this state-sponsored criminal organisation.

https://www.vice.com/en/article/pkpbdm/hackers-compromised-middle-east-eye-news-website-to-hack-visitors-researchers-say

Details about Candiru sanctions: https://www.vice.com/en/article/dypzjq/us-sanctions-could-cut-off-nso-from-tech-it-relies-on
Data-Leak of Conti ransomware operator as the group sufferes breach that exposed its attack infrastructure and allowed researcher (at Prodaft) to access it.

Interesting thread: https://twitter.com/malwrhunterteam/status/1461450607311605766

Details: https://securityaffairs.co/wordpress/124837/cyber-crime/payment-portal-conti-gang-compromised.html
CVE-2021-42321: Proof-of-concept exploit code has been released online over the weekend for an actively exploited high severity vulnerability impacting Microsoft Exchange servers.

https://gist.github.com/testanull/0188c1ae847f37a70fe536123d14f398