Signal Unveils How Far US Law Enforcement Will Go To Get Information About People.
https://signal.org/bigbrother/santaclara/
https://signal.org/bigbrother/santaclara/
Signal Messenger
Search warrant for Signal user data, Santa Clara County
Here we are in the second half of 2021, Signal still knows nothing about you, but the government keeps asking.
Pwn2own Austin, United States ๐บ๐ธ with ~750K USD ๐ต rewarded in 2 days.
Day 1 results (21 Zero-Day bugs):
https://youtu.be/jAckZAL5Dos
Day 2 results (14 Zero-Day bugs):
https://youtu.be/V3Xoo8IK0-I
Day 1 results (21 Zero-Day bugs):
https://youtu.be/jAckZAL5Dos
Day 2 results (14 Zero-Day bugs):
https://youtu.be/V3Xoo8IK0-I
Russia ๐ท๐บ: Ukraine ๐บ๐ฆ has doxed today five members of the Gamaredon APT, which it says it linked to the Sevastopol branch of the FSB in the Crimean Peninsula.
https://therecord.media/ukraine-discloses-identity-of-gamaredon-members-links-it-to-russias-fsb/
https://therecord.media/ukraine-discloses-identity-of-gamaredon-members-links-it-to-russias-fsb/
cKure Red
Pwn2own Austin, United States ๐บ๐ธ with ~750K USD ๐ต rewarded in 2 days. Day 1 results (21 Zero-Day bugs): https://youtu.be/jAckZAL5Dos Day 2 results (14 Zero-Day bugs): https://youtu.be/V3Xoo8IK0-I
Pwn2own Austin, United States ๐บ๐ธ with ~1.1M USD ๐ต rewarded in 4 days with 61 Zero-Day vulnerabilities.
Day 1 results (21 Zero-Day bugs):
https://youtu.be/jAckZAL5Dos
Day 2 results (14 Zero-Day bugs):
https://youtu.be/V3Xoo8IK0-I
Day 3 results (14 Zero-Day bugs):
https://youtu.be/5ap_6F5hxwg
Day 4 results (12 Zero-Day bugs):
https://youtu.be/bURfbHHmMZI
Day 1 results (21 Zero-Day bugs):
https://youtu.be/jAckZAL5Dos
Day 2 results (14 Zero-Day bugs):
https://youtu.be/V3Xoo8IK0-I
Day 3 results (14 Zero-Day bugs):
https://youtu.be/5ap_6F5hxwg
Day 4 results (12 Zero-Day bugs):
https://youtu.be/bURfbHHmMZI
CVE-2021-30869: Cyber-Attack by China ๐จ๐ณ as a macOS Zero-Day, exploited in watering hole attacks on users in Hong Kong ๐ญ๐ฐ
Google revealed that threat actors recently exploited a zero-day vulnerability in macOS to deliver malware to users in Hong Kong.
https://blog.google/threat-analysis-group/how-we-protect-users-0-day-attacks/
Google revealed that threat actors recently exploited a zero-day vulnerability in macOS to deliver malware to users in Hong Kong.
https://blog.google/threat-analysis-group/how-we-protect-users-0-day-attacks/
Google
How we protect users from 0-day attacks
Googleโs Threat Analysis Group (TAG) actively works to detect hacking attempts and influence operations to protect users from digital attacks, this includes hunting for 0-day vulnerabilities because they can be particularly dangerous when exploited and haveโฆ
Data-Leak: Breaking from Israel ๐ฎ๐ฑ as Unit-8200 (the elite cyber espionage, intelligence agency) of the government is listed on the Moses Staff hacking group's website under breached organizations. If true, this could mean leakage of possible state secrets and international deals. This group is believed to be affiliated to Iran ๐ฎ๐ท, possibly state sponsored. Iran never denied these claims.
For reference purposes: Unit-8200 has 10K employees.
For reference purposes: Unit-8200 has 10K employees.
Pakistan ๐ต๐ฐ | Zero-Day | Cyber-War: The 32bit version of CVE-2021-1732 was recently uploaded to Virus Total from Pakistan. The 0-day exploit was used by Bitter APT and developed by the US-based offensive company Exodus Intelligence (aka โMosesโ).
https://www.virustotal.com/gui/file/ee2d53303e2c5a2787dad11e3a0abce5ea0ff9a4219e963e69a4054a11efc628
https://www.virustotal.com/gui/file/ee2d53303e2c5a2787dad11e3a0abce5ea0ff9a4219e963e69a4054a11efc628
Source: CP-ResearchWatering hole incident | United Kingdom ๐ฌ๐ง | Cyber-War: Advanced cyber warfare group hacked a popular UK new site 'Middle East Eye' that often posts content disapproved by GCC / Middle East countries. The site is blocked in many Middle Eastern nations.
The hacked site served malicious JavaScript that ran in systems of the visitors of the compromised site. The attack vector was based from a known criminal group; 'Candiru' which is declared ๐ criminal by the United States ๐บ๐ธ and is under sanctions. Candiru is another Cyber-Crime syndicate from Israel ๐ฎ๐ฑ that operates under Israeli weapons control laws.
This attack apparently stems out from one of the customers of this state-sponsored criminal organisation.
https://www.vice.com/en/article/pkpbdm/hackers-compromised-middle-east-eye-news-website-to-hack-visitors-researchers-say
Details about Candiru sanctions: https://www.vice.com/en/article/dypzjq/us-sanctions-could-cut-off-nso-from-tech-it-relies-on
The hacked site served malicious JavaScript that ran in systems of the visitors of the compromised site. The attack vector was based from a known criminal group; 'Candiru' which is declared ๐ criminal by the United States ๐บ๐ธ and is under sanctions. Candiru is another Cyber-Crime syndicate from Israel ๐ฎ๐ฑ that operates under Israeli weapons control laws.
This attack apparently stems out from one of the customers of this state-sponsored criminal organisation.
https://www.vice.com/en/article/pkpbdm/hackers-compromised-middle-east-eye-news-website-to-hack-visitors-researchers-say
Details about Candiru sanctions: https://www.vice.com/en/article/dypzjq/us-sanctions-could-cut-off-nso-from-tech-it-relies-on
VICE
Hackers Compromised Middle East Eye News Website to Hack Visitors, Researchers Say
Cybersecurity researchers tracked a hacking campaign spanning more than a year that hit around 20 websites.
Revelation of Cyber-Attack by Iran ๐ฎ๐ท at United States ๐บ๐ธ as FBI charges Iranian nationals with interfering in the 2020 U.S. presidential election.
https://www.fbi.gov/wanted/cyber/iranian-interference-in-2020-us-elections
https://www.fbi.gov/wanted/cyber/iranian-interference-in-2020-us-elections
Federal Bureau of Investigation
IRANIAN INTERFERENCE IN 2020 U.S. ELECTIONS | Federal Bureau of Investigation
Conspiracy; Unauthorized Access to a Computer; Knowingly Damaging Protected Computer; Voter Intimidation; Interstate Threats
๐ง Tool: fileless-xec enables a remote binary execution on a local machine directly from memory without dropping them on disk.
https://github.com/ariary/fileless-xec
https://securityonline.info/fileless-xec-a-stealth-dropper/
https://github.com/ariary/fileless-xec
https://securityonline.info/fileless-xec-a-stealth-dropper/
GitHub
GitHub - ariary/fileless-xec: Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP supportโฆ
Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,...) - ariary/fileless-xec
Data-Leak of Conti ransomware operator as the group sufferes breach that exposed its attack infrastructure and allowed researcher (at Prodaft) to access it.
Interesting thread: https://twitter.com/malwrhunterteam/status/1461450607311605766
Details: https://securityaffairs.co/wordpress/124837/cyber-crime/payment-portal-conti-gang-compromised.html
Interesting thread: https://twitter.com/malwrhunterteam/status/1461450607311605766
Details: https://securityaffairs.co/wordpress/124837/cyber-crime/payment-portal-conti-gang-compromised.html
Twitter
MalwareHunterTeam
Conti guys has some small problems it seems...
CVE-2021-42321: Proof-of-concept exploit code has been released online over the weekend for an actively exploited high severity vulnerability impacting Microsoft Exchange servers.
https://gist.github.com/testanull/0188c1ae847f37a70fe536123d14f398
https://gist.github.com/testanull/0188c1ae847f37a70fe536123d14f398
Gist
PoC of CVE-2021-42321: pop mspaint.exe on the target
PoC of CVE-2021-42321: pop mspaint.exe on the target - CVE-2021-42321_poc.py
Another Microsoft Zero-Day exploit pertaining to bad fix of CVE-2021-41379.
https://github.com/klinix5/InstallerFileTakeOver
Details: https://www.bleepingcomputer.com/news/microsoft/new-windows-zero-day-with-public-exploit-lets-you-become-an-admin/
https://github.com/klinix5/InstallerFileTakeOver
Details: https://www.bleepingcomputer.com/news/microsoft/new-windows-zero-day-with-public-exploit-lets-you-become-an-admin/