Pwn2own Austin, United States 🇺🇸 with ~750K USD 💵 rewarded in 2 days.
Day 1 results (21 Zero-Day bugs):
https://youtu.be/jAckZAL5Dos
Day 2 results (14 Zero-Day bugs):
https://youtu.be/V3Xoo8IK0-I
Day 1 results (21 Zero-Day bugs):
https://youtu.be/jAckZAL5Dos
Day 2 results (14 Zero-Day bugs):
https://youtu.be/V3Xoo8IK0-I
Russia 🇷🇺: Ukraine 🇺🇦 has doxed today five members of the Gamaredon APT, which it says it linked to the Sevastopol branch of the FSB in the Crimean Peninsula.
https://therecord.media/ukraine-discloses-identity-of-gamaredon-members-links-it-to-russias-fsb/
https://therecord.media/ukraine-discloses-identity-of-gamaredon-members-links-it-to-russias-fsb/
cKure Red
Pwn2own Austin, United States 🇺🇸 with ~750K USD 💵 rewarded in 2 days. Day 1 results (21 Zero-Day bugs): https://youtu.be/jAckZAL5Dos Day 2 results (14 Zero-Day bugs): https://youtu.be/V3Xoo8IK0-I
Pwn2own Austin, United States 🇺🇸 with ~1.1M USD 💵 rewarded in 4 days with 61 Zero-Day vulnerabilities.
Day 1 results (21 Zero-Day bugs):
https://youtu.be/jAckZAL5Dos
Day 2 results (14 Zero-Day bugs):
https://youtu.be/V3Xoo8IK0-I
Day 3 results (14 Zero-Day bugs):
https://youtu.be/5ap_6F5hxwg
Day 4 results (12 Zero-Day bugs):
https://youtu.be/bURfbHHmMZI
Day 1 results (21 Zero-Day bugs):
https://youtu.be/jAckZAL5Dos
Day 2 results (14 Zero-Day bugs):
https://youtu.be/V3Xoo8IK0-I
Day 3 results (14 Zero-Day bugs):
https://youtu.be/5ap_6F5hxwg
Day 4 results (12 Zero-Day bugs):
https://youtu.be/bURfbHHmMZI
CVE-2021-30869: Cyber-Attack by China 🇨🇳 as a macOS Zero-Day, exploited in watering hole attacks on users in Hong Kong 🇭🇰
Google revealed that threat actors recently exploited a zero-day vulnerability in macOS to deliver malware to users in Hong Kong.
https://blog.google/threat-analysis-group/how-we-protect-users-0-day-attacks/
Google revealed that threat actors recently exploited a zero-day vulnerability in macOS to deliver malware to users in Hong Kong.
https://blog.google/threat-analysis-group/how-we-protect-users-0-day-attacks/
Google
How we protect users from 0-day attacks
Google’s Threat Analysis Group (TAG) actively works to detect hacking attempts and influence operations to protect users from digital attacks, this includes hunting for 0-day vulnerabilities because they can be particularly dangerous when exploited and have…
Data-Leak: Breaking from Israel 🇮🇱 as Unit-8200 (the elite cyber espionage, intelligence agency) of the government is listed on the Moses Staff hacking group's website under breached organizations. If true, this could mean leakage of possible state secrets and international deals. This group is believed to be affiliated to Iran 🇮🇷, possibly state sponsored. Iran never denied these claims.
For reference purposes: Unit-8200 has 10K employees.
For reference purposes: Unit-8200 has 10K employees.
Pakistan 🇵🇰 | Zero-Day | Cyber-War: The 32bit version of CVE-2021-1732 was recently uploaded to Virus Total from Pakistan. The 0-day exploit was used by Bitter APT and developed by the US-based offensive company Exodus Intelligence (aka “Moses”).
https://www.virustotal.com/gui/file/ee2d53303e2c5a2787dad11e3a0abce5ea0ff9a4219e963e69a4054a11efc628
https://www.virustotal.com/gui/file/ee2d53303e2c5a2787dad11e3a0abce5ea0ff9a4219e963e69a4054a11efc628
Source: CP-ResearchWatering hole incident | United Kingdom 🇬🇧 | Cyber-War: Advanced cyber warfare group hacked a popular UK new site 'Middle East Eye' that often posts content disapproved by GCC / Middle East countries. The site is blocked in many Middle Eastern nations.
The hacked site served malicious JavaScript that ran in systems of the visitors of the compromised site. The attack vector was based from a known criminal group; 'Candiru' which is declared 📜 criminal by the United States 🇺🇸 and is under sanctions. Candiru is another Cyber-Crime syndicate from Israel 🇮🇱 that operates under Israeli weapons control laws.
This attack apparently stems out from one of the customers of this state-sponsored criminal organisation.
https://www.vice.com/en/article/pkpbdm/hackers-compromised-middle-east-eye-news-website-to-hack-visitors-researchers-say
Details about Candiru sanctions: https://www.vice.com/en/article/dypzjq/us-sanctions-could-cut-off-nso-from-tech-it-relies-on
The hacked site served malicious JavaScript that ran in systems of the visitors of the compromised site. The attack vector was based from a known criminal group; 'Candiru' which is declared 📜 criminal by the United States 🇺🇸 and is under sanctions. Candiru is another Cyber-Crime syndicate from Israel 🇮🇱 that operates under Israeli weapons control laws.
This attack apparently stems out from one of the customers of this state-sponsored criminal organisation.
https://www.vice.com/en/article/pkpbdm/hackers-compromised-middle-east-eye-news-website-to-hack-visitors-researchers-say
Details about Candiru sanctions: https://www.vice.com/en/article/dypzjq/us-sanctions-could-cut-off-nso-from-tech-it-relies-on
VICE
Hackers Compromised Middle East Eye News Website to Hack Visitors, Researchers Say
Cybersecurity researchers tracked a hacking campaign spanning more than a year that hit around 20 websites.
Revelation of Cyber-Attack by Iran 🇮🇷 at United States 🇺🇸 as FBI charges Iranian nationals with interfering in the 2020 U.S. presidential election.
https://www.fbi.gov/wanted/cyber/iranian-interference-in-2020-us-elections
https://www.fbi.gov/wanted/cyber/iranian-interference-in-2020-us-elections
Federal Bureau of Investigation
IRANIAN INTERFERENCE IN 2020 U.S. ELECTIONS | Federal Bureau of Investigation
Conspiracy; Unauthorized Access to a Computer; Knowingly Damaging Protected Computer; Voter Intimidation; Interstate Threats
🔧 Tool: fileless-xec enables a remote binary execution on a local machine directly from memory without dropping them on disk.
https://github.com/ariary/fileless-xec
https://securityonline.info/fileless-xec-a-stealth-dropper/
https://github.com/ariary/fileless-xec
https://securityonline.info/fileless-xec-a-stealth-dropper/
GitHub
GitHub - ariary/fileless-xec: Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support…
Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,...) - ariary/fileless-xec
Data-Leak of Conti ransomware operator as the group sufferes breach that exposed its attack infrastructure and allowed researcher (at Prodaft) to access it.
Interesting thread: https://twitter.com/malwrhunterteam/status/1461450607311605766
Details: https://securityaffairs.co/wordpress/124837/cyber-crime/payment-portal-conti-gang-compromised.html
Interesting thread: https://twitter.com/malwrhunterteam/status/1461450607311605766
Details: https://securityaffairs.co/wordpress/124837/cyber-crime/payment-portal-conti-gang-compromised.html
Twitter
MalwareHunterTeam
Conti guys has some small problems it seems...
CVE-2021-42321: Proof-of-concept exploit code has been released online over the weekend for an actively exploited high severity vulnerability impacting Microsoft Exchange servers.
https://gist.github.com/testanull/0188c1ae847f37a70fe536123d14f398
https://gist.github.com/testanull/0188c1ae847f37a70fe536123d14f398
Gist
PoC of CVE-2021-42321: pop mspaint.exe on the target
PoC of CVE-2021-42321: pop mspaint.exe on the target - CVE-2021-42321_poc.py
Another Microsoft Zero-Day exploit pertaining to bad fix of CVE-2021-41379.
https://github.com/klinix5/InstallerFileTakeOver
Details: https://www.bleepingcomputer.com/news/microsoft/new-windows-zero-day-with-public-exploit-lets-you-become-an-admin/
https://github.com/klinix5/InstallerFileTakeOver
Details: https://www.bleepingcomputer.com/news/microsoft/new-windows-zero-day-with-public-exploit-lets-you-become-an-admin/
■■■□□ Microsoft unveils ‘Super Duper Secure Mode’ in latest version of Edge.
Browser goes further to protect against bugs by disabling JIT.
https://portswigger.net/daily-swig/microsoft-unveils-super-duper-secure-mode-in-latest-version-of-edge
Browser goes further to protect against bugs by disabling JIT.
https://portswigger.net/daily-swig/microsoft-unveils-super-duper-secure-mode-in-latest-version-of-edge
The Daily Swig | Cybersecurity news and views
Microsoft unveils ‘Super Duper Secure Mode’ in latest version of Edge
Browser goes further to protect against bugs by disabling JIT
cKure Red
■■■□□ Microsoft unveils ‘Super Duper Secure Mode’ in latest version of Edge. Browser goes further to protect against bugs by disabling JIT. https://portswigger.net/daily-swig/microsoft-unveils-super-duper-secure-mode-in-latest-version-of-edge
● IMHO; disabling JavaScript on any browser for all sites by default prevents 99% of the known attack vectors. For site like Facebook and other social media, white-listing can be done.
Latest Edge is significantly secure as it prevents most trackers from running by default unlike chrome.
Latest Edge is significantly secure as it prevents most trackers from running by default unlike chrome.