cKure Red
2.35K subscribers
70 photos
32 videos
21 files
447 links
The director's cut on critical feeds from InfoSec world ๐ŸŒŽ

Main Channel: @cKure

โ˜•๏ธ or queries email us
๐Ÿ“จ i@ckure.org
Download Telegram
๐Ÿ CVE-2024-44236: Remote Code Execution vulnerability in Apple macOS.

An out-of-bounds write vulnerability has been reported in macOS. The vulnerability is due to the lack of proper validation of โ€œlutAToBTypeโ€ and โ€œlutBToATypeโ€ tag types.

A remote attacker could exploit this vulnerability by enticing a victim to open a crafted file. A successful attack may result in code execution on the victim's machine in the context of the running process.


https://www.zerodayinitiative.com/blog/2025/5/7/cve-2024-44236-remote-code-execution-vulnerability-in-apple-macos
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ”’Bypassing CrowdStrike Falcon using PowerShel.

Simulated scenario where a PowerShell script is used to silently bypass a CrowdStrike Falcon endpoint and establish a reverse shell all while the sensor is running
Objective: Demonstrate how threat actors may abuse trusted scripting environments and highlight the importance of layered defence and behavioural detection.

Source: Linkedin Bibek Sapkota
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘ป5๐Ÿ‘32
cKure Red pinned ยซ๐ŸŽCVE-2025-31200: Apple iPhone RCE by opening a video file. ๐ŸŽžhttps://youtu.be/nTO3TRBW00Eยป
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ˜Ž๐Ÿ˜Ž๐Ÿ˜Ž Zuckerberg's contribution to genocide. The jew โœก๏ธ who hired Zionists from Mossad / Unit 8200 and likes; as employees at high positions to access WhatsApp data of users and, in one instance murdering all members of a group for the fact that one of the members was once affiliated with Hamas militant group.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿคฎ5๐Ÿ‘2๐Ÿ˜จ2โคโ€๐Ÿ”ฅ1๐Ÿ”ฅ1๐Ÿ‘1๐Ÿ†’1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ“ฑ Samsung shares surveillance software under the control of the Israeli firm [IronSource].

๐Ÿ“Œ A class of Samsung devices are vulnerable.

๐Ÿ“ŒLegally, Samsung can not install the third-partyware.

๐Ÿ“ŒApp cloud โ˜๏ธ can not be removed unless the device is rooted.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘3๐Ÿคฎ2๐Ÿคฏ1๐Ÿ˜จ1
3626205.3659144.pdf
1.4 MB
โœˆ๏ธ Silently taking over a plane using the ARINC 429 protocol: message injection, modification, and deletion on avionics data buses. Security researchers Daniel Dorigat, Martin Strohmeier, and Stephan Neuhaus shared their academic article, "Air-Bus Hijacking: Silently Taking Over Avionics Systems," on the security analysis of avionics systems in Boeing planes. The main goal was to highlight security weaknesses in avionics data protocols. The authors analyzed the protocols, carried out successful data manipulation attacks, and demonstrated how these attacks could disrupt internal plane systems and feed false information to the pilots. The attacks require physical access to the bus, and there is currently no way to carry them out from outside the planeโ€ฆ yet.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ43
๐ŸŒBreaking TETRA: a backdoor in cryptography and other security issues in radios used by police, army, and OT worldwide.

Security researchers Jos Wetzels, Carlo Meijer, and Wouter Bokslag shared their research on TETRA technology by reverse engineering Motorola MBTS and MTM5400 radios and extracting the secrets from them.

TETRA is a radio technology patented in 1995 and based on proprietary cryptography. Equipment using this protocol was developed for law enforcement and military clients, as well as for 0T and SCADA systems used in machine-to-machine communication. So, the impact is huge.

The authors also identified traces of the first attacks on TETRA dating back to 2009. It looks like an NDA is not enough to protect against hackers.

References:
All Cops Are Broadcasting: Breaking TETRA After Decades In The Shadows.
https://youtube.com/watch

๐Ÿ“PDF:
https://orangecon.nl/legacy/2024/assets/slides/2024/OrangeCon2024%20-%20All%20Cops%20Are%20Broadcasting.pdf

White Paper ๐Ÿ“ƒ
https://www.usenix.org/system/files/usenixsecurity23-meijer.pdf
Please open Telegram to view this post
VIEW IN TELEGRAM
โค1๐Ÿค”1๐Ÿฅฑ1๐Ÿ†’11
A comprehensive review of over 50 research papers on fault injection and side-channel attacks, published between 2009 and 2021, has been compiled by a team of academic researchers. This survey analyzes existing knowledge, significant discoveries, and potential avenues for future research in this field. The accompanying bibliography includes 175 relevant sources.

๐Ÿ“"Physical Fault injection and Side-Channel Attacks on
Mobile Devices: A Comprehensive Analysis"

https://pure.royalholloway.ac.uk/ws/portalfiles/portal/43165354/Physical_Fault_Injection_and_Side_Channel_Attacks_on_Mobile_Devices.pdf
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ2๐Ÿ‘1๐Ÿ˜ฑ1
๐ŸคฉGoogle Chromeโ€™s unique handling of referrer-policy creates a major loophole for silent data siphoning.

CVE-2025-4664 proves that even trusted browsers are not immune to catastrophic zero-day vulnerabilities.

Cross-origin data is up for grabs if you haven't updated Chrome or Chromium.


https://wazuh.com/blog/detecting-chrome-cve-2025-4664-vulnerability-with-wazuh/

https://www.techradar.com/pro/security/billions-of-chrome-users-at-risk-from-new-data-stealing-browser-vulnerability-how-to-stay-safe
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ŸŸฅ Facebook app and other Meta apps are malware that bypass security audits to leak user data to meta servers.

The covert method Meta uses to track mobile browsing without consent โ€” even in incognito mode or with a VPN on all androis devices.

Patch immediately: Reset the phone and make sure not to install any app by Meta.


https://english.elpais.com/technology/2025-06-03/the-covert-method-meta-uses-to-track-mobile-browsing-without-consent-even-in-incognito-mode-or-with-a-vpn.html
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿคฏ4โค1๐Ÿคก1
๐Ÿค– FridaScriptGen: It scans an APKโ€™s Smali code for root-detection and SSL-pinning patterns and then automatically creates Frida scripts to bypass these security checks.

https://github.com/thecybersandeep/frida-script-gen
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ3
๐Ÿ‘ฉโ€๐Ÿ’ป Zero-Day used by Stealth Falcon (UAE ๐Ÿ‡ฆ๐Ÿ‡ชbased APT group) in a spear-phishing campaign:

โ›“ .URL file exploitation (assigned CVE-2025-33053)

๐Ÿ’ป Custom Mythic implants, LOLBins, and custom payloads

๐ŸŒ High-profile targets across the Middle East and Africa.

https://research.checkpoint.com/2025/stealth-falcon-zero-day/
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ1๐Ÿฅด1
๐Ÿš€ Interference-proof CRP antenna ะšะพะผะตั‚ะฐ-ะœ8 used in S8000 Banderol, a Russian Cruise Missile.

https://war-sanctions.gur.gov.ua/en/components/6041
Please open Telegram to view this post
VIEW IN TELEGRAM
โค1
๐Ÿš˜๐ŸŽ™ Streaming Zero-Fi Shells to Your Smart Speaker.
Exploiting the Sonos Era 300 with malicious HLS playlist.

PwnยฒOwn Ireland ๐Ÿ‡ฎ๐Ÿ‡ช
Exploit:
https://github.com/ret2/Pwn2Own-Ireland2024-Sonos

Reference: Sonos advisory
https://www.sonos.com/en-us/security-advisory-2024-0002
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ1
๐Ÿ’ง๐ŸŒŠ Hydroph0bia (CVE-2025-4275) - a trivial SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O.

Secure Boot bypass for laptops, embedded and medical devices, and car ECUs: technical details and exploit. Security researcher Nikolaj Schlej shared yesterday a new and quite effective (even trivial) way to bypass Secure Boot in Insyde H20 UEFI BIOS. The vulnerability, CVE-2025-4275, was named Hydroph0bia by the author. Most ARM-based laptops from Acer, HP, Lenovo, Huawei, Samsung, and Dell use this BIOS and are therefore affected. This product is also ported to multiple systems for IoT, SCADA, and critical infrastructure. Insyde H20 continuously presents its solutions for communication devices, robotics, and manufacturing equipment. Car components, as well as other areas in digital mobility (aviation, maritime, and railroad), also use Insyde H20 Secure Boot as part of ARM-based and other UEFI-compatible systems. So, check your SBOMs and make sure your product is not affected.


https://coderush.me/hydroph0bia-part1/

https://coderush.me/hydroph0bia-part2/
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ด Hackers Decrypt Telco Customer Data.

๐Ÿ‘คMost sensitive data be encrypted by organizations that handle it? Yes, absolutely. Is it always encrypted?

๐Ÿ”ฅUnfortunately, not like in the recent SK Telecom HSS breach, USIM keys were reportedly stored in plain format without proper protection.

๐Ÿ’ป Now, what happens when the stolen data is encrypted?
Time plays in the hackerโ€™s favour. If the data has long-term value, they may invest effort in decrypting it, and that's exactly what seems to have happened here:

๐Ÿ“‚ A dataset of over 70 million AT&T customer records (some say 86 million) began circulating on cybercrime forums in mid-May 2025:

๐Ÿ”ปFull names, birthdates, phone numbers, emails, and addresses.
๐Ÿ”ปAround 44 million Social Security Numbers, now fully decrypted!

Itโ€™s believed the dataset originates from earlier breaches (possibly 2021), where the SSNs were encrypted. But now itโ€™s been fully decrypted, repackaged, and released as a clean structured identity database.

๐Ÿงจ Which is badโ€ฆ This data has lifelong fraud potential!
Hackers can use it to bypass most legacy validation and KYC processes, from SIM swap attacks to full-scale identity theft, fraudulent loans, etc.

โš ๏ธ A not so quiet side effect: a reminder that static data was never meant to prove identity. SSNs and similar identifiers were never meant to be authentication factors, but theyโ€™ve been treated as such for decades.

Please keep in mind:
๐Ÿ”ปSSN + DOB + Address + Else โ‰  Identity proof
๐Ÿ”ปAny system relying on static identity data is open to impersonation and abuse.


Credits: Linkedin | Dimitry Kurbatov
Please open Telegram to view this post
VIEW IN TELEGRAM
Iranian ๐Ÿ‡ฎ๐Ÿ‡ท state sponsored threat actor burned at least 3 zero-day vulnerabilities after the SOC tried to remove them from the network in UAE's ๐Ÿ‡ฆ๐Ÿ‡ช critical infrastructure who were in the system for over 2 years.
-Fortinet


As per Fortinet, the environment was staging or not fully production.