cKure Red
2.35K subscribers
70 photos
32 videos
21 files
447 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
🤩Google Chrome’s unique handling of referrer-policy creates a major loophole for silent data siphoning.

CVE-2025-4664 proves that even trusted browsers are not immune to catastrophic zero-day vulnerabilities.

Cross-origin data is up for grabs if you haven't updated Chrome or Chromium.


https://wazuh.com/blog/detecting-chrome-cve-2025-4664-vulnerability-with-wazuh/

https://www.techradar.com/pro/security/billions-of-chrome-users-at-risk-from-new-data-stealing-browser-vulnerability-how-to-stay-safe
Please open Telegram to view this post
VIEW IN TELEGRAM
🟥 Facebook app and other Meta apps are malware that bypass security audits to leak user data to meta servers.

The covert method Meta uses to track mobile browsing without consent — even in incognito mode or with a VPN on all androis devices.

Patch immediately: Reset the phone and make sure not to install any app by Meta.


https://english.elpais.com/technology/2025-06-03/the-covert-method-meta-uses-to-track-mobile-browsing-without-consent-even-in-incognito-mode-or-with-a-vpn.html
Please open Telegram to view this post
VIEW IN TELEGRAM
🤯41🤡1
🤖 FridaScriptGen: It scans an APK’s Smali code for root-detection and SSL-pinning patterns and then automatically creates Frida scripts to bypass these security checks.

https://github.com/thecybersandeep/frida-script-gen
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3
👩‍💻 Zero-Day used by Stealth Falcon (UAE 🇦🇪based APT group) in a spear-phishing campaign:

.URL file exploitation (assigned CVE-2025-33053)

💻 Custom Mythic implants, LOLBins, and custom payloads

🌍 High-profile targets across the Middle East and Africa.

https://research.checkpoint.com/2025/stealth-falcon-zero-day/
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥1🥴1
🚀 Interference-proof CRP antenna Комета-М8 used in S8000 Banderol, a Russian Cruise Missile.

https://war-sanctions.gur.gov.ua/en/components/6041
Please open Telegram to view this post
VIEW IN TELEGRAM
1
🚘🎙 Streaming Zero-Fi Shells to Your Smart Speaker.
Exploiting the Sonos Era 300 with malicious HLS playlist.

Pwn²Own Ireland 🇮🇪
Exploit:
https://github.com/ret2/Pwn2Own-Ireland2024-Sonos

Reference: Sonos advisory
https://www.sonos.com/en-us/security-advisory-2024-0002
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥1
💧🌊 Hydroph0bia (CVE-2025-4275) - a trivial SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O.

Secure Boot bypass for laptops, embedded and medical devices, and car ECUs: technical details and exploit. Security researcher Nikolaj Schlej shared yesterday a new and quite effective (even trivial) way to bypass Secure Boot in Insyde H20 UEFI BIOS. The vulnerability, CVE-2025-4275, was named Hydroph0bia by the author. Most ARM-based laptops from Acer, HP, Lenovo, Huawei, Samsung, and Dell use this BIOS and are therefore affected. This product is also ported to multiple systems for IoT, SCADA, and critical infrastructure. Insyde H20 continuously presents its solutions for communication devices, robotics, and manufacturing equipment. Car components, as well as other areas in digital mobility (aviation, maritime, and railroad), also use Insyde H20 Secure Boot as part of ARM-based and other UEFI-compatible systems. So, check your SBOMs and make sure your product is not affected.


https://coderush.me/hydroph0bia-part1/

https://coderush.me/hydroph0bia-part2/
Please open Telegram to view this post
VIEW IN TELEGRAM
🔴 Hackers Decrypt Telco Customer Data.

👤Most sensitive data be encrypted by organizations that handle it? Yes, absolutely. Is it always encrypted?

🔥Unfortunately, not like in the recent SK Telecom HSS breach, USIM keys were reportedly stored in plain format without proper protection.

💻 Now, what happens when the stolen data is encrypted?
Time plays in the hacker’s favour. If the data has long-term value, they may invest effort in decrypting it, and that's exactly what seems to have happened here:

📂 A dataset of over 70 million AT&T customer records (some say 86 million) began circulating on cybercrime forums in mid-May 2025:

🔻Full names, birthdates, phone numbers, emails, and addresses.
🔻Around 44 million Social Security Numbers, now fully decrypted!

It’s believed the dataset originates from earlier breaches (possibly 2021), where the SSNs were encrypted. But now it’s been fully decrypted, repackaged, and released as a clean structured identity database.

🧨 Which is bad… This data has lifelong fraud potential!
Hackers can use it to bypass most legacy validation and KYC processes, from SIM swap attacks to full-scale identity theft, fraudulent loans, etc.

⚠️ A not so quiet side effect: a reminder that static data was never meant to prove identity. SSNs and similar identifiers were never meant to be authentication factors, but they’ve been treated as such for decades.

Please keep in mind:
🔻SSN + DOB + Address + Else ≠ Identity proof
🔻Any system relying on static identity data is open to impersonation and abuse.


Credits: Linkedin | Dimitry Kurbatov
Please open Telegram to view this post
VIEW IN TELEGRAM
Iranian 🇮🇷 state sponsored threat actor burned at least 3 zero-day vulnerabilities after the SOC tried to remove them from the network in UAE's 🇦🇪 critical infrastructure who were in the system for over 2 years.
-Fortinet


As per Fortinet, the environment was staging or not fully production.
cKure Red pinned «🔗 Resurrecting a dead torrent tracker and finding 3 million peers. A possible malware distribution mechanism. https://kianbradley.com/2025/06/15/resurrecting-a-dead-tracker.html»
This media is not supported in the widget
VIEW IN TELEGRAM
1😱1🥱1
cKure Red
🤩🤩 Iran's missile struck a Microsoft site or a nearby area, amid reports the company is working with the Israeli military on AI and missile-tracking technology.
Please open Telegram to view this post
VIEW IN TELEGRAM
🤡4👍2🤮1
📡 Cell towers (Network) can be used as a RADAR system.

An interesting thread.

https://x.com/giammaiot2/status/1939711630511595664
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥21
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥21🥱11
🔥Fabian Bräunlein and Luca Melette, security researchers, have recently unveiled their research on European streetlights and power plants, which utilize the radio ripple control system developed by EFR.

Their findings indicate that EFR systems employ an 💣 unencrypted RF 🚨 protocol to transmit control commands via longwave radio to a multitude of devices, including relays in solar/wind plants, heat pumps, and streetlights.

🔥Upon being notified of these research findings, the company responded by threatening the researchers with legal action; however, 🐉the research has since been published.

📹https://youtu.be/DAf-T3bFJFs
📰https://positive.security/blog/blinkencity-38c3
📰https://fahrplan.events.ccc.de/congress/2024/fahrplan/media/38c3/submissions/HSNZGR/resources/20241228-BlinkenCity-38c3_53qew19.pdf
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3