Their findings indicate that EFR systems employ an
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯3
It requires no installation and can be executed directly from a USB drive or over a network share β ideal for forensic workflows with minimal footprint on the target system.
https://github.com/gustavoparedes/Browser-Reviewer
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯2
Math.random() is predictable.CVE-2025-7783: Critical Vulnerability in JavaScript Library Exposes Millions of Apps to Code Execution Attacks.
https://cybersecuritynews.com/javascript-library-vulnerability/
https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯4π1π€―1π1
https://www.cnx-software.com/2025/07/23/diabolic-parasite-esp32-s3-usb-dongle-for-penetration-testing-and-security-research/
Please open Telegram to view this post
VIEW IN TELEGRAM
β€1π₯1π1
β€· $150K funneled from North Koreaβs Lazarus hacking group π»
β€· Facilitating romance scams, human trafficking, and money laundering
β€· Monthly inflows up 51% since July 2024 π
https://youtu.be/3f8ohjxHVmw
https://thehackernews.com/2025/01/illicit-huione-telegram-market.html
Please open Telegram to view this post
VIEW IN TELEGRAM
YouTube
How a Billion-Dollar Cambodian Cybercrime Empire Was Built
What once took place in the dark corners of the internet is now a sprawling ecosystem of illicit activity operating in plain sight - and one Cambodia-based operation seems to have made it all possible.
The US Treasury alleges a unit of a Cambodian conglomerateβ¦
The US Treasury alleges a unit of a Cambodian conglomerateβ¦
π1
https://research.checkpoint.com/2025/cursor-vulnerability-mcpoison/
Please open Telegram to view this post
VIEW IN TELEGRAM
Check Point Research
Cursor IDE's MCP Vulnerability - Check Point Research
Identified Cursor IDE's vulnerability allows attackers to modify MCP configuration files after its one-time approval system
π₯1
72nd Edition of Phrack has been released in limited capacity. Full release in a few days
https://phrack.org/
Please open Telegram to view this post
VIEW IN TELEGRAM
Phrack
Introduction
Click to read the article on phrack
2π₯2π1
From Orange π Tsai to Richard Johnson; researchers / authors have received the hard copy of Phrack and coins.
β€1π1π₯1
βΉοΈ Researchers have identified a new variant of RoKRAT, the malware associated with North Koreaβs APT37 group. This version employs two-stage encrypted shellcode execution and steganography to conceal malicious code inside image files, enabling evasion from traditional detection methods.
π INFECTION VECTOR
β The intrusion begins with a ZIP archive containing a large .lnk shortcut file, often masquerading as legitimate documents.
β Once opened, PowerShell commands embedded within the shortcut unpack multiple hidden components, such as shellcode, batch files, scripts, and decoy documents, and launch the infection chain.
πTWO-STAGE SHELLCODE DECODING
β The initial embedded shellcode is decoded using a single-byte XOR, then injected into a trusted Windows process like mspaint.exe or notepad[.]exe.
β A second stage of XOR-based decoding (e.g. key 0xD6) reveals the full RoKRAT payload, which is executed entirely in memory without writing to disk.
π STEGANOGRAPHIC PAYLOAD DELIVERY
β The standout feature of this variant is the use of steganography: a JPEG image (e.g. "Father.jpg") is downloaded from cloud services (Dropbox, Yandex, pCloud) and contains encrypted shellcode starting at a non-standard offset.
β A dual XOR decoding process transforms this hidden data into an executable loader, which initiates RoKRAT in-memory execution without leaving disk artifacts
π C2 COMMUNICATION & TARGETS
β RoKRAT communicates with C2 infrastructure via legitimate cloud APIs using expired or stolen tokens tied to Dropbox, pCloud, and Yandex.
β The malware collects system info, documents, screenshots, and exfiltrates data in encrypted form, disguised within normal traffic to bypass inspection.
https://www.genians.co.kr/en/blog/threat_intelligence/rokrat_shellcode_steganographic
Please open Telegram to view this post
VIEW IN TELEGRAM