From Orange ๐ Tsai to Richard Johnson; researchers / authors have received the hard copy of Phrack and coins.
โค1๐1๐ฅ1
โน๏ธ Researchers have identified a new variant of RoKRAT, the malware associated with North Koreaโs APT37 group. This version employs two-stage encrypted shellcode execution and steganography to conceal malicious code inside image files, enabling evasion from traditional detection methods.
๐ INFECTION VECTOR
โ The intrusion begins with a ZIP archive containing a large .lnk shortcut file, often masquerading as legitimate documents.
โ Once opened, PowerShell commands embedded within the shortcut unpack multiple hidden components, such as shellcode, batch files, scripts, and decoy documents, and launch the infection chain.
๐TWO-STAGE SHELLCODE DECODING
โ The initial embedded shellcode is decoded using a single-byte XOR, then injected into a trusted Windows process like mspaint.exe or notepad[.]exe.
โ A second stage of XOR-based decoding (e.g. key 0xD6) reveals the full RoKRAT payload, which is executed entirely in memory without writing to disk.
๐ STEGANOGRAPHIC PAYLOAD DELIVERY
โ The standout feature of this variant is the use of steganography: a JPEG image (e.g. "Father.jpg") is downloaded from cloud services (Dropbox, Yandex, pCloud) and contains encrypted shellcode starting at a non-standard offset.
โ A dual XOR decoding process transforms this hidden data into an executable loader, which initiates RoKRAT in-memory execution without leaving disk artifacts
๐ C2 COMMUNICATION & TARGETS
โ RoKRAT communicates with C2 infrastructure via legitimate cloud APIs using expired or stolen tokens tied to Dropbox, pCloud, and Yandex.
โ The malware collects system info, documents, screenshots, and exfiltrates data in encrypted form, disguised within normal traffic to bypass inspection.
https://www.genians.co.kr/en/blog/threat_intelligence/rokrat_shellcode_steganographic
Please open Telegram to view this post
VIEW IN TELEGRAM
https://zimperium.com/blog/the-rooting-of-all-evil-security-holes-that-could-compromise-your-mobile-device
https://cybersecuritynews.com/hackers-could-gain-full-control-rooted-android-devices/
Please open Telegram to view this post
VIEW IN TELEGRAM
Zimperium
The Root(ing) Of All Evil: Security Holes That Could Compromise Your Mobile Device
true
๐ฅ1
Key Features:
๐ค 300+ AI Models: Support for OpenAI, Anthropic, DeepSeek, Ollama, and more
๐ง Built-in Security Tools: Ready-to-use tools for reconnaissance, exploitation, and privilege escalation
๐ Battle-tested: Proven in HackTheBox CTFs, bug bounties, and real-world security case studies
๐ฏ Agent-based Architecture: Modular design with specialized agents for different security tasks
https://github.com/aliasrobotics/cai
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - aliasrobotics/cai: Cybersecurity AI (CAI), the framework for AI Security
Cybersecurity AI (CAI), the framework for AI Security - aliasrobotics/cai
๐ด1
https://github.com/google/security-research/security/advisories/GHSA-mp56-7vrw-qxvf
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
OpenAI Operator - Click on arbitrary origin by TOCTOU attack
## Summary
There is a delay between OpenAI Operatorโs action prediction based on the screenshot and Operatorโs actual action trigger. If timed correctly, an attacker can navigate or switch tabs be...
There is a delay between OpenAI Operatorโs action prediction based on the screenshot and Operatorโs actual action trigger. If timed correctly, an attacker can navigate or switch tabs be...
Syrian troops (former Al-Qaeda) had found Israeli listening and spying devices there. The troops were in the process of dismantling the devices when they were killed (6 of them) by Israeli air strikes, and then Israeli forces came in 4 helicopters and stayed for 2 hours to take the equipment.
Israeli warplanes and drones prevented Syrian forces from entering the area until late on Wednesday night, after Israeli forces had left the site. A Syrian military source told Al Jazeera that dozens of Israeli troops travelled to the site in four helicopters and spent more than two hours there, though it is unclear what exactly they did.
The Israeli defence minister, Israel Katz, posted on ๐ that forces were โoperating in all combat zones day and night for the security of Israelโ, but otherwise offered no explanation.
https://www.theguardian.com/world/2025/aug/28/israeli-forces-former-air-defence-base-southern-syria-damascus
Please open Telegram to view this post
VIEW IN TELEGRAM
๐คจ1๐จ1๐1
cKure Red
Organizations like Meta / Yandex have stopped this intrusive privacy breaching activity.
localmess.github.io
Please open Telegram to view this post
VIEW IN TELEGRAM
https://hackers-arise.com/the-one-man-apt-part-i-a-picture-that-can-execute-code-on-the-target/
Please open Telegram to view this post
VIEW IN TELEGRAM
๐คฎ1
Google ๐ Engineer dropped a book. A comprehensive guide to building agentic AI systems.
Key points:
โ
Patterns: Design methods for multi-agent setups, tool-using agents, and autonomous workflows.
โ
Hands-on: Code samples for implementing these patterns in real-world apps.
โ
Goal: Help developers build reliable, scalable, and safe intelligent agents.
๐ฑ https://docs.google.com/document/d/1rsaK53T3Lg5KoGwvf8ukOUvbELRtH-V0LnOIFDxBryE/mobilebasic
Key points:
Concepts: Prompt chaining, routing, memory, planning, safety, and evaluation.Think of it as a playbook for advanced AI agent design.
Please open Telegram to view this post
VIEW IN TELEGRAM
Google Docs
Agentic Design Patterns
Agentic Design Patterns ๐ ๐ง โ
Iโm excited to share that my new book, "Agentic Design Patterns: A Hands-On Guide to Intelligent AI Agents," is officially out! ๐ ๐ง โ
In a field moving at lightning speed, this book focuses on the durable, fundamental patternsโฆ
๐ฅ5
https://osv.dev/vulnerability/ASB-A-406785684
Please open Telegram to view this post
VIEW IN TELEGRAM
osv.dev
OSV - Open Source Vulnerabilities
Comprehensive vulnerability database for your open source projects and dependencies.
๐ฅ2 1
https://blog.sekoia.io/apt28-operation-phantom-net-voxel/
Please open Telegram to view this post
VIEW IN TELEGRAM
Sekoia.io Blog
APT28 Operation Phantom Net Voxel
APT28 Operation Phantom Net Voxel: weaponized Office lures, COM-hijack DLL, PNG stego to Covenant Grunt via Koofr, BeardShell on icedrive.
๐ฅ2๐1
๐ฆ TOR VPN Beta - Silent release
https://play.google.com/store/apps/details?id=org.torproject.vpn
https://www.techradar.com/vpn/vpn-services/the-tor-project-quietly-launches-a-beta-android-vpn-and-looks-for-testers
https://play.google.com/store/apps/details?id=org.torproject.vpn
https://www.techradar.com/vpn/vpn-services/the-tor-project-quietly-launches-a-beta-android-vpn-and-looks-for-testers
Google Play
Tor VPN Beta - Apps on Google Play
Tor-powered VPN with per-app routing & network-level privacy
๐ฅ1
https://cybersecuritynews.com/openssl-vulnerabilities/
Please open Telegram to view this post
VIEW IN TELEGRAM
Cyber Security News
OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely
The OpenSSL Project has released a critical security advisory, addressing three significant vulnerabilities that could allow attackers to execute remote code and potentially recover private cryptographic keys.
โค3
This combination enabled malicious actors to disseminate exploits via WhatsApp, resulting in potential data exfiltration from the user's Apple device.The attack sequence involved:
All occurring without user engagement.https://techcrunch.com/2025/08/29/whatsapp-fixes-zero-click-bug-used-to-hack-apple-users-with-spyware/
https://blog.quarkslab.com/patch-analysis-of-Apple-iOS-CVE-2025-43300.html
Please open Telegram to view this post
VIEW IN TELEGRAM
TechCrunch
WhatsApp fixes 'zero-click' bug used to hack Apple users with spyware | TechCrunch
A spyware vendor was behind a recent campaign that abused a vulnerability in WhatsApp to deliver an exploit capable of hacking into iPhones and Macs.
โค2๐ฅ2 2โก1
https://cybersecuritynews.com/nothing-phone-code-execution-vulnerability/
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - R0rt1z2/fenrir: Let's control MediaTek's bootchain
Let's control MediaTek's bootchain. Contribute to R0rt1z2/fenrir development by creating an account on GitHub.
๐2๐ฅ1