cKure Red
■■■□□ Microsoft unveils ‘Super Duper Secure Mode’ in latest version of Edge. Browser goes further to protect against bugs by disabling JIT. https://portswigger.net/daily-swig/microsoft-unveils-super-duper-secure-mode-in-latest-version-of-edge
● IMHO; disabling JavaScript on any browser for all sites by default prevents 99% of the known attack vectors. For site like Facebook and other social media, white-listing can be done.
Latest Edge is significantly secure as it prevents most trackers from running by default unlike chrome.
Latest Edge is significantly secure as it prevents most trackers from running by default unlike chrome.
Data Exfiltration via CSS + SVG Font by Masato Kinugawa.
https://youtu.be/iUzNA2St3Bc
Thread:
https://youtu.be/iUzNA2St3Bc
Thread:
https://twitter.com/kinugawamasato/status/1464884299195322371YouTube
Data Exfiltration via CSS + SVG Font (Safari only)
See:
https://mksben.l0.cm/2021/11/css-exfiltration-svg-font.html (English)
https://masatokinugawa.l0.cm/2021/11/css-exfiltration-svg-font.html (日本語)
You can try the PoC here: https://l0.cm/svg_font/poc.php
https://mksben.l0.cm/2021/11/css-exfiltration-svg-font.html (English)
https://masatokinugawa.l0.cm/2021/11/css-exfiltration-svg-font.html (日本語)
You can try the PoC here: https://l0.cm/svg_font/poc.php
Jumping the air gap: 15 years of nation-state effort.
ESET researchers studied all the malicious frameworks ever reported publicly that have been used to attack air-gapped networks and are releasing a side-by-side comparison of their most important TTPs.
https://www.eset.com/us/about/newsroom/press-releases/eset-research-analyzes-malicious-frameworks-targeting-air-gapped-networks-dissects-15-years-of-nati-1/
https://www.welivesecurity.com/2021/12/01/jumping-air-gap-15-years-nation-state-effort/
ESET researchers studied all the malicious frameworks ever reported publicly that have been used to attack air-gapped networks and are releasing a side-by-side comparison of their most important TTPs.
https://www.eset.com/us/about/newsroom/press-releases/eset-research-analyzes-malicious-frameworks-targeting-air-gapped-networks-dissects-15-years-of-nati-1/
https://www.welivesecurity.com/2021/12/01/jumping-air-gap-15-years-nation-state-effort/
🔧 s3n (Search-Scan-Save-Notify)
A tool to scrape online web-content (APIs, RSS Feeds, or Websites) and notify if search term was hit. It is based on PHP.
https://github.com/AamerShah/s3n
Credits: twitter.com/Aamer_Sha
A tool to scrape online web-content (APIs, RSS Feeds, or Websites) and notify if search term was hit. It is based on PHP.
https://github.com/AamerShah/s3n
Credits: twitter.com/Aamer_Sha
GitHub
GitHub - AamerShah/s3n: Search-Scan-Save-Notify
Search-Scan-Save-Notify. Contribute to AamerShah/s3n development by creating an account on GitHub.
Interesting thread on RCE in Ghidra via log4j (CVE-2021-44228)
https://twitter.com/zhuowei/status/1469511822411767811
https://twitter.com/zhuowei/status/1469511822411767811
Twitter
Zhuowei Zhang
I just popped a calc in Ghidra 10.0.2 with a malicious executable: Update to Ghidra 10.1 now! (8450bfbdd21fa01ffdcc35e23be3382e15601b6e1c0b5329ee8f615123ab338d)
Zero-Day: A deep dive into the Israeli 🇮🇱 state sponsored cyber-crime spyware via zero-click iMessage exploit: Remote Code Execution.
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
projectzero.google
A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution
Posted by Ian Beer & Samuel Groß of Google Project Zero We want to thank Citizen Lab ...
Chrome: Site Isolation bypass via NavigationPreloadRequest.
https://bugs.chromium.org/p/project-zero/issues/detail?id=2239
https://bugs.chromium.org/p/project-zero/issues/detail?id=2239
Pegasus vs. Predator as Dissident’s Doubly-Infected iPhone Reveals Cytrox Mercenary Spyware from a startup in Macedonia 🇲🇰 an apparent competition with the state sponsored crimeware (lets call it so) of Israel 🇮🇱
A citizen-lab report.
https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/
A citizen-lab report.
https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/
The Citizen Lab
Pegasus vs. Predator
Two Egyptians—exiled politician Ayman Nour and the host of a popular news program (who wishes to remain anonymous)—were hacked with Predator spyware, built and sold by the previously little-known mercenary spyware developer Cytrox. The phone of Ayman Nour…
cKure Red
Trend Micro's Web Based scanner for CVE-2021-44228 aka Log4Shell. log4j-tester.trendmicro.com
YouTube
Log4j Vulnerability (Log4Shell) Explained // CVE-2021-44228
Let's try to make sense of the Log4j vulnerability called Log4Shell. First we look at the Log4j features and JNDI, and then we explore the history of the recent log4shell vulnerability. This is part 1 of a two part series into log4j.
Log4j Issues:
2013:…
Log4j Issues:
2013:…
🔧 Tool: Mariana Trench; a security focused static analysis platform targeting Android.
https://github.com/facebook/mariana-trench
https://github.com/facebook/mariana-trench
GitHub
GitHub - facebook/mariana-trench: A security focused static analysis tool for Android and Java applications.
A security focused static analysis tool for Android and Java applications. - facebook/mariana-trench
Data-Leak: State sponsored Cyber-Crime syndicate from India 🇮🇳 using Tek Fog: An App With BJP (the ruling party); Footprints for Cyber Troops to Automate Hate, Manipulate Trends.
https://thewire.in/tekfog/en/1.html
https://thewire.in/tekfog/en/1.html
An interesting thread on SquirrelWaffle, Qakbot and Emotet using the same C2 servers linked to hundreds of websites from India 🇮🇳
https://twitter.com/1ZRR4H/status/1485413045975330822
https://twitter.com/1ZRR4H/status/1485413045975330822
Twitter
Germán Fernández 🇨🇱
Confirmo, los operadores de #Emotet ocupan el mismo proveedor de Webshells que ocupa TR distribution con #Qakbot o #Squirrelwaffle. Llegué a un listado de 138 sitios comprometidos, 36 ya fueron reportados (Emotet), 102 están próximos a utilizar 👀 IOC's: …
Zero-Day: A vulnerability in Polkit's pkexec component identified as CVE-2021-4034 (PwnKit) is present in the default configuration of all major Linux distributions and can be exploited to gain full root privileges on the system, researchers warn today.
https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034
https://www.bleepingcomputer.com/news/security/linux-system-service-bug-gives-root-on-all-major-distros-exploit-released/
https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034
https://www.bleepingcomputer.com/news/security/linux-system-service-bug-gives-root-on-all-major-distros-exploit-released/
Qualys
CVE-2021-4034: How PwnKit Exploits Polkit’s pkexec | Qualys
CVE-2021-4034, a PwnKit vulnerability, lets unprivileged users gain root access via pkexec. Explore its impact and how to mitigate the risk.