Highly Targeted Attacks Hit North Korean Defectors
http://feedproxy.google.com/~r/Securityweek/~3/oOttyf-3Q4k/highly-targeted-attacks-hit-north-korean-defectors
A recent set of attacks aimed at North Korean defectors and journalists were associated with a highly targeted campaign conducted by an actor that does not appear to be related to any known cybercrime groups, McAfee says.
read more (http://www.securityweek.com/highly-targeted-attacks-hit-north-korean-defectors)
http://feedproxy.google.com/~r/Securityweek/~3/oOttyf-3Q4k/highly-targeted-attacks-hit-north-korean-defectors
A recent set of attacks aimed at North Korean defectors and journalists were associated with a highly targeted campaign conducted by an actor that does not appear to be related to any known cybercrime groups, McAfee says.
read more (http://www.securityweek.com/highly-targeted-attacks-hit-north-korean-defectors)
Securityweek
Highly Targeted Attacks Hit North Korean Defectors | SecurityWeek.Com
A recent set of attacks aimed at North Korean defectors and journalists were associated with a highly targeted campaign conducted by unknown threat actor.
Mac Malware Creator Indicted in U.S.
http://feedproxy.google.com/~r/Securityweek/~3/RWtsCJGpEiQ/mac-malware-creator-indicted-us
“FruitFly” Mac Malware Creator Allegedly Spied On Victims for 13 Years
read more (http://www.securityweek.com/mac-malware-creator-indicted-us)
http://feedproxy.google.com/~r/Securityweek/~3/RWtsCJGpEiQ/mac-malware-creator-indicted-us
“FruitFly” Mac Malware Creator Allegedly Spied On Victims for 13 Years
read more (http://www.securityweek.com/mac-malware-creator-indicted-us)
Securityweek
Mac Malware Creator Indicted in U.S. | SecurityWeek.Com
Phillip R. Durachinsky has been charged with using the FruitFly malware for more than 13 years to watch, listen to, and obtain personal data from unknowing victims, as well as to produce child pornography.
Highly Targeted Attacks Hit North Korean Defectors
http://feedproxy.google.com/~r/Securityweek/~3/oOttyf-3Q4k/highly-targeted-attacks-hit-north-korean-defectors
A recent set of attacks aimed at North Korean defectors and journalists were associated with a highly targeted campaign conducted by an actor that does not appear to be related to any known cybercrime groups, McAfee says.
read more (http://www.securityweek.com/highly-targeted-attacks-hit-north-korean-defectors)
http://feedproxy.google.com/~r/Securityweek/~3/oOttyf-3Q4k/highly-targeted-attacks-hit-north-korean-defectors
A recent set of attacks aimed at North Korean defectors and journalists were associated with a highly targeted campaign conducted by an actor that does not appear to be related to any known cybercrime groups, McAfee says.
read more (http://www.securityweek.com/highly-targeted-attacks-hit-north-korean-defectors)
Securityweek
Highly Targeted Attacks Hit North Korean Defectors | SecurityWeek.Com
A recent set of attacks aimed at North Korean defectors and journalists were associated with a highly targeted campaign conducted by unknown threat actor.
AMD Will Release CPU Microcode Updates for Spectre Flaw This Week
https://www.bleepingcomputer.com/news/hardware/amd-will-release-cpu-microcode-updates-for-spectre-flaw-this-week/
AMD officially admitted today that its processors are not vulnerable to the Meltdown bug, but are affected by both variants of the Spectre flaw. [...]
https://www.bleepingcomputer.com/news/hardware/amd-will-release-cpu-microcode-updates-for-spectre-flaw-this-week/
AMD officially admitted today that its processors are not vulnerable to the Meltdown bug, but are affected by both variants of the Spectre flaw. [...]
BleepingComputer
AMD Will Release CPU Microcode Updates for Spectre Flaw This Week
AMD officially admitted today that its processors are not vulnerable to the Meltdown bug, but are affected by both variants of the Spectre flaw.
How to Attract More Women Into Cybersecurity - Now
https://www.darkreading.com/careers-and-people/how-to-attract-more-women-into-cybersecurity---now/d/d-id/1330816?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
A recent survey finds a number of attributes women seek in their careers can be found in a cybersecurity profession - the dots just need to be connected.
https://www.darkreading.com/careers-and-people/how-to-attract-more-women-into-cybersecurity---now/d/d-id/1330816?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
A recent survey finds a number of attributes women seek in their careers can be found in a cybersecurity profession - the dots just need to be connected.
Dark Reading
How to Attract More Women Into Cybersecurity - Now
A recent survey finds a number of attributes women seek in their careers can be found in a cybersecurity profession - the dots just need to be connected.
NEW PYTHON-BASED CRYPTO-MINER BOTNET FLYING UNDER THE RADAR
https://f5.com/labs/articles/threat-intelligence/malware/new-python-based-crypto-miner-botnet-flying-under-the-radar?sf178360556=1
https://f5.com/labs/articles/threat-intelligence/malware/new-python-based-crypto-miner-botnet-flying-under-the-radar?sf178360556=1
F5 Labs
New Python-Based Crypto-Miner Botnet Flying Under the Radar
A new Python-based botnet that mines Monero spreads via SSH and leverages Pastebin to publish new C&C server addresses.
Slui File Handler Hijack UAC bypass (fileless), works from Windows 8 up to Windows 10 RS4 17074
https://github.com/bytecode-77/slui-file-handler-hijack-privilege-escalation
https://github.com/bytecode-77/slui-file-handler-hijack-privilege-escalation
GitHub
GitHub - bytecode77/slui-file-handler-hijack-privilege-escalation: Slui File Handler Hijack UAC Bypass Local Privilege Escalation
Slui File Handler Hijack UAC Bypass Local Privilege Escalation - GitHub - bytecode77/slui-file-handler-hijack-privilege-escalation: Slui File Handler Hijack UAC Bypass Local Privilege Escalation
Linux and Windows Servers Targeted with RubyMiner Malware
https://www.bleepingcomputer.com/news/security/linux-and-windows-servers-targeted-with-rubyminer-malware/
Security researchers have spotted a new strain of malware being deployed online. Named RubyMiner, this malware is a cryptocurrency miner spotted going after outdated web servers. [...]
https://www.bleepingcomputer.com/news/security/linux-and-windows-servers-targeted-with-rubyminer-malware/
Security researchers have spotted a new strain of malware being deployed online. Named RubyMiner, this malware is a cryptocurrency miner spotted going after outdated web servers. [...]
BleepingComputer
Linux and Windows Servers Targeted with RubyMiner Malware
Security researchers have spotted a new strain of malware being deployed online. Named RubyMiner, this malware is a cryptocurrency miner spotted going after outdated web servers.
Canadian Police Charge Operator of Hacked Password Service Leakedsource.com
https://krebsonsecurity.com/2018/01/canadian-police-charge-operator-of-hacked-password-service-leakedsource-com/
Canadian authorities have arrested and charged a 27-year-old Ontario man for allegedly selling billions of stolen passwords online through the now-defunct service Leakedsource.com.
https://krebsonsecurity.com/2018/01/canadian-police-charge-operator-of-hacked-password-service-leakedsource-com/
Canadian authorities have arrested and charged a 27-year-old Ontario man for allegedly selling billions of stolen passwords online through the now-defunct service Leakedsource.com.
OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert noscripts to an obfuscated noscript.
Shellcodes are small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malware, bypassing antivirus software, obfuscating code for protection and so on.
This software can be run on Windows/Linux/OSX under Python.
Why use OWASP ZSC Obfuscated Code Generator Tool
Another good reason for obfuscating files or generating shellcode with ZSC is that it can be used for pen-testing assignments.
Read the rest of OWASP ZSC – Obfuscated Code Generator Tool now! Only available at Darknet. (https://www.darknet.org.uk/2018/01/owasp-zsc-obfuscated-code-generator-tool/)
Shellcodes are small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malware, bypassing antivirus software, obfuscating code for protection and so on.
This software can be run on Windows/Linux/OSX under Python.
Why use OWASP ZSC Obfuscated Code Generator Tool
Another good reason for obfuscating files or generating shellcode with ZSC is that it can be used for pen-testing assignments.
Read the rest of OWASP ZSC – Obfuscated Code Generator Tool now! Only available at Darknet. (https://www.darknet.org.uk/2018/01/owasp-zsc-obfuscated-code-generator-tool/)
Darknet - Hacking Tools, Hacker News & Cyber Security
OWASP ZSC - Obfuscated Code Generator Tool - Darknet - Hacking Tools, Hacker News & Cyber Security
OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert noscripts to an obfuscated noscript.
Linux kernel ioctls race condition -> use after free
Upstream : https://github.com/torvalds/linux/commit/b3defb791b26ea0683a93a4f49c77ec45ec96f10
call stack:
Upstream : https://github.com/torvalds/linux/commit/b3defb791b26ea0683a93a4f49c77ec45ec96f10
call stack:
thread a:
-> snd_seq_write
-> snd_seq_client_enqueue_event
-> snd_seq_event_dup
-> snd_seq_cell_alloc
-> schedule -> thread b
thread b:
-> snd_seq_ioctl_set_client_pool
-> snd_seq_pool_mark_closing (set closeing to 1)
-> snd_seq_queue_client_leave_cells (release cell)
-> wake_up -> thread a
thread a:
-> snd_seq_ioctl_set_client_pool
-> snd_seq_pool_mark_closing (set closeing to 1 again)
-> snd_seq_queue_client_leave_cells (already release cell by thread b)
-> snd_seq_pool_done (release pool and allocate new pool, 2cd pool;
set closeing to 0)
-> snd_seq_write
-> snd_seq_client_enqueue_event
-> snd_seq_event_dup
-> snd_seq_cell_alloc
-> schedule -> thread b
thread b:
back to snd_seq_queue_client_leave_cells, after func wake_up
-> snd_seq_queue_client_leave_cells
-> snd_seq_pool_done (release pool and allocate new pool, 3rd pool;
set closeing to 0)
(leave 2cd pool's cell unhandled)
-> wake_up -> thread a:
thread a:
-> snd_seq_cell_alloc:
while (pool->free == NULL && ! nonblock && ! pool->closing)
meet dead loop, now pool in thread a is the 2cd pool, has been released,
now is a wild pointer.
GitHub
ALSA: seq: Make ioctls race-free · torvalds/linux@b3defb7
The ALSA sequencer ioctls have no protection against racy calls while
the concurrent operations may lead to interfere with each other. As
reported recently, for example, the concurrent calls of se...
the concurrent operations may lead to interfere with each other. As
reported recently, for example, the concurrent calls of se...