cKure Red – Telegram
cKure Red
2.33K subscribers
69 photos
31 videos
21 files
444 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
🔥Fabian Bräunlein and Luca Melette, security researchers, have recently unveiled their research on European streetlights and power plants, which utilize the radio ripple control system developed by EFR.

Their findings indicate that EFR systems employ an 💣 unencrypted RF 🚨 protocol to transmit control commands via longwave radio to a multitude of devices, including relays in solar/wind plants, heat pumps, and streetlights.

🔥Upon being notified of these research findings, the company responded by threatening the researchers with legal action; however, 🐉the research has since been published.

📹https://youtu.be/DAf-T3bFJFs
📰https://positive.security/blog/blinkencity-38c3
📰https://fahrplan.events.ccc.de/congress/2024/fahrplan/media/38c3/submissions/HSNZGR/resources/20241228-BlinkenCity-38c3_53qew19.pdf
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3
🖥🌐📱 Browser-Reviewer: Browser Reviewer is a portable forensic tool for analyzing user activity in Firefox and Chrome-based browsers for Windows platforms. It extracts and displays browsing history, downloads, bookmarks, and autofill data. The tool allows analysts to tag, comment, and export reports in PDF.

It requires no installation and can be executed directly from a USB drive or over a network share — ideal for forensic workflows with minimal footprint on the target system.

https://github.com/gustavoparedes/Browser-Reviewer
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2
👾 Math.random() is predictable.

CVE-2025-7783: Critical Vulnerability in JavaScript Library Exposes Millions of Apps to Code Execution Attacks.


https://cybersecuritynews.com/javanoscript-library-vulnerability/

https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4😁1🤯1🙊1
🧠 Diabolic Parasite is an ESP32-S3-based USB dongle for PT and security research. It supports keystroke injection, keylogging, wireless access, self-destruct and detection-evasion.

https://www.cnx-software.com/2025/07/23/diabolic-parasite-esp32-s3-usb-dongle-for-penetration-testing-and-security-research/
Please open Telegram to view this post
VIEW IN TELEGRAM
1🔥1👀1
🔴💲 HuiOne Guarantee (Part of Huione International Pay), an illicit Telegram-based marketplace, has surpassed Hydra with $24B in crypto inflows.

⤷ $150K funneled from North Korea’s Lazarus hacking group 💻
⤷ Facilitating romance scams, human trafficking, and money laundering
⤷ Monthly inflows up 51% since July 2024 📈


https://youtu.be/3f8ohjxHVmw

https://thehackernews.com/2025/01/illicit-huione-telegram-market.html
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
● Yet another website: meawfy.com [Mega.nz search]
🔥1
Please open Telegram to view this post
VIEW IN TELEGRAM
🔤🔤🔤🔤🔤🔤 🔤7️⃣2️⃣

72nd Edition of Phrack has been released in limited capacity. Full release in a few days

https://phrack.org/
Please open Telegram to view this post
VIEW IN TELEGRAM
2🔥2👍1
From Orange 🍊 Tsai to Richard Johnson; researchers / authors have received the hard copy of Phrack and coins.
1👍1🔥1
🎃HOW APT37 EMPLOYED ROKRAT SHELLCODE AND STEGANOGRAPHIC TECHNIQUE

ℹ️ Researchers have identified a new variant of RoKRAT, the malware associated with North Korea’s APT37 group. This version employs two-stage encrypted shellcode execution and steganography to conceal malicious code inside image files, enabling evasion from traditional detection methods.

📍 INFECTION VECTOR
■ The intrusion begins with a ZIP archive containing a large .lnk shortcut file, often masquerading as legitimate documents.
■ Once opened, PowerShell commands embedded within the shortcut unpack multiple hidden components, such as shellcode, batch files, noscripts, and decoy documents, and launch the infection chain.

📍TWO-STAGE SHELLCODE DECODING
■ The initial embedded shellcode is decoded using a single-byte XOR, then injected into a trusted Windows process like mspaint.exe or notepad[.]exe.
■ A second stage of XOR-based decoding (e.g. key 0xD6) reveals the full RoKRAT payload, which is executed entirely in memory without writing to disk.

📍 STEGANOGRAPHIC PAYLOAD DELIVERY
■ The standout feature of this variant is the use of steganography: a JPEG image (e.g. "Father.jpg") is downloaded from cloud services (Dropbox, Yandex, pCloud) and contains encrypted shellcode starting at a non-standard offset.
■ A dual XOR decoding process transforms this hidden data into an executable loader, which initiates RoKRAT in-memory execution without leaving disk artifacts

📍 C2 COMMUNICATION & TARGETS
■ RoKRAT communicates with C2 infrastructure via legitimate cloud APIs using expired or stolen tokens tied to Dropbox, pCloud, and Yandex.
■ The malware collects system info, documents, screenshots, and exfiltrates data in encrypted form, disguised within normal traffic to bypass inspection.


https://www.genians.co.kr/en/blog/threat_intelligence/rokrat_shellcode_steganographic
Please open Telegram to view this post
VIEW IN TELEGRAM