cKure Red – Telegram
cKure Red
2.33K subscribers
69 photos
31 videos
21 files
444 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
From Orange 🍊 Tsai to Richard Johnson; researchers / authors have received the hard copy of Phrack and coins.
1👍1🔥1
🎃HOW APT37 EMPLOYED ROKRAT SHELLCODE AND STEGANOGRAPHIC TECHNIQUE

ℹ️ Researchers have identified a new variant of RoKRAT, the malware associated with North Korea’s APT37 group. This version employs two-stage encrypted shellcode execution and steganography to conceal malicious code inside image files, enabling evasion from traditional detection methods.

📍 INFECTION VECTOR
■ The intrusion begins with a ZIP archive containing a large .lnk shortcut file, often masquerading as legitimate documents.
■ Once opened, PowerShell commands embedded within the shortcut unpack multiple hidden components, such as shellcode, batch files, noscripts, and decoy documents, and launch the infection chain.

📍TWO-STAGE SHELLCODE DECODING
■ The initial embedded shellcode is decoded using a single-byte XOR, then injected into a trusted Windows process like mspaint.exe or notepad[.]exe.
■ A second stage of XOR-based decoding (e.g. key 0xD6) reveals the full RoKRAT payload, which is executed entirely in memory without writing to disk.

📍 STEGANOGRAPHIC PAYLOAD DELIVERY
■ The standout feature of this variant is the use of steganography: a JPEG image (e.g. "Father.jpg") is downloaded from cloud services (Dropbox, Yandex, pCloud) and contains encrypted shellcode starting at a non-standard offset.
■ A dual XOR decoding process transforms this hidden data into an executable loader, which initiates RoKRAT in-memory execution without leaving disk artifacts

📍 C2 COMMUNICATION & TARGETS
■ RoKRAT communicates with C2 infrastructure via legitimate cloud APIs using expired or stolen tokens tied to Dropbox, pCloud, and Yandex.
■ The malware collects system info, documents, screenshots, and exfiltrates data in encrypted form, disguised within normal traffic to bypass inspection.


https://www.genians.co.kr/en/blog/threat_intelligence/rokrat_shellcode_steganographic
Please open Telegram to view this post
VIEW IN TELEGRAM
⚙️ Cybersecurity AI (CAI) is a lightweight, open-source framework that empowers security professionals to build and deploy AI-powered offensive and defensive automation. CAI is the de facto framework for AI Security, already used by thousands of individual users and hundreds of organizations. Whether you're a security researcher, ethical hacker, IT professional, or organization looking to enhance your security posture, CAI provides the building blocks to create specialized AI agents that can assist with mitigation, vulnerability discovery, exploitation, and security assessment.

Key Features:

🤖 300+ AI Models: Support for OpenAI, Anthropic, DeepSeek, Ollama, and more
🔧 Built-in Security Tools: Ready-to-use tools for reconnaissance, exploitation, and privilege escalation
🏆 Battle-tested: Proven in HackTheBox CTFs, bug bounties, and real-world security case studies
🎯 Agent-based Architecture: Modular design with specialized agents for different security tasks


https://github.com/aliasrobotics/cai
Please open Telegram to view this post
VIEW IN TELEGRAM
😴1
😕🫣😮🥳🙋🥳Israeli equipment for hacking, signal intelligence found near Al-Kiswah (10km from Damascus).

Syrian troops (former Al-Qaeda) had found Israeli listening and spying devices there. The troops were in the process of dismantling the devices when they were killed (6 of them) by Israeli air strikes, and then Israeli forces came in 4 helicopters and stayed for 2 hours to take the equipment.

Israeli warplanes and drones prevented Syrian forces from entering the area until late on Wednesday night, after Israeli forces had left the site. A Syrian military source told Al Jazeera that dozens of Israeli troops travelled to the site in four helicopters and spent more than two hours there, though it is unclear what exactly they did.

The Israeli defence minister, Israel Katz, posted on 𝕏 that forces were “operating in all combat zones day and night for the security of Israel”, but otherwise offered no explanation.


https://www.theguardian.com/world/2025/aug/28/israeli-forces-former-air-defence-base-southern-syria-damascus
Please open Telegram to view this post
VIEW IN TELEGRAM
🤨1😨1💊1
cKure Red
🟥 Facebook app and other Meta apps are malware that bypass security audits to leak user data to meta servers. The covert method Meta uses to track mobile browsing without consent — even in incognito mode or with a VPN on all androis devices. Patch immediately:…
🙋😴😴😊Disclosure: Covert Web-to-App Tracking via Localhost on Android.

Organizations like Meta / Yandex have stopped this intrusive privacy breaching activity.


localmess.github.io
Please open Telegram to view this post
VIEW IN TELEGRAM
🖼The One-Man APT, Part I: A Picture That Can Execute Code on the Target.

https://hackers-arise.com/the-one-man-apt-part-i-a-picture-that-can-execute-code-on-the-target/
Please open Telegram to view this post
VIEW IN TELEGRAM
🤮1
cKure Red pinned «🖼The One-Man APT, Part I: A Picture That Can Execute Code on the Target. https://hackers-arise.com/the-one-man-apt-part-i-a-picture-that-can-execute-code-on-the-target/»
Google 🔍 Engineer dropped a book. A comprehensive guide to building agentic AI systems.

Key points:


Concepts: Prompt chaining, routing, memory, planning, safety, and evaluation.

Patterns: Design methods for multi-agent setups, tool-using agents, and autonomous workflows.

Hands-on: Code samples for implementing these patterns in real-world apps.

Goal: Help developers build reliable, scalable, and safe intelligent agents.

Think of it as a playbook for advanced AI agent design.


📱https://docs.google.com/document/d/1rsaK53T3Lg5KoGwvf8ukOUvbELRtH-V0LnOIFDxBryE/mobilebasic
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5