/
On 2024-06-23, 00:19 AM UTC, a phishing email was sent out to 35,794 emails..:
https://blog.ethereum.org/2024/07/02/blog-incident
blog.ethereum.org mailing list incidentOn 2024-06-23, 00:19 AM UTC, a phishing email was sent out to 35,794 emails..:
https://blog.ethereum.org/2024/07/02/blog-incident
Ethereum Foundation Blog
blog.ethereum.org mailing list incident | Ethereum Foundation Blog
/ Windows Hyper-V Elevation of Privilege Vulnerability
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080
/ Leaked access token with administrator access to Python’s GitHub repos
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub..:
https://jfrog.com/blog/leaked-pypi-secret-token-revealed-in-binary-preventing-suppy-chain-attack/
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub..:
https://jfrog.com/blog/leaked-pypi-secret-token-revealed-in-binary-preventing-suppy-chain-attack/
JFrog
Binary secret scanning helped us prevent (what might have been) the worst supply chain attack you can imagine
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker…
/ Patch or Peril: A Veeam vulnerability incident
...this detailed analysis highlights how quickly the threat actors practiced the exploitation of the recently disclosed CVE-2023-27532 vulnerability (March 2023) to target unpatched Veeam Backup & Replication Software. The blog provides an overview of the attacker’s tactics, techniques, and procedures (TTPs)..:
https://www.group-ib.com/blog/estate-ransomware/
...this detailed analysis highlights how quickly the threat actors practiced the exploitation of the recently disclosed CVE-2023-27532 vulnerability (March 2023) to target unpatched Veeam Backup & Replication Software. The blog provides an overview of the attacker’s tactics, techniques, and procedures (TTPs)..:
https://www.group-ib.com/blog/estate-ransomware/
Group-IB
Patch or Peril: A Veeam vulnerability incident
Delaying security updates and neglecting regular reviews created vulnerabilities that were exploited by attackers, resulting in severe ransomware consequences.
/ Apple warns iPhone users in 98 countries of spyware attacks
https://techcrunch.com/2024/07/10/apple-alerts-iphone-users-in-98-countries-to-mercenary-spyware-attacks/
https://techcrunch.com/2024/07/10/apple-alerts-iphone-users-in-98-countries-to-mercenary-spyware-attacks/
TechCrunch
Apple warns iPhone users in 98 countries of spyware attacks | TechCrunch
Apple has issued a new round of threat notifications to iPhone users across 98 countries, warning them of potential mercenary spyware attacks. It's the Apple issued threat notifications to iPhone users across 98 countries, warning them of spyware attacks.
/ “Nearly all” AT&T customers had phone records stolen in new data breach disclosure
Operatotors record all messsages and calls? It's unpleasant when it all flows out..
https://www.malwarebytes.com/blog/news/2024/07/nearly-all-att-customers-had-phone-records-stolen-in-new-data-breach-disclosure
Operatotors record all messsages and calls? It's unpleasant when it all flows out..
https://www.malwarebytes.com/blog/news/2024/07/nearly-all-att-customers-had-phone-records-stolen-in-new-data-breach-disclosure
Malwarebytes
“Nearly all” AT&T customers had phone records stolen in new data breach disclosure
AT&T has told customers about yet another data breach. This time call and text records of nearly all customers were stolen.
/ Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks
https://www.trendmicro.com/en_id/research/24/g/CVE-2024-38112-void-banshee.html
https://www.trendmicro.com/en_id/research/24/g/CVE-2024-38112-void-banshee.html
Trend Micro
CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
/ SEG vs. SEG: How Threat Actors are Pitting Email Security Products Against Each Other With Encoded URLs
https://cofense.com/blog/seg-vs-seg-how-threat-actors-are-pitting-email-security-products-against-each-other/
https://cofense.com/blog/seg-vs-seg-how-threat-actors-are-pitting-email-security-products-against-each-other/
Cofense
SEG vs. SEG: How Threat Actors are Pitting Email Security
Discover how threat actors are increasingly exploiting SEG-encoded URLs to bypass email security measures. Learn how these tactics lead to malicious emails evading proper scanning, putting recipients
/ New Recovery Tool to help with CrowdStrike issue impacting Windows endpoints
https://techcommunity.microsoft.com/t5/intune-customer-success/new-recovery-tool-to-help-with-crowdstrike-issue-impacting/ba-p/4196959
https://techcommunity.microsoft.com/t5/intune-customer-success/new-recovery-tool-to-help-with-crowdstrike-issue-impacting/ba-p/4196959
TECHCOMMUNITY.MICROSOFT.COM
New Recovery Tool to help with CrowdStrike issue impacting Windows endpoints | Microsoft Community Hub
Steps for how to access and use the new recovery tool Microsoft created - updated on July 31, July 23, July 22, and July 21. The tool provides two recovery...
/ EvilVideo: Telegram app for Android targeted by zero-day exploit sending malicious videos
https://www.eset.com/uk/about/newsroom/press-releases/set-research-discovers-evilvideo-telegram-app-for-android-targeted-by-zero-day-exploit-sending-malicious-videos/
https://www.eset.com/uk/about/newsroom/press-releases/set-research-discovers-evilvideo-telegram-app-for-android-targeted-by-zero-day-exploit-sending-malicious-videos/
Forwarded from Yevgeniy Goncharov
🦄 Йоу! Хорош спать. Поднимай взор на темы докладов Open SysConf'24
Во первых. Теперь каждый может внести лепту в создание сайта, исправлении ошибок на нем и так далее.
Во вторых. Мы имеем место и дату - 12 Октяря, 2024 года.
В третьихх. Мы имеем четрые крутых заявленых доклада:
1. Три системы, которые ты захочешь развернуть и настроить
2. Внедрение вредоносного кода в андроид приложения.
3. Open(Secure)Source
4. Синтез молекулярных единиц в микросервисах
Иди на сайт и регистрируйся, пока есть места.
Дев. сайт: https://sysconf-io.pages.dev/2024
Во первых. Теперь каждый может внести лепту в создание сайта, исправлении ошибок на нем и так далее.
Во вторых. Мы имеем место и дату - 12 Октяря, 2024 года.
В третьихх. Мы имеем четрые крутых заявленых доклада:
1. Три системы, которые ты захочешь развернуть и настроить
2. Внедрение вредоносного кода в андроид приложения.
3. Open(Secure)Source
4. Синтез молекулярных единиц в микросервисах
Иди на сайт и регистрируйся, пока есть места.
Дев. сайт: https://sysconf-io.pages.dev/2024
/ Anyone can Access Deleted and Private Repository Data on GitHub
You can access data from deleted forks, deleted repositories and even private repositories on GitHub. And it is available forever. This is known by GitHub, and intentionally designed that way.
This is such an enormous attack vector for all organizations that use GitHub that we’re introducing a new term: Cross Fork Object Reference (CFOR)...:
https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github
You can access data from deleted forks, deleted repositories and even private repositories on GitHub. And it is available forever. This is known by GitHub, and intentionally designed that way.
This is such an enormous attack vector for all organizations that use GitHub that we’re introducing a new term: Cross Fork Object Reference (CFOR)...:
https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github
Specula - Turning Outlook Into a C2 With One Registry Change
https://trustedsec.com/blog/specula-turning-outlook-into-a-c2-with-one-registry-change
Microsoft Outlook Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2017-11774
https://trustedsec.com/blog/specula-turning-outlook-into-a-c2-with-one-registry-change
Microsoft Outlook Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2017-11774
TrustedSec
Specula - Turning Outlook Into a C2 With One Registry Change
Наступает пора конференций, KazHackStan уже в Сентябре
KHS - самая масштабная конфа в РК. Несколько дней общения, кибер-эстафет, докладов и полезных знакомств.
Помимо всего прочего, KHS прекрасная площадка для того, что бы представить свои ресерчи, изыскания, наработки в виде доклада, как минимум)
В общем, не знаю как ты, а я уже подал заявку на доклад прямо вот здесь - https://kazhackstan.com/ru#speakers
Уверен, моя тема будет интересна не только организаторам, но и тебе уважаемый <username>.
Запасаееммся хорошим настроем. Ждем-с решения😎
KHS - самая масштабная конфа в РК. Несколько дней общения, кибер-эстафет, докладов и полезных знакомств.
Помимо всего прочего, KHS прекрасная площадка для того, что бы представить свои ресерчи, изыскания, наработки в виде доклада, как минимум)
В общем, не знаю как ты, а я уже подал заявку на доклад прямо вот здесь - https://kazhackstan.com/ru#speakers
Уверен, моя тема будет интересна не только организаторам, но и тебе уважаемый <username>.
Запасаееммся хорошим настроем. Ждем-с решения
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
How did Facebook intercept their competitor's encrypted mobile app traffic?
A technical investigation into information uncovered in a class action lawsuit that Facebook had intercepted encrypted traffic from user's devices running the Onavo Protect app in order to gain competitive insights...:
https://doubleagent.net/onavo-facebook-ssl-mitm-technical-analysis/
P.S. Thx for the link, dear subscriber ✌️
A technical investigation into information uncovered in a class action lawsuit that Facebook had intercepted encrypted traffic from user's devices running the Onavo Protect app in order to gain competitive insights...:
https://doubleagent.net/onavo-facebook-ssl-mitm-technical-analysis/
P.S. Thx for the link, dear subscriber ✌️
haxrob
How did Facebook intercept their competitor's encrypted mobile app traffic?
A technical investigation into information uncovered in a class action lawsuit that Facebook had intercepted encrypted traffic from user's devices running the Onavo Protect app in order to gain competitive insights.
/ OneDrive Pastejacking: The crafty phishing and downloader campaign
https://www.trellix.com/blogs/research/onedrive-pastejacking/
https://www.trellix.com/blogs/research/onedrive-pastejacking/
Trellix
OneDrive Pastejacking
Phishing campaign exploits Microsoft OneDrive users with sophisticated social engineering, manipulating them into executing a malicious PowerShell noscript.
/ 'Error' in Microsoft's DDoS defenses amplified 8-hour Azure outage
https://www.theregister.com/AMP/2024/07/31/microsoft_ddos_azure/
https://www.theregister.com/AMP/2024/07/31/microsoft_ddos_azure/
The Register
'Error' in Microsoft's DDoS defenses amplified 8-hour Azure outage
A playbook full of strategies and someone fumbles the implementation
Forwarded from Yevgeniy Goncharov
Делаешь, не сомневайся Open SysConf близится
Время идет и мы движемся и меняемся вместе с ним. Технологии не стоят на месте, кто-то пользуется тем, что есть, кто-то создает свои технологии, главное во всем этом - не стоять на месте.
Готов порадовать и порадоваться двумя новыми заявками на доклады. Детали чуть позже, но предварительно сообщаю, что и докладчики и их доклады несут экстра-экспертный опыт из областей знаний:
- InfoSec Engineering
- Malware Researching
Получаемый опыт ценен, не только, как сам опыт, но и как платформа для новых рассуждений и исследований.
Хочешь прийти и послушать - Welcome
Хочешь выступить - Welcome в двойне
Цени настоящее, делись опытом и будет тебе счастье) Peace ✌️
Время идет и мы движемся и меняемся вместе с ним. Технологии не стоят на месте, кто-то пользуется тем, что есть, кто-то создает свои технологии, главное во всем этом - не стоять на месте.
Готов порадовать и порадоваться двумя новыми заявками на доклады. Детали чуть позже, но предварительно сообщаю, что и докладчики и их доклады несут экстра-экспертный опыт из областей знаний:
- InfoSec Engineering
- Malware Researching
Получаемый опыт ценен, не только, как сам опыт, но и как платформа для новых рассуждений и исследований.
Хочешь прийти и послушать - Welcome
Хочешь выступить - Welcome в двойне
Цени настоящее, делись опытом и будет тебе счастье) Peace ✌️
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Powerful attack vector in the domain name system (DNS) is being widely exploited across many DNS providers
https://blogs.infoblox.com/threat-intelligence/who-knew-domain-hijacking-is-so-easy/
https://blogs.infoblox.com/threat-intelligence/who-knew-domain-hijacking-is-so-easy/
Infoblox Blog
Who Knew? Domain Hijacking is So Easy | Infoblox
Learn about the insidious DNS attack vector that threat actors are using to hijack domains from major brands, government institutions, and other organizations, large and small. Find out how to determine whether your domain name is at risk.