Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 4
61 résultats taggé Linux  ✕
Decade-old Linux ‘wall’ bug helps make fake SUDO prompts, steal passwords https://www.bleepingcomputer.com/news/security/decade-old-linux-wall-bug-helps-make-fake-sudo-prompts-steal-passwords/
28/03/2024 22:50:21
QRCode
archive.org
thumbnail

A vulnerability has been discovered in the 'util-linux' library that could allow unprivileged users to put arbitrary text on other users' terminals using the 'wall' command.

bleepingcomputer EN 2024 Clipboard-Hijacker Library Linux Passwords Terminal WallEscape
Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques https://pwning.tech/nftables/
27/03/2024 22:51:32
QRCode
archive.org
thumbnail

A tale about exploiting KernelCTF Mitigation, Debian, and Ubuntu instances with a double-free in nf_tables in the Linux kernel, using novel techniques like Dirty Pagedirectory. All without even having to recompile the exploit for different kernel targets once.

pwning EN 2024 KernelCTF Mitigation nf_tables Linux exploitation CVE-2024-1086
Windows 11, Tesla, and Ubuntu Linux hacked at Pwn2Own Vancouver https://www.bleepingcomputer.com/news/security/windows-11-tesla-and-ubuntu-linux-hacked-at-pwn2own-vancouver/
21/03/2024 08:42:41
QRCode
archive.org
thumbnail

On the first day of Pwn2Own Vancouver 2024, contestants demoed Windows 11, Tesla, and Ubuntu Linux zero-day vulnerabilities and exploit chains to win $732,500 and a Tesla Model 3 car.

bleepingcomputer EN 2024 Competition Exploit Hacking Linux Pwn2Own Tesla Windows Windows-11 Zero-Day
Linux Foundation Launches Tazama: A Revolutionary Open Source Solution for Real-Time Fraud Management https://www.linuxfoundation.org/press/linux-foundation-launches-tazama-for-real-time-fraud-management
17/03/2024 14:48:34
QRCode
archive.org
thumbnail

Tazama is the first open source platform for financial monitoring and fraud detection.

linuxfoundation EN 2024 Linux Foundation Tazama Open-Source fraud detection
Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-servers-using-1-day-vulnerabilities/
11/03/2024 11:26:35
QRCode
archive.org
thumbnail
  • Magnet Goblin is a financially motivated threat actor that quickly adopts and leverages 1-day vulnerabilities in public-facing services as an initial infection vector. At least in one case of Ivanti Connect Secure VPN (CVE-2024-21887), the exploit entered the group’s arsenal as fast as within 1 day after a POC for it was published.
  • Campaigns that we were able to attribute to this actor targeted Ivanti, Magento, Qlink Sense and possibly Apache ActiveMQ.
  • Analysis of the actor’s recent Ivanti Connect Secure VPN campaign revealed a novel Linux version of a malware called NerbianRAT, in addition to WARPWIRE, a JavaScript credential stealer.
  • The actor’s arsenal also includes MiniNerbian, a small Linux backdoor, and remote monitoring and management (RMM) tools for Windows like ScreenConnect and AnyDesk.
checkpoint EN 2024 Magnet-Goblin 1-day vulnerability Linux NerbianRAT
StripedFly: Perennially flying under the radar https://securelist.com/stripedfly-perennially-flying-under-the-radar/110903/
26/10/2023 23:06:55
QRCode
archive.org
thumbnail

Nobody would even suspect the mining malware was merely a mask, masquerading behind an intricate modular framework that supports both Linux and Windows. The amount of effort that went into creating the framework is truly remarkable, and its disclosure was quite astonishing.

securelist EN 2023 stripedfly NSA Data-theft Encryption EternalBlue Linux Malware-Descriptions Malware-Technologies Miner Targeted-attacks TOR
[CVE-2023-42752] integer overflow in Linux kernel leading to exploitable memory access https://seclists.org/oss-sec/2023/q3/192
19/09/2023 21:02:46
QRCode
archive.org
thumbnail

I recently found an integer overflow in the Linux kernel, which leads
to the kernel allocating skb_shared_info in the userspace, which is
exploitable in systems without SMAP protection since skb_shared_info
contains references to function pointers.

seclists EN 2023 CVE-2023-42752 integer overflow Linux kernel
Trojanized Free Download Manager found to contain a Linux backdoor https://securelist.com/backdoored-free-download-manager-linux-malware/110465/
14/09/2023 12:20:50
QRCode
archive.org
thumbnail

Kaspersky researchers analyzed a Linux backdoor disguised as Free Download Manager software that remained under the radar for at least three years.

securelist EN 2023 Backdoor Linux Malware Supply-chain-attack Download-Manager
Reptile Malware Targeting Linux Systems https://asec.ahnlab.com/en/55785/
04/08/2023 09:39:49
QRCode
archive.org
thumbnail

Reptile is an open-source kernel module rootkit that targets Linux systems and is publicly available on GitHub. [1] Rootkits are malware that possess the capability to conceal themselves or other malware. They primarily target files, processes, and network communications for their concealment. Reptile’s concealment capabilities include not only its own kernel module but also files, directories, file contents, processes, and network traffic. Unlike other rootkit malware that typically only provide concealment capabilities, Reptile goes a step further by offering a reverse...

ASEC EN 2023 Reptile open-source kernel module rootkit Linux
Almost 40% of Ubuntu users vulnerable to new privilege elevation flaws https://www.bleepingcomputer.com/news/security/almost-40-percent-of-ubuntu-users-vulnerable-to-new-privilege-elevation-flaws/
26/07/2023 23:40:45
QRCode
archive.org
thumbnail

Two Linux vulnerabilities introduced recently into the Ubuntu kernel create the potential for unprivileged local users to gain elevated privileges on a massive number of devices.

bleepingcomputer EN 2023 Code-Execution Kernel Linux Linux-Kernel Local-Privilege-Escalation Ubuntu Vulnerability CVE-2023-2640 CVE-2023-32629
AVrecon malware infects 70,000 Linux routers to build botnet https://www.bleepingcomputer.com/news/security/avrecon-malware-infects-70-000-linux-routers-to-build-botnet/
15/07/2023 13:59:09
QRCode
archive.org
thumbnail

Since at least May 2021, stealthy Linux malware called AVrecon was used to infect over 70,000 Linux-based small office/home office (SOHO) routers and add them to a botnet designed to steal bandwidth and provide a hidden residential proxy service.

bleepingcomputer EN 2023 AVrecon Botnet Linux Malware RAT Router
Akira Ransomware Extends Reach to Linux Platform https://blog.cyble.com/2023/06/28/akira-ransomware-extends-reach-to-linux-platform/
28/06/2023 14:45:02
QRCode
archive.org
thumbnail

Cyble Research & Intelligence Labs examines the Linux variant of Akira Ransomware and assesses its impact on various sectors.

cyble EN 2023 Akira Ransomware Linux
GobRAT malware written in Go language targeting Linux routers https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
05/06/2023 21:54:15
QRCode
archive.org
thumbnail

JPCERT/CC has confirmed attacks that infected routers in Japan with malware around February 2023. This blog article explains the details of the attack confirmed by JPCERT/CC and GobRAT malware, which was used in the attack. ### Attack flow up to...

jpcert EN 20233 GobRAT malware analysis Linux routers Go
oss-sec: [CVE-2023-32233] Linux kernel use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary reads and writes in kernel memory https://seclists.org/oss-sec/2023/q2/133
10/05/2023 08:23:43
QRCode
archive.org
thumbnail

An issue has been discovered in the Linux kernel that can be abused by
unprivileged local users to escalate privileges.

The issue is about Netfilter nf_tables accepting some invalid updates
to its configuration.

seclists.org EN 2023 CVE-2023-32233 Linux Kernel Netfilter nf_tables arbitrary memory vulnerability
RTM Locker Ransomware as a Service (RaaS) Now on Linux - Uptycs https://www.uptycs.com/blog/rtm-locker-ransomware-as-a-service-raas-linux
27/04/2023 13:53:22
QRCode
archive.org
thumbnail

Uptycs threat research team discovered a new ransomware Linux binary attributed to the RTM group Locker, a known Ransomware-as-a-Service (RaaS) provider.

Uptycs EN 2023 ransomware Linux RTM group Locker Ransomware-as-a-Service
PSA: upgrade your LUKS key derivation function https://mjg59.dreamwidth.org/66429.html
23/04/2023 11:23:25
QRCode
archive.org

Here's an article from a French anarchist describing how his (encrypted) laptop was seized after he was arrested, and material from the encrypted partition has since been entered as evidence against him. His encryption password was supposedly greater than 20 characters and included a mixture of cases, numbers, and punctuation, so in the absence of any sort of opsec failures this implies that even relatively complex passwords can now be brute forced, and we should be transitioning to even more secure passphrases.

Or does it? Let's go into what LUKS is doing in the first place. The actual data is typically encrypted with AES, an extremely popular and well-tested encryption algorithm. AES has no known major weaknesses and is not considered to be practically brute-forceable - at least, assuming you have a random key. Unfortunately it's not really practical to ask a user to type in 128 bits of binary every time they want to unlock their drive, so another approach has to be taken.

mjg59 EN Linux LUKS KDF cracked police encryption password AES
Linux kernel logic allowed Spectre attack on major cloud https://www.theregister.com/2023/04/14/linux_kernel_spectre_flaw_fixed/
17/04/2023 07:02:47
QRCode
archive.org
thumbnail

Kernel 6.2 ditched a useful defense against ghostly chip design flaw

theregister EN 2023 Spectre Kernel Linux cloud
Shc Linux Malware Installing CoinMiner https://asec.ahnlab.com/en/45182/
04/01/2023 12:14:36
QRCode
archive.org
thumbnail

The ASEC analysis team recently discovered that a Linux malware developed with Shc has been installing a CoinMiner. It is presumed that after successful authentication through a dictionary attack on inadequately managed Linux SSH servers, various malware were installed on the target system. Among those installed were the Shc downloader, XMRig CoinMiner installed through the former, and DDoS IRC Bot, developed with Perl.

asec 2023 EN Shell Script Compiler analysis Linux Malware CoinMiner Shc
Compromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022. https://pytorch.org/blog/compromised-nightly-dependency/
02/01/2023 11:38:36
QRCode
archive.org
thumbnail

If you installed PyTorch-nightly on Linux via pip between December 25, 2022 and December 30, 2022, please uninstall it and torchtriton immediately, and use the latest nightly binaries (newer than Dec 30th 2022).

$ pip3 uninstall -y torch torchvision torchaudio torchtriton
$ pip3 cache purge
PyTorch-nightly Linux packages installed via pip during that time installed a dependency, torchtriton, which was compromised on the Python Package Index (PyPI) code repository and ran a malicious binary. This is what is known as a supply chain attack and directly affects dependencies for packages that are hosted on public package indices.

PyTorch EN 2022 Linux pip Compromised dependency Supply-chain-security
Chaos is a Go-based Swiss army knife of malware https://blog.lumen.com/chaos-is-a-go-based-swiss-army-knife-of-malware/
01/10/2022 01:03:28
QRCode
archive.org
thumbnail

Black Lotus Labs, the threat intelligence arm of Lumen Technologies, recently uncovered a multifunctional Go-based malware developed for Windows and Linux

lumen EN 2022 Chaos Go malware Windows Linux IoCs
page 2 / 4
4259 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio