Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 200 / 238
CVE-2022-45047: Apache MINA SSHD unsafe deserialization vulnerability https://securityonline.info/cve-2022-45047-apache-mina-sshd-unsafe-deserialization-vulnerability/
16/11/2022 07:07:34
QRCode
archive.org
thumbnail

Recently, Apache MINA fixed an unsafe deserialization vulnerability. The bug exists in the class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider, an attacker could exploit this vulnerability to deserialize and thus achieve remote code execution. Track as CVE-2022-45047, the flaw severity is important.

securityonline EN 2022 CVE-2022-4504 Apache MINA SSHD unsafe deserialization
BumbleBee Zeros in on Meterpreter https://thedfirreport.com/2022/11/14/bumblebee-zeros-in-on-meterpreter/
14/11/2022 21:31:34
QRCode
archive.org
thumbnail

In this intrusion from May 2022, the threat actors used BumbleBee as the initial access vector from a Contact Forms campaign. We have previously reported on two BumbleBee intrusions (1, 2), and this report is a continuation of a series of reports uncovering multiple TTPs seen by BumbleBee post exploitation operators.

The intrusion began with the delivery of an ISO file that contained an LNK and a DLL. The threat actors leveraged BumbleBee to load a Meterpreter agent and Cobalt Strike Beacons. They then performed reconnaissance, used two different UAC bypass techniques, dumped credentials, escalated privileges using a ZeroLogon exploit, and moved laterally through the environment.

thedfirreport EN 2022 bumblebee case analysis
Apple Hit With Class Action Alleging It Tracks Users Despite Privacy Assurances https://www.macrumors.com/2022/11/14/apple-class-action-user-tracking-allegations/
14/11/2022 21:29:08
QRCode
archive.org
thumbnail

Apple is facing a proposed federal class action alleging that it records users' mobile activity without their consent and despite privacy...

macrumors 2022 EN privacy Apple-Lawsuits Apple-Privacy Apple
Computer Security Incident Response Teams: Sind sie gesetzlich geregelt? Das Schweizer Beispiel https://link.springer.com/article/10.1365/s43439-022-00070-x
14/11/2022 14:02:34
QRCode
archive.org

Computer security incident response teams: are they legally regulated? The Swiss example

springer EN 2022 security low GovCert CH
Delegating trust is really, really, really hard (infosec edition) https://pluralistic.net/2022/11/09/infosec-blackpill/#on-trusting-trust
14/11/2022 10:49:47
QRCode
archive.org
pluralistic CoryDoctorow EN 2022 trust Trustcor CA
Internal Documents Show How Close the F.B.I. Came to Deploying Spyware - The New York Times https://www.nytimes.com/2022/11/12/us/politics/fbi-pegasus-spyware-phones-nso.html
14/11/2022 06:53:59
QRCode
archive.org

Christopher Wray, the F.B.I.’s director, told Congress last December that the bureau purchased the phone hacking tool Pegasus for research and development purposes.

nytimes EN 2022 Pegasus FBI privacy US spyware
LockBit ransomware suspect nabbed in Canada, faces charges in the US https://arstechnica.com/information-technology/2022/11/feds-charge-man-for-his-alleged-involvement-in-pushing-lockbit-ransomware/
13/11/2022 21:13:50
QRCode
archive.org
thumbnail

Automation features make LockBit one of the more destructive pieces of ransomware.
Federal prosecutors on Thursday charged a dual Russian and Canadian national for his alleged participation in a global campaign to spread ransomware known as LockBit.

Mikhail Vasiliev, 33, of Bradford, Ontario, Canada, was taken into custody in late October by authorities in Ontario, officials at Interpol said. He is now in custody in Canada awaiting extradition to the US.

arstechnica EN 2022 LockBit Canada member arrest
Compromising Plesk via its REST API https://fortbridge.co.uk/research/compromising-plesk-via-its-rest-api/
12/11/2022 22:38:00
QRCode
archive.org
thumbnail

Compromising Plesk via its REST API, CSRF, CORS misconfiguration, add db user, add backdoor, add secret token, cookieless CSRF

fortbridge EN 2022 Plesk REST misconfiguration CSRF Vulnerability
Exploring ZIP Mark-of-the-Web Bypass Vulnerability (CVE-2022-41049) https://breakdev.org/zip-motw-bug-analysis/
12/11/2022 22:36:48
QRCode
archive.org
thumbnail

Windows ZIP extraction bug (CVE-2022-41049) lets attackers craft ZIP files, which evade warnings on attempts to execute packaged files, even if ZIP file was downloaded from the Internet.

breakdev EN 2022 CVE-2022-41049 Windows Mark-of-the-Web Bypass Vulnerability analysis
PNG Steganography Hides Backdoor https://decoded.avast.io/martinchlumecky/png-steganography/
12/11/2022 22:35:11
QRCode
archive.org
thumbnail

Our deep analysis of the Worok toolset (previously described by ESET Research) reveals the final stage, hidden in a PNG file, that steals data and provides a multifunctional backdoor using the DropBox repository and API.

avast EN 2022 PNG backdoor Worok analysis toolset Steganography
Massive ois[.]is Black Hat Redirect Malware Campaign https://blog.sucuri.net/2022/11/massive-ois-is-black-hat-redirect-malware-campaign.html
12/11/2022 22:31:02
QRCode
archive.org
thumbnail

Learn how attackers are redirecting WordPress website visitors to fake Q&A sites via ois[.]is. Nearly 15,000 websites affected by this malware so far.

sucuri EN 2022 campaign WordPress malware Malicious SEO Analysis ois.is
Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns https://blog.talosintelligence.com/ipfs-abuse/
12/11/2022 22:26:19
QRCode
archive.org
thumbnail
  • The InterPlanetary File System (IPFS) is an emerging Web3 technology that is currently seeing widespread abuse by threat actors.
    • Cisco Talos has observed multiple ongoing campaigns that leverage the IPFS network to host their malware payloads and phishing kit infrastructure while facilitating other attacks.
    • IPFS is often used for legitimate
talosintelligence EN 2022 IPFS Phishing Malware Campaigns
Attacking Apple's Neural Engine https://github.com/0x36/weightBufs/blob/main/attacking_ane_poc2022.pdf
12/11/2022 21:59:41
QRCode
archive.org
thumbnail

WeightBufs is a kernel r/w exploit for all Apple devices with Neural Engine support. Bugs and Exploit by @simo36, you can read my presentation slides at POC for more details about the vulnerabilities and the exploitation techniques.

0x36 EN 2022 WeightBufs GitHub Apple ios macos exploit NeuralEngine exploitation CVE-2022-32845 CVE-2022-32948 CVE-2022-42805 CVE-2022-32899
Prigozhin interests and Russian information operations https://blog.google/threat-analysis-group/prigozhin-interests-and-russian-information-operations/
12/11/2022 12:11:08
QRCode
archive.org
thumbnail

TAG highlights four case studies involving Russian IO tied to the Internet Research Agency and Russian oligarch Yevgeny Prigozhin.

TAG EN 2022 GoogleTAG Russia information operations disifnormation influence propaganda Prigozhin
Mysterious company with government ties plays key internet role https://www.washingtonpost.com/technology/2022/11/08/trustcor-internet-addresses-government-connections/
09/11/2022 20:48:59
QRCode
archive.org
thumbnail

TrustCor Systems vouches for the legitimacy of websites. But its physical address is a UPS Store in Toronto.

washingtonpost EN 2022 Trustcore root certificate trust US
Microsoft fixes many zero-days under attack https://www.helpnetsecurity.com/2022/11/08/cve-2022-41091-november-2022-patch-tuesday/
09/11/2022 08:29:56
QRCode
archive.org
thumbnail

November 2022 Patch Tuesday is here, with fixes for CVE-2022-41091, CVE-2022-41049, CVE-2022-41128 and other actively exploited bugs.

helpnetsecurity EN 2022 zero-days Patch-Tuesday CVE-2022-41091 CVE-2022-41049 CVE-2022-41128
Abusing windows’ tokens to compromise active directory without touching lsass https://sensepost.com/blog/2022/abusing-windows-tokens-to-compromise-active-directory-without-touching-lsass/
08/11/2022 19:05:21
QRCode
archive.org

During an internal assessment, I performed an NTLM relay and ended up owning the NT AUTHORITY\SYSTEM account of the Windows server. Looking at the users connected on the same server, I knew that a domain administrator account was connected. All I had to do to compromise the domain, was compromise the account. This could be achieved by dumping the memory of the LSASS process and collecting their credentials or Kerberos TGT’s. Seemed easy until I realised an EDR was installed on the system. Long story short, I ended up compromising the domain admin account without touching the LSASS process. To do so, I relied on an internal Windows mechanism called token manipulation.

The goal of this blog post is to present how I did it. We will see what access tokens are, what they are used for, how we can manipulate them to usurp legitimate accounts without touching LSASS and finally I will present a tool and a CrackMapExec module that can be used during such assessments. All the source code, binaries and CrackMapExec module can be found here https://github.com/sensepost/impersonate.

sensepost EN 2022 orange LSASS CrackMapExec redteam impersonate tokens abusing Windows
The Case of Cloud9 Chrome Botnet https://www.zimperium.com/blog/the-case-of-cloud9-chrome-botnet/
08/11/2022 15:54:50
QRCode
archive.org
thumbnail

The Zimperium zLabs team recently discovered a malicious browser extension, originally called Cloud9, which not only steals the information available during the browser session but can also install malware on a user's device and subsequently assume control of the entire device. In this blog, we will take a deeper look into this malicious browser extension.

zimperium EN 2022 browser extension Cloud9 malicious stealer malware Analysis
A cyberattack blocked the trains in Denmark https://securityaffairs.co/wordpress/138127/cyber-crime/cyberattack-blocked-trains-denmark.html
08/11/2022 11:03:58
QRCode
archive.org
thumbnail

At the end of October, a cyber attack caused the trains to stop in Denmark, the attack hit a third-party IT service provider. A cyber attack caused training the trains operated by DSB to stop in Denmark the last weekend, threat actors hit a third-party IT service provider. The attack hit the Danish company Supeo […]

securityaffairs EN 2022 Denmark cyberattack trains DSB
Nation-state cyberattacks become more brazen as authoritarian leaders ramp up aggression https://blogs.microsoft.com/on-the-issues/2022/11/04/microsoft-digital-defense-report-2022-ukraine/
08/11/2022 08:37:21
QRCode
archive.org
thumbnail

On February 23, 2022, the cybersecurity world entered a new age, the age of the hybrid war, as Russia launched both physical and digital attacks against Ukraine. This year’s Microsoft Digital Defense Report provides new detail on these attacks and on increasing cyber aggression coming from authoritarian leaders around the world.

microsoft EN 2022 report authoritarian leaders defense
page 200 / 238
4755 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio