Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 9 / 41
817 résultats taggé 2022  ✕
Massive ois[.]is Black Hat Redirect Malware Campaign https://blog.sucuri.net/2022/11/massive-ois-is-black-hat-redirect-malware-campaign.html
12/11/2022 22:31:02
QRCode
archive.org
thumbnail

Learn how attackers are redirecting WordPress website visitors to fake Q&A sites via ois[.]is. Nearly 15,000 websites affected by this malware so far.

sucuri EN 2022 campaign WordPress malware Malicious SEO Analysis ois.is
Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns https://blog.talosintelligence.com/ipfs-abuse/
12/11/2022 22:26:19
QRCode
archive.org
thumbnail
  • The InterPlanetary File System (IPFS) is an emerging Web3 technology that is currently seeing widespread abuse by threat actors.
    • Cisco Talos has observed multiple ongoing campaigns that leverage the IPFS network to host their malware payloads and phishing kit infrastructure while facilitating other attacks.
    • IPFS is often used for legitimate
talosintelligence EN 2022 IPFS Phishing Malware Campaigns
Attacking Apple's Neural Engine https://github.com/0x36/weightBufs/blob/main/attacking_ane_poc2022.pdf
12/11/2022 21:59:41
QRCode
archive.org
thumbnail

WeightBufs is a kernel r/w exploit for all Apple devices with Neural Engine support. Bugs and Exploit by @simo36, you can read my presentation slides at POC for more details about the vulnerabilities and the exploitation techniques.

0x36 EN 2022 WeightBufs GitHub Apple ios macos exploit NeuralEngine exploitation CVE-2022-32845 CVE-2022-32948 CVE-2022-42805 CVE-2022-32899
Prigozhin interests and Russian information operations https://blog.google/threat-analysis-group/prigozhin-interests-and-russian-information-operations/
12/11/2022 12:11:08
QRCode
archive.org
thumbnail

TAG highlights four case studies involving Russian IO tied to the Internet Research Agency and Russian oligarch Yevgeny Prigozhin.

TAG EN 2022 GoogleTAG Russia information operations disifnormation influence propaganda Prigozhin
Mysterious company with government ties plays key internet role https://www.washingtonpost.com/technology/2022/11/08/trustcor-internet-addresses-government-connections/
09/11/2022 20:48:59
QRCode
archive.org
thumbnail

TrustCor Systems vouches for the legitimacy of websites. But its physical address is a UPS Store in Toronto.

washingtonpost EN 2022 Trustcore root certificate trust US
Microsoft fixes many zero-days under attack https://www.helpnetsecurity.com/2022/11/08/cve-2022-41091-november-2022-patch-tuesday/
09/11/2022 08:29:56
QRCode
archive.org
thumbnail

November 2022 Patch Tuesday is here, with fixes for CVE-2022-41091, CVE-2022-41049, CVE-2022-41128 and other actively exploited bugs.

helpnetsecurity EN 2022 zero-days Patch-Tuesday CVE-2022-41091 CVE-2022-41049 CVE-2022-41128
Abusing windows’ tokens to compromise active directory without touching lsass https://sensepost.com/blog/2022/abusing-windows-tokens-to-compromise-active-directory-without-touching-lsass/
08/11/2022 19:05:21
QRCode
archive.org

During an internal assessment, I performed an NTLM relay and ended up owning the NT AUTHORITY\SYSTEM account of the Windows server. Looking at the users connected on the same server, I knew that a domain administrator account was connected. All I had to do to compromise the domain, was compromise the account. This could be achieved by dumping the memory of the LSASS process and collecting their credentials or Kerberos TGT’s. Seemed easy until I realised an EDR was installed on the system. Long story short, I ended up compromising the domain admin account without touching the LSASS process. To do so, I relied on an internal Windows mechanism called token manipulation.

The goal of this blog post is to present how I did it. We will see what access tokens are, what they are used for, how we can manipulate them to usurp legitimate accounts without touching LSASS and finally I will present a tool and a CrackMapExec module that can be used during such assessments. All the source code, binaries and CrackMapExec module can be found here https://github.com/sensepost/impersonate.

sensepost EN 2022 orange LSASS CrackMapExec redteam impersonate tokens abusing Windows
The Case of Cloud9 Chrome Botnet https://www.zimperium.com/blog/the-case-of-cloud9-chrome-botnet/
08/11/2022 15:54:50
QRCode
archive.org
thumbnail

The Zimperium zLabs team recently discovered a malicious browser extension, originally called Cloud9, which not only steals the information available during the browser session but can also install malware on a user's device and subsequently assume control of the entire device. In this blog, we will take a deeper look into this malicious browser extension.

zimperium EN 2022 browser extension Cloud9 malicious stealer malware Analysis
A cyberattack blocked the trains in Denmark https://securityaffairs.co/wordpress/138127/cyber-crime/cyberattack-blocked-trains-denmark.html
08/11/2022 11:03:58
QRCode
archive.org
thumbnail

At the end of October, a cyber attack caused the trains to stop in Denmark, the attack hit a third-party IT service provider. A cyber attack caused training the trains operated by DSB to stop in Denmark the last weekend, threat actors hit a third-party IT service provider. The attack hit the Danish company Supeo […]

securityaffairs EN 2022 Denmark cyberattack trains DSB
Nation-state cyberattacks become more brazen as authoritarian leaders ramp up aggression https://blogs.microsoft.com/on-the-issues/2022/11/04/microsoft-digital-defense-report-2022-ukraine/
08/11/2022 08:37:21
QRCode
archive.org
thumbnail

On February 23, 2022, the cybersecurity world entered a new age, the age of the hybrid war, as Russia launched both physical and digital attacks against Ukraine. This year’s Microsoft Digital Defense Report provides new detail on these attacks and on increasing cyber aggression coming from authoritarian leaders around the world.

microsoft EN 2022 report authoritarian leaders defense
Insurance giant settles NotPetya lawsuit, signaling cyber insurance shakeup https://www.cyberscoop.com/insurance-giant-settles-notpetya-lawsuit/
07/11/2022 06:50:54
QRCode
archive.org
thumbnail

The settlement last week in a $100 million lawsuit over whether insurance giant Zurich should cover losses Mondelez International suffered from NotPetya may very well reshape the entire cyber insurance marketplace.

Zurich initially denied claims from Mondelez after the malware, which experts estimate caused some $10 billion in damages globally, wreaked havoc on its computer networks. The insurance provider claimed an act of war exemption since it’s widely believed Russian military hackers unleashed NotPetya on a Ukrainian company before it spread around the world.

cyberscoop EN 2022 financial NotPetya lawsuit insurance Zurich ransomware
Inside the global hack-for-hire industry https://www.thebureauinvestigates.com/stories/2022-11-05/inside-the-global-hack-for-hire-industry
07/11/2022 06:49:55
QRCode
archive.org
thumbnail

In a quiet alcove of the opulent Leela Palace hotel in Delhi, two British corporate investigators were listening intently to a young Indian entrepreneur as he made a series of extraordinary confessions.

The 28-year-old computer specialist Tej Singh Rathore described his role as a player in a burgeoning criminal industry stealing secrets from people around the world. He had hacked more than 500 email accounts, mostly on behalf of his corporate intelligence clients.

thebureauinvestigates EN 2022 intelligence hack-for-hire India
Crime group hijacks hundreds of US news websites to push malware https://techcrunch.com/2022/11/03/hundreds-news-websites-malware/
06/11/2022 20:09:27
QRCode
archive.org
thumbnail

A cybercriminal group has compromised a media content provider to deploy malware on the websites of hundreds of news outlets in the U.S. according to cybersecurity company Proofpoint.

techcrunch EN 2022 SocGholish malware proofpoint TA569 browser JavaScript
Last Week on My Mac: Home truths about macOS https://eclecticlight.co/2022/11/06/last-week-on-my-mac-home-truths-about-macos/
06/11/2022 11:40:49
QRCode
archive.org
thumbnail

True or false? Apple supports macOS for three years. Apple’s security updates are sufficient. New versions of macOS are full of bugs. It’s safer to delay upgrading.

eclecticlight EN 2022 macos apple security patching updates delay support
Department for Education warned after gambling companies benefit from learning records database https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2022/11/department-for-education-warned-after-gambling-companies-benefit-from-learning-records-database/
06/11/2022 11:38:51
QRCode
archive.org
thumbnail

The Information Commissioner’s Office (ICO) has issued a reprimand to the Department for Education (DfE) following the prolonged misuse of the personal information of up to 28 million children.

An ICO investigation found that the DfE’s poor due diligence meant a database of pupils’ learning records was ultimately used by Trust Systems Software UK Ltd (trading as Trustopia), an employment screening firm, to check whether people opening online gambling accounts were 18.

ICO UK EN 2022 education PII students misuse data privacy records database children
How Qatar hacked the World Cup https://www.thebureauinvestigates.com/stories/2022-11-05/how-qatar-hacked-the-world-cup
06/11/2022 10:30:46
QRCode
archive.org
thumbnail

Critics who threatened to expose wrongdoing by Qatar were targeting as part of huge hacking operation

thebureauinvestigates EN 2022 world-cup fifa phone-hacking computer-hacking qatar corporate-intelligence corruption football qatar-world-cup michel-platini
Microsoft ties Vice Society hackers to additional ransomware strains https://therecord.media/microsoft-ties-vice-society-hackers-to-additional-ransomware-strains/
04/11/2022 07:03:55
QRCode
archive.org
thumbnail

Microsoft tied hackers with the Vice Society ransomware gang to several ransomware strains on Tuesday, noting that the group has been behind a wave of attacks on primary schools and colleges across the world.

therecord EN 2022 vice-society schools ransomware DEV-0832 Zeppelin De-RaaSing
Crimson Kingsnake: BEC Group Impersonates… https://abnormalsecurity.com/blog/crimson-kingsnake-bec-group-attacks
03/11/2022 21:16:59
QRCode
archive.org
thumbnail

Recently, we identified a new BEC group leveraging blind third-party impersonation tactics to swindle companies around the world. The group, which we call Crimson Kingsnake, impersonates real attorneys, law firms, and debt recovery services to deceive accounting professionals into quickly paying bogus invoices.

abnormalsecurity EN 2022 BEC invoices Crimson-Kingsnake impersonation scam
Exploiting Static Site Generators: When Static Is Not Actually Static https://blog.assetnote.io/2022/10/28/exploiting-static-site-generators/
03/11/2022 17:04:03
QRCode
archive.org
thumbnail

Over the last ten years, we have seen the industrialization of the content management space. A decade ago, it felt like every individual and business had a dynamic WordPress blog, loaded up with a hundred plugins to do everything from add widgets to improve performance. Over time, we realised this was a bad idea, as ensuring the security of third-party plugins seemed increasingly impossible.

assetnote EN 2022 Static hosting comromise Netlify
Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor https://www.sentinelone.com/labs/black-basta-ransomware-attacks-deploy-custom-edr-evasion-tools-tied-to-fin7-threat-actor/
03/11/2022 16:40:02
QRCode
archive.org
thumbnail

Black Basta operational TTPs are described here in full detail, revealing previously unknown tools and techniques and a link to FIN7.

SentinelOne EN 2022 BlackBasta FIN7 Research ransomware EDR TTPs
page 9 / 41
4481 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio