juliewebgirl , to Random stuff
@juliewebgirl@mstdn.social avatar

If this isn't enough to convince you of the bad things "" can do, you're beyond help.

https://m.youtube.com/shorts/D2qjAy4navQ

alice , to Random stuff
@alice@lgbtqia.space avatar

Hey everyone, It's Friday! You know what that means?

If you said, "don't push code to prod", "ladies and gentlemen, the weekend", or "that it's Friday", ...you're right!

But I was specifically referring to (or for short)

So without further ado…

  • @transflowerwitch - is a beautiful person and they're having a rough time right now—show them some love :heart_trans:
  • @catsalad - who I'm so pleased is in my life :ablobcatheart:
  • @AeonCypher - knows a lot about AI (and has been my best friend since childhood) :neocat_hug:
  • @deviantollam - should frequent Mastodon more (oh and he knows security stuff) :neocat_cool_fingerguns:
  • @xyhhx - is super sweet (and you should hire them) 🍜
  • @infobeautiful - because data becomes information when it's made accessible 📊
  • @guardian - so you'll know when they publish more anti-trans bullshit and you can yell at them 🤬
  • @alice_watson - I've heard they're pretty cool 🤷‍♀️
  • @dgar - has puns for days 😉
  • @GottaLaff - has the best commentary on the train wreck that is Trump 🍿

LeeArchinal , to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Friday all! We made it!

The focus of the third part of Elastic's "Dissecting : An in-depth analysis of a widespread 2024 malware" is all about the command and control (C2) configuration and commands. Looking at the long list of capabilities, it is easy to see why this is a formidable malware indeed. Some of the commands that can be issued control the persistence between two registry run keys, can enable key logging, it can disable the User Account Control (UAC) within the registry and much more. I really don't have enough space or time to list everything that it is capable of, you just have to check it out yourself!

One of the TTPs and Behaviors that shows up time and time again when it comes to persistence is the abuse of the AutoRun registry key locations. In this instance, we see that the Remcos rat can modifies the CurrentVersion\Run keys in both the HKCU and HKLM hive. As always, if we can help we do! Cyborg Security has a community hunt package that captures this activity as well as other registry run locations. Enjoy and Happy Hunting!

Autorun or ASEP Registry Key Modification
https://hunter.cyborgsecurity.io/research/hunt-package/8289e2ad-bc74-4ae3-bfaa-cdeb4335135c

Article Source:
https://www.elastic.co/security-labs/dissecting-remcos-rat-part-three

masek , to Random stuff
@masek@infosec.exchange avatar

I discovered today, that is restricting the use of a password manager (in my case: Bitwarden).

The password can no longer being filled from the password manager.

IMHO there is a special place in hell reserved for such people. By doing that, they foster substandard security practices.

This wouldn't be so bad if the implementation of passkeys at Amazon would not be completely dysfunctional.

Citation from their own knowledge base:

"Important: To create and use passkeys, your device will need to meet one of these minimum software requirements (if applicable):

iOS 16
macOS BigSur
Android 9"

They really do not want their users to be secure. Their only interest is "being able to blame the user if anything goes wrong".

Their enshitification continues...

ninjaowl Bot , to Cybersecurity
@ninjaowl@mastodon.social avatar

Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability https://thehackernews.com/2024/05/chrome-zero-day-alert-update-your.html

applsec , to Cybersecurity
@applsec@infosec.exchange avatar

🧪 NEW BETA RELEASE 🧪

💻 macOS 14.5 RC (23F79)
https://developer.apple.com/news/releases

LeeArchinal , to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Thursday everyone!

Jumping around a bit because that is just how my brain works! But, here is Elastic's part two of their "Dissecting : An in-depth analysis of a widespread 2024 malware" series. This episode they focus on the watchdog, keylogger, and screen and audio recording capabilities and much more! The technical details here are amazing and I can't wait to finish the rest of the series!
Enjoy and Happy Hunting!

Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Two
https://www.elastic.co/security-labs/dissecting-remcos-rat-part-two

scottwilson , to Cybersecurity
@scottwilson@infosec.exchange avatar

STATEMENT:

“We take the privacy and confidentiality of your information seriously.”

TRANSLATION:

“Every time we have a data breach we’ll let you know about it! Mainly ‘cuz we are required to in order to minimize our legal liability… and of course after we’ve consulted with our legal firm and our new 3rd party incident response vendor.”

InfobloxThreatIntel , to Cybersecurity
@InfobloxThreatIntel@infosec.exchange avatar

A malicious lookalike domain for Scotiabank Canada scotiabankcanada-auth[.]com was recently registered 5/5/2024. This domain features a landing page with a reCAPTCHA that changes languages depending on the user's geolocation. It resolves to a Russian IP 141[.]8[.]193[.]14 hosting a number of other malicious lookalikes for Scotiabank, the Royal Bank of Canada, and Telus Mobility. These domains appear to be used for phishing. auth-scotiaonline-scotiabank-secure[.]com previously resolved to a page imitating the Scotiabank login page shown in the screenshot below.

Domains: secure-scotiabankcanada[.]com, ,auth-scotiabankcanada-secure[.]com, info-securerbcroyalbank[.]com, rbcroyalbank-infosecure[.]com, rbcroyalbankinfo-secure[.]com, secure-inforbcroyalbank[.]com, secure-rbcroyalbankinfo[.]com, telusmobility-securerefund[.]com

image/png

north , to Cybersecurity
@north@xn--8r9a.com avatar

I'll give this a shot.

I'm looking to for a role in . I've done both offensive (see e.g. https://github.com/qwell/disclosures/) and defensive security work, and have over 20 years of software development experience in many different languages.

ISC2 CC

DMs always open.

(we should pick a hashtag and stick with it)

applsec , to Cybersecurity
@applsec@infosec.exchange avatar

🧪 NEW BETA RELEASE 🧪

⌚ watchOS 10.5 RC 2 (21T576)
https://developer.apple.com/news/releases

applsec , to Cybersecurity
@applsec@infosec.exchange avatar

🐛 NEW SECURITY CONTENT 🐛

🎵 iTunes 12.13.2 for Windows - 1 bug fixed
https://support.apple.com/kb/HT214099

pidooma , to Random stuff
@pidooma@infosec.exchange avatar

Waiting with the unwashed masses to enter the RSA expo hall. How many booths will be touting AI something?

cyberfeed Bot , to Cybersecurity
@cyberfeed@mstdn.social avatar
dumbpasswordrules Bot , to Cybersecurity
@dumbpasswordrules@botsin.space avatar

This dumb password rule is from Minecraft.

Using a 16 character password seems to work. Everything else above does not always work.
Also, passwords that are too long are still changed, so you have to reset them by email.

https://dumbpasswordrules.com/sites/minecraft/

DarkWebInformer , to Cybersecurity
@DarkWebInformer@infosec.exchange avatar

Pretty sure ZScaler has been breached.

🚨🚨Notorious threat actor,
@InteIBroker
, is selling access to a large Cybersecurity company. Price: $20,000. Details below.

Revenue: $1.8 Billion
Access includes:

  • Confidential and highly critical logs packed with credentials
  • SMTP Access
  • PAuth Pointer Auth Access
  • SSL Passkeys & SSL Certificates
  • some others (will be on contact)
    Price: $20K in XMR or ETH
    Middleman / Escrow accepted (Auto Escrow or
    @Baphomet
    )
    Message me on the forums for a point of contact.
    Proof of funds is required.
    I am only selling to reputable members. No time wasters or default rank users.

X Link: https://twitter.com/DarkWebInformer/status/1788179513353891977

LeeArchinal , to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Wednesday everyone!

I am flattered that I have the opportunity to present my 2-day training "A Beginner's Guide To Threat Hunting: How to Shift Focus from IOCs to Behaviors and TTPs" again at Black Hat USA 2024 and that early bird registration is open and you have two opportunities to take the course!

Day 1 begins with a theory section where we discuss resources and models that can help aid our threat hunting from both an intel and communication perspective. We then move to a section that covers how to extract artifacts from an intel report and how to make those artifacts actionable. Then we create some hypotheses and test them against a set of data to see what we can find.

Day 2 will put all the theory and applications to the test where the students will break into teams, process another intel report, create hypotheses, and hunt again!

Last year was a lot of fun and we receive high ratings, so we hope you can join us again this year for the fun! I hope to see you there, but until then, Happy Hunting!

A BEGINNER'S GUIDE TO THREAT HUNTING: HOW TO SHIFT FOCUS FROM IOCS TO BEHAVIORS AND TTPS
https://www.blackhat.com/us-24/training/schedule/#a-beginners-guide-to-threat-hunting-how-to-shift-focus-from-iocs-to-behaviors-and-ttps-36528

applsec , to Cybersecurity
@applsec@infosec.exchange avatar

🧪 NEW BETA RELEASES 🧪

📱 iOS 16.7.8 RC (20H343)
📱 iOS 17.5 RC (21F79)
📱 iPadOS 16.7.8 RC (20H343)
📱 iPadOS 17.5 RC (21F79)
📺 tvOS 17.5 RC (21L569)
🥽 visionOS 1.2 beta 5 (21O5587a)
⌚ watchOS 10.5 RC (21T575)
🔨 Xcode 15.4 RC (15F31c)
https://developer.apple.com/news/releases

harrysintonen , (edited ) to Cybersecurity
@harrysintonen@infosec.exchange avatar

So there's a "novel" attack with a fancy name "". I argue that this is not novel at all. It is quite well known that these DHCP option 121 routes bypass routes set up by a VPN. Case example: Here is the TunnelVision attack described in September 2023: https://lowendtalk.com/discussion/188857/a-rogue-dhcp-server-within-your-network-can-and-will-hijack-your-vpn-traffic

dannyjpalmer , to FFXIV
@dannyjpalmer@infosec.exchange avatar

The Final Fantasy XIV Reddit sub is currently full of discussion about the DDoS attack which disrupted servers worldwide yesterday.

Finding it very interesting how in the world of cybersecurity and infosec, DDoS attacks are often dismissed as one of the simplest form of cyber attack, while on the subs and forums, many people are hearing about this kind of thing for the first time and have no idea what's going on.

Makes me think about the difference in how 'cyber' is perceived by those who live and breath it compared with those who only happen to stumble across it when it actively disrupts something in their life.

dumbpasswordrules Bot , to Cybersecurity
@dumbpasswordrules@botsin.space avatar

This dumb password rule is from GoDaddy SFTP.

Max 14 characters for the most important password in your shared hosting environment.

https://dumbpasswordrules.com/sites/godaddy-sftp/

harrysintonen , to Cybersecurity
@harrysintonen@infosec.exchange avatar

attributing the UK Ministry of Defence to China is rather interesting. Apparently a payroll systems used by current and former MoD personnel have been breached. https://news.sky.com/story/china-hacked-ministry-of-defence-sky-news-learns-13130757

harrysintonen OP ,
@harrysintonen@infosec.exchange avatar

Shared Services Connected Limited has been named as the vendor of the compromised payroll system. I guess there's a sudden bout of incident response going on in certain orgs right now https://sscl.com/our-clients/

LeeArchinal , to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Monday everyone!

The National Security Agency has released a report detailing evidence of North Korean actors exploiting weak Domain-based Message Authentication, Reporting and Conformance (DMARC) records to conceal social engineering attempts. Without proper DMARC configuration, the NSA says that the actors were able to spoof emails as if they came from a legitimate domain. They also provide more background information about DMARC configurations and examples of the emails and email headers.

While detecting malicious emails can be accomplished by deploying email gateways, antivirus, and spam filters just to name a few. But what happens when some slip through the tracks? Then you look for the behaviors! A common TTP and behavior is to provide the victim with a malicious document that will run some code or commands to progress the attack. In a Microsoft environment, this is commonly accomplished by executing , Windows Command Shell (cmd.exe), or other living-off-the-land binaries (LOLBINs). And that is the basis of this Cyborg Security Community Edition Hunt Package! Enjoy the article, get your free account, and Happy Hunting!

Potential Maldoc Execution Chain Observed
https://hunter.cyborgsecurity.io/research/hunt-package/b194088b-c846-4c72-a4b7-933627878db4

Article source:
https://media.defense.gov/2024/May/02/2003455483/-1/-1/0/CSA-NORTH-KOREAN-ACTORS-EXPLOIT-WEAK-DMARC.PDF

briankrebs , to Random stuff
@briankrebs@infosec.exchange avatar

Researchers at Leviathan Security have released some interesting findings that illustrate why your VPN service may not be as secure as it claims.

From the story:

"VPNs work by creating a virtual network interface that serves as an encrypted tunnel for communications. But researchers at Leviathan Security say they’ve discovered it’s possible to abuse an obscure feature built into the DHCP protocol so that other users on the local network are forced to connect to a rogue DHCP server.

“Our technique is to run a DHCP server on the same network as a targeted VPN user and to also set our DHCP configuration to use itself as a gateway,” Leviathan researchers Lizzie Moratti and Dani Cronce wrote. “When the traffic hits our gateway, we use traffic forwarding rules on the DHCP server to pass traffic through to a legitimate gateway while we snoop on it.”"

More here: https://krebsonsecurity.com/2024/05/why-your-vpn-may-not-be-as-secure-as-it-claims/

jomo ,
@jomo@mstdn.io avatar

A "new" VPN vulnerability dubbed (CVE-2024-3661), published by Leviathan Security and reported on by @briankrebs has been known for many years. However, most people had never thought about this whenever I mentioned it in the past, which explains why this is making the rounds now.

I personally have known it for ~10 years and posted about it on Twitter years ago.

I didn't request a CVE or write half a book's worth of a blog post about it, though :D

  • All
  • Subscribed
  • Moderated
  • Favorites
  • Mordhau
  • WatchParties
  • Rutgers
  • loren
  • Lexington
  • cragsand
  • mead
  • RetroGamingNetwork
  • mauerstrassenwetten
  • MidnightClan
  • xyz
  • PowerRangers
  • AnarchoCapitalism
  • kamenrider
  • supersentai
  • itdept
  • neondivide
  • AgeRegression
  • Teensy
  • WarhammerFantasy
  • space_engine
  • learnviet
  • bjj
  • electropalaeography
  • steinbach
  • khanate
  • jeremy
  • fandic
  • All magazines