PrivacyDigest, to python
@PrivacyDigest@mas.to avatar

Fake job target with new

A new campaign tracked as “Dev Popper” is software developers with fake job interviews in an attempt to trick them into installing a Python remote access (RAT).

https://www.bleepingcomputer.com/news/security/fake-job-interviews-target-developers-with-new-python-backdoor/

schizanon, to Windows11
@schizanon@mas.to avatar

All a sudden there's this little red icon of a microphone in the top left corner of my screen and a little black and white microphone icon it my system tray. No process in task viewer. No startup app. Can't click either of them.

If it's , it's a little obvious. I don't even have a microphone plugged into this PC.

homlett, to iOS
@homlett@mamot.fr avatar

First ever discovered — and it’s stealing Face ID data to break into bank accounts
https://www.tomsguide.com/computing/malware-adware/first-ever-ios-trojan-discovered-and-its-stealing-face-id-data-to-break-into-bank-accounts
❝Once installed on either an or an phone, can collect facial recognition data, identity documents and intercepted text messages […]. To make matters worse, this data is then used to create to impersonate victims and access their accounts.❞
Well, we've been telling you to not use biometric auth for ages…

H3liumb0y, to China

🚨 Cybersecurity Alert: Unveiling COATHANGER Malware 🚨

A recent advisory from the Dutch & has exposed a new threat lurking within appliances: the malware, a remote access trojan (RAT) that's as elusive as it is persistent. Here are the highlights taken from their released TLP-CLEAR advisory:

  • Incident response uncovered previously unpublished malware, a remote access trojan (RAT) designed specifically for Fortigate appliances.
  • refer to the malware as COATHANGER based on a string present in the code.
  • It hides itself by hooking system calls that could reveal its presence.
  • It survives reboots and firmware upgrades. Even fully patched FortiGate devices may therefore be infected, if they were compromised before the latest patch was applied.
  • high confidence that the malicious activity was conducted by a statesponsored actor from the People’s Republic of China
  • The Chinese threat actor(s) scan for vulnerable edge devices at scale and gain access opportunistically, and likely introduce COATHANGER as a communication channel for select victims.
  • initial access occurred through exploitation of the CVE-2022-42475 vulnerability
  • Although this incident started with abuse of CVE-2022- 42475, the COATHANGER malware could conceivably be used in combination with any present or future software vulnerability in FortiGate devices.
  • MIVD & AIVD refer to this RAT as COATHANGER. The name is derived from the peculiar phrase that the malware uses to encrypt the configuration on disk: ‘She took his coat and hung it up’.
  • Please note that second-stage malware like COATHANGER are used in tandem with a vulnerability: the malware is used for persistence to a victim network after the actor gained access.
  • The implant connects back periodically to a Command & Control server over SSL, providing a BusyBox reverse shell.
  • It hides itself by hooking most system calls that could reveal its presence, such as stat and opendir. It does so by replacing them for any process that is forced to load preload.so.
  • Section 3.2 of the PDF has a detailed description of how COATHANGER malware behaves and interacts.
  • Communication to the C2 server is done over a TLS tunnel. COATHANGER first sends the following request to the HTTP GET request to the C2 server: GET / HTTP/2nHost: www.google.comnn

The COATHANGER malware drops the following files;

/bin/smartctl or /data/bin/smartctl<br></br>/data2/.bd.key/authd<br></br>/data2/.bd.key/httpsd<br></br>/data2/.bd.key/newcli<br></br>/data2/.bd.key/preload.so<br></br>/data2/.bd.key/sh<br></br>/lib/liblog.so<br></br>

Several methods have been identified to detect COATHANGER implants. A script was released by them for automated detection HERE These include a YARA-rule, a JA3-hash, different CLI commands, file checksums and a network traffic heuristic.

  • Two YARA rules are provided for detection on the COATHANGER samples.
  • The COATHANGER implant communicates to the C2 server using TLS. This TLS connection is fingerprintable using the following JA3-hash: 339f6adf54e6076d069dcaac54fddc25

With access to the CLI of a FortiGate device, the presence of COATHANGER can be detected in three ways.

  1. Check if the files /bin/smartctl or /data/bin/smartctl exist and inspect the timestamps of smartctl and other files in the same directory. If smartctl was modified later than the majority of other files or is not a symlink, it is likely that the smartctl binary was tampered with.

Use the following command:

fnsysctl ls -la /bin<br></br>fnsysctl ls -la /data/bin<br></br>
  1. The following command shows a list of active TCP sockets. Whenever the FortiGate device has internet access and the malware is active, the outgoing connection will appear in the results. Check the reputation of all outgoing contection IP's.diagnose sys tcpsock

The specific version of COATHANGER that this report describes uses the process name 'httpsd' to obfuscate itself. Therefore, any suspicious outgoing connections to external IP addresses from a process called httpsd is a strong indicator of the presence of COATHANGER:

<device_IP>:<device_port>-><c2_IP>:<c2_port>-<br></br>>state=established err=0 socktype=1 rma=0 wma=0<br></br>fma=0 tma=0 inode=<inode> process=<PID>/httpsd<br></br>
  1. The specific version of COATHANGER that this report describes uses the process name httpsd to obfuscate itself. All active processes can be listed using the following command:fnsysctl ps

Running the following command returns all PID's named 'httpsd'

diagnose sys process pidof httpsd<br></br>

Using the retrieved process IDs from the previous command yields process information for the processes named httpsd.

diagnose sys process dump <PID><br></br>

When the process has a GID set to 90, the device is infected with COATHANGER.

ipaschke, to random
@ipaschke@mastodon.social avatar

PSA: If you bought an Acemagic S1, maybe because of the Black Friday deal or the review on techstage.de: It comes preinstalled with malware, don't use the preinstalled OS under any circumstances. Change all your passwords now if you did.

https://acemagic.de/en/products/acemagic-s1-12th-alder-laker-n95-mini-pc

https://www.virustotal.com/gui/file/3e24d3b6069263ff57ab926d683a1476dab82a838d2ff329f558da35fc48089a/behavior

grickle, to Turkey
@grickle@mstdn.social avatar
0x58, to Cybersecurity

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes the following and much more:

➝ 🔓 👀 Tracking Unauthorized Access to 's Support System
➝ 🔓 🇯🇵 discloses impacting customers in 149 countries
➝ 🔓 🧬 Hacker leaks millions more user records on forum
➝ 🔓 🇨🇳 D-Link confirms data breach after employee attack
➝ 🔓 💰 Fined $13.5 Million Over 2017 Data Breach
➝ 🇺🇦 🧹 Ukrainian activists hack Trigona gang, wipe servers
➝ 🇺🇸 🇰🇵 FBI: Thousands of Remote IT Workers Sent Wages to to Help Fund Weapons Program
➝ 🇮🇳 ☁️ targets , tech support in nationwide crackdown
➝ 🇵🇸 🇮🇷 -linked app offers window into cyber infrastructure, possible links to Iran
➝ 👮🏻‍♂️ 🥷🏻 Police seize leak site
➝ 🇰🇵 North Korean Hackers Exploiting Recent Vulnerability
➝ 🇨🇳 🇷🇺 replaces as top
➝ 🇺🇦 📡 CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks
➝ 🇫🇷 🇪🇸 frees the two biggest Spanish hackers
➝ 🇺🇸 ⚓️ Ex-Navy IT head gets 5 years for selling people’s data on
➝ 🇨🇭 🗳️ ’s e-voting system has predictable implementation blunder
➝ 🔓 🏭 Critical Vulnerabilities Expose ​​ HMIs to Attacks
➝ 🔓 🏭 Industrial Router Possibly Exploited in Attacks
➝ 🦠 🇻🇳 Fake job offers on push malware
➝ 🦠 Google-hosted leads to fake site that looks genuine
➝ 🦠 💬 still a hotbed of activity — Now APTs join the fun
➝ 🦠 🕵🏻‍♂️ SpyNote: Beware of This Android that Records Audio and Phone Calls
➝ 🛍️ 🦠 will now scan sideloaded apps for malware at install time
➝ 💬 🔐 on the way, but as usual, for Android first
➝ 🇷🇺 🗂️ Pro-Russian Hackers Exploiting Recent Vulnerability in New Campaign
➝ 🗓️ ❌ Signal Pours Cold Water on Zero-Day Exploit Rumors
➝ 🔓 💥 warns of new XE actively exploited in attacks

📚 This week's recommended reading is: "RTFM: Red Team Field Manual v2" by Ben Clark and Nicholas Downer

Subscribe to the newsletter to have it piping hot in your inbox every week-end ⬇️

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-422023

jerome_herbinet, to linux French
0x58, to Cybersecurity

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #39/2023 is out! It includes the following and much more:

➝ 🔓 #GitHub repos bombarded by info-stealing commits masked as #Dependabot
➝ 🇯🇵 💸 #Sony Investigating After Hackers Offer to Sell Stolen Data
➝ 🔓 #BORN Ontario child registry #databreach affects 3.4 million people
➝ 🇭🇰 🔓 Personal data of 25,000 Hongkongers at risk after #cyberattack against consumer watchdog, up from earlier estimate of 8,000
➝ 🇺🇸 🔓 National Student Clearinghouse data breach impacts 890 #schools
➝ 🇨🇦 ✈️ #AirCanada discloses data breach of employee and 'certain records'
➝ 🇰🇵 🇪🇸 North Korean hackers posed as #Meta recruiter on #LinkedIn
➝ 👥 ShadowSyndicate: A New #Cybercrime Group Linked to 7 #Ransomware Families
➝ 🇷🇺 ✈️ Russian flight booking system suffers ‘massive’ cyberattack
➝ 🇨🇳 🇺🇸 Chinese hackers stole emails from US State Dept in #Microsoft breach, Senate staffer says
➝ 🇨🇳 Chinese Hackers TAG-74 Targets South Korean Organizations in a Multi-Year Campaign
➝ 🇺🇦 🚀 Ukrainian Military Targeted in Phishing Campaign Leveraging #Drone Manuals
➝ 🥷🏻 💰 Hackers steal $200M from #crypto company #Mixin
➝ 🇳🇬 ⚖️ Nigerian man pleads guilty to attempted $6 million BEC email heist
➝ 🇺🇸 ⚖️ ShinyHunters member pleads guilty to $6 million in data theft damages
➝ 🇨🇳 #China-Linked Budworm Targeting Middle Eastern #Telco and Asian Government Agencies
➝ 🇨🇳 🚪 Backdoored firmware lets China state hackers control #routers with “magic packets”
➝ 🇺🇸 👮🏻‍♂️Security researcher warns of chilling effect after feds search phone at #airport
➝ 🦠 ❗️FBI Warns Organizations of Dual Ransomware, Wiper Attacks
➝ 🤖 🦠 #Bing Chat responses infiltrated by ads pushing #malware
➝ 🏥 🎣 Red Cross-Themed #Phishing Attacks Distributing DangerAds and AtlasAgent Backdoors
➝ 🥷🏻 🐍 #SSH keys stolen by stream of malicious #PyPI and #npm packages
➝ 🏦 🎠 New Variant of #Banking #Trojan BBTok Targets Over 40 Latin American Banks
➝ 🦠 🚪 #Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics
➝ 🚀 #Sysdig Launches Realtime Attack Graph for Cloud Environments
➝ 🐛 📨 Critical vulnerabilities in #Exim threaten over 250k #email servers worldwide
➝ 🔓 Progress warns of maximum severity WS_FTP Server vulnerability
➝ 🩹 🔥 #Google fixes fifth actively exploited Chrome zero-day of 2023
➝ 🩹 🍏 #macOS 14 #Sonoma Patches 60 #Vulnerabilities
➝ 🩹 🦊 #Firefox 118 Patches High-Severity Vulnerabilities
➝ 🤫 ✅ Google quietly corrects previously submitted disclosure for critical #webp 0-day
➝ 👀 🇪🇬 0-days exploited by commercial surveillance vendor in #Egypt

📚 This week's recommended reading is: "Philosophy of Cybersecurity" by @LukaszOlejnik and Artur Kurasinski

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-392023

euroinfosec, to random
pirati, to eticadigitale
@pirati@sociale.network avatar

Marco Cappato a Meloni: "I servizi mi stanno spiando per associazione sovversiva"

@eticadigitale

Quanto denunciato da @marcocappato è gravissimo!
Esprimiamo tutta la nostra solidarietà e il nostro appoggio a uno dei pochissimi politici che siano stati in grado di smuovere il gelatinoso sistema politico italiano.
I di stato contro i dissidenti sono un crimine!
https://youtu.be/KpPrKNUExeE?si=o-aWpMOW-gyUmfqm

itnewsbot, to amateurradio
@itnewsbot@schleuss.online avatar

Inexpensive Ham Radio Gets Upgrades Thanks to a Trojan - Love them or hate them, the crop of cheap hand-held amateur radio transceivers is... - https://hackaday.com/2023/07/06/inexpensive-ham-radio-gets-upgrades-thanks-to-a-trojan/ #amateurradio #handytalkie #radiohacks #quansheng #firmware #s-meter #trojan #rssi #uvk5 #ham

0x58, to Cybersecurity

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes, but not only:

➝ 🦠 🇺🇸 Schools say US teachers’ retirement fund was breached by hackers
➝ 🇨🇳 🇺🇸 Chinese spy did not collect information over US, says
➝ 🇨🇳 🦠 Says Supplier Hacked After Group Claims Attack on Chip Giant
➝ 🇷🇺 Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks
➝ 🇷🇺 🛰️ Hackers attack Russian telecom provider, claim affiliation with
➝ 🇬🇧 ⚕️ More than a million patients’ details compromised after cyber attack
➝ 📊 🐛 releases new list of top 25 most dangerous software
➝ 🇷🇺 Pro-Russia DDoSia hacktivist project sees 2,400% membership increase
➝ 💻 🛡️ Browser boosts privacy with new local resources restrictions
➝ 🦠 🏦 Anatsa Banking Targeting Users in US, UK, Germany, Austria, and Switzerland
➝ 🇺🇸 💵 White House releases cybersecurity budget priorities for FY 2025
➝ 🇺🇸 🇧🇷 8Base Ransomware Spikes in Activity, Threatens U.S. and Brazilian Businesses
➝ 🇬🇧 🔐 speaks out against bill that could mandate scanning in iMessage
➝ 🇵🇭 2,700 People Tricked Into Working for Cybercrime Syndicates Rescued in
➝ 🇩🇪 ⚡️ Energy confirms data breach after MOVEit data-theft attack
➝ 🕵🏻‍♂️ 📱 , a phone tracking app spying on thousands, says it was hacked
➝ 🦠 💰 Prominent exchange infected with previously unseen Mac
➝ 🤖 📝 and ? It Starts with Summarization
➝ 🇺🇸 👨🏻‍🎓Hackers steal data of 45,000 New York City students in MOVEit breach
➝ 🇨🇦 ⛽️ Suncor Energy cyberattack impacts Petro-Canada gas stations
➝ 🦠 🕹️ Trojanized Super Mario Game Installer Spreads SupremeBot Malware
➝ 🇩🇪 💾 SSD missing from datacenter turns up on , sparking security investigation

📚 This week's recommended reading is: "Alice and Bob Learn Application Security" by @SheHacksPurple

Subscribe to the to have it piping hot in your inbox every week-end ⬇️

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-262023

YourAnonRiots, to android Japanese
@YourAnonRiots@mstdn.social avatar
kzoneind, to random
@kzoneind@mstdn.social avatar

First Eureka discovered (1990).

Birth Anniversary of English Frederick Gowland Hopkins (1861). He was co-awarded the Nobel Prize in Physiology or Medicine in 1929 for the discovery of .

Happy Birthday Nicole Kidman (1967)

Today is World .

https://knowledgezone.co.in/news

image/png

kzoneind,
@kzoneind@mstdn.social avatar

A is a small celestial body (mostly asteroids) that shares the orbit of a larger one, remaining in a stable orbit approximately 60° ahead or behind the main body.

In the Solar System, most known trojans share the orbit of Jupiter. In other planetary orbits only nine Mars trojans, 28 Neptune trojans, two Uranus trojans, and a single Earth trojan, have been found to date.

https://knowledgezone.co.in/kbits/60ced6ad9d96edb5bd3440d1

0x58, to infosec

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes, but not only:

➝ 🇺🇸 🪖 Air Force denies running simulation where AI drone “killed” its operator
➝ 🇺🇸 🏂 Snowboards discloses after February attack
➝ 🇺🇸 🧪 Enzo Biochem Attack Exposes Information of 2.5M Individuals
➝ 🧠 🤖 Introducing Charlotte AI, ’s Generative AI Security Analyst
➝ 🐍 🦠 Malicious Packages Using Compiled Code to Bypass Detection
➝ 🇰🇵 🎠 N. Korean ScarCruft Hackers Exploit LNK Files to Spread
➝ 🦠 📱 New Zero-Click Hack Targets Users with Stealthy Root-Privilege
➝ 🇷🇺 🇺🇸 says U.S. accessed thousands of phones in spy plot
➝ 🇯🇵 🚗 Discloses New Data Breach Involving Vehicle, Customer Information
➝ ☁️ 👻 Organizations Warned of ‘Ghost Sites’ Exposing Sensitive Information
➝ 🔐 👀 faces $30 million fine over Ring, Alexa violations
➝ 🔐 🧱 Active Mirai Botnet Variant Exploiting Devices for Attacks
➝ 🇷🇺 🇺🇦 Russia’s ‘Silicon Valley’ hit by cyberattack; Ukrainian group claims deep access
➝ 🦠 🤖 Found in Apps With Over 420 Million Downloads
➝ 🦠 🚪 malware spread via Google Ads for , GIMP, more
➝ 👛 Southeast Asian hacking crew racks up victims, rapidly expands criminal campaign
➝ 🍏 finds bug that lets hackers bypass SIP root restrictions
➝ 🦠 🚪 zero-day abused since 2022 to drop new malware, steal data
➝ 🇬🇷 Worst cyberattack in disrupts high school exams, causes political spat
➝ 🇮🇳 🎠 Sneaky DogeRAT Trojan Poses as Popular Apps, Targets Indian Users
➝ 🇺🇸 U.S. Department of Defense releases 2023 Cyber Strategy
➝ 📱☝🏻 New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force
➝ 🇯🇵 🎠 New GobRAT Remote Access Targeting Routers in
➝ 🦠 📂 Clever ‘File Archiver In The Browser’ phishing trick uses domains

📚 This week's recommended reading is: "Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks" by Scott J. Shapiro

Subscribe to the to have it piping hot in your inbox every Sunday ⬇️

https://0x58.substack.com/p/infosec-mashup-week-222023

pomarede, to space
@pomarede@mastodon.social avatar
pomarede,
@pomarede@mastodon.social avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • tacticalgear
  • DreamBathrooms
  • osvaldo12
  • mdbf
  • everett
  • magazineikmin
  • khanakhh
  • Youngstown
  • rosin
  • slotface
  • modclub
  • kavyap
  • tester
  • JUstTest
  • ngwrru68w68
  • thenastyranch
  • cisconetworking
  • Durango
  • ethstaker
  • InstantRegret
  • normalnudes
  • Leos
  • GTA5RPClips
  • megavids
  • cubers
  • anitta
  • lostlight
  • All magazines