avoidthehack, to android

GravityRAT now steals your WhatsApp backups

Be careful of what apps you download - whether from the Google Play store, a third-party repo, or an apk from a website.

https://www.bleepingcomputer.com/news/security/android-gravityrat-malware-now-steals-your-whatsapp-backups/

avoidthehack, to Cybersecurity

New ‘Shampoo’ Chromeloader malware pushed via fake warez sites

> pirate sites
> hosting ChromeLoader (Shampoo)
> force installs extensions
> user cannot uninstall extensions
> searches hijacked, points to sketch results

User beware.

https://www.bleepingcomputer.com/news/security/new-shampoo-chromeloader-malware-pushed-via-fake-warez-sites/

avoidthehack, to windows

Fake zero-day PoC exploits on GitHub push ,

"Hackers are impersonating cybersecurity researchers on Twitter and GitHub to publish fake proof-of-concept exploits for zero-day vulnerabilities that infect Windows and Linux with malware."

Careful what you find, download, and execute from GitHub on your machine.

https://www.bleepingcomputer.com/news/security/fake-zero-day-poc-exploits-on-github-push-windows-linux-malware/

avoidthehack, to random

What are you exposing to the web?

Fingerprinting uses many different methods to pull unique characteristics about your device/browser - especially since browsers tend to be "leaky."

So, what is your device/browser sharing? This page gives you an idea.

https://personaldata.info/

avoidthehack, to infosec

Over 60,000 apps secretly installed for past six months

Fake security software - to include (not limited to) , game cheats, Netflix, and other utility apps. These in particular not directly found in the Google Play store.

Be wary when installing new apps - whether from the Google Play store or manually via APK.

https://www.bleepingcomputer.com/news/security/over-60-000-android-apps-secretly-installed-adware-for-past-six-months/

avoidthehack, to infosec

Ask Fitis, the Bear: Real Crooks Sign Their

Default thinking (and the intention of digital signing) should, in theory, "guarantee" the identity of developers/vendors of

Threat actors can use code signing certs to bypass common detection mechanisms - AKA your .

So, if it's signed, is it safe? Depends.

@briankrebs

https://krebsonsecurity.com/2023/06/ask-fitis-the-bear-real-crooks-sign-their-malware/

Lockdownyourlife, to random

News reporter: We interviewed the girlfriend but she asked we not use her name. Proceeds to show her face on the news.

Me: Well shit. 🤦‍♀️

ianonymous3000, to privacy
@ianonymous3000@mastodon.social avatar

Privacy concerns of Popular email providers like Gmail, Yahoo, & Outlook:

  • Data collection
  • Targeted advertising
  • 3rd party access
  • Government surveillance etc.

Reviewing #privacy policies is crucial. #cybersecurityawareness #opsec

https://inv.riverside.rocks/watch?v=7kNdbgUn6hw @skiff

avoidthehack, to infosec

More malicious extensions in Web Store

At least 18 different malicious extensions (as of 30 MAY and this post) identified by @WPalant

Remember extensions have privileged access to the browser (and data in the browser). Choose your extensions wisely... they could be or in disguise.

https://palant.info/2023/05/31/more-malicious-extensions-in-chrome-web-store/

avoidthehack, to infosec

QBot abuses WordPad EXE to infect devices

Hijacks the wordpad DLL to evade detection by software like Windows defender. Typically spread via emails.

A good practice is to never open unsolicited attachments and to verify attachments with the sender via an on-out-of-band method, like a phone call.

https://www.bleepingcomputer.com/news/security/qbot-malware-abuses-windows-wordpad-exe-to-infect-devices/

mattblaze, to random
@mattblaze@federate.social avatar

Something must be in the water, because I just got ANOTHER flare up of people asking me about Faraday bags to prevent phone tracking.

Short answer: A Faraday bag probably doesn't solve your problem; they require great care to use effectively. and your phone can be tracked as soon as you remove it.

But if you DO need one, you want one that actually works. Here's a short writeup I did a while back on the theory and practice of testing them:

https://www.mattblaze.org/blog/faraday/

TL;DR: Science is fun.

bytebro,

@mattblaze OK, . You are about to put phone into the bag. You've switched it off. If the phone has been subverted, I'm guessing that it is not actually possible to disable mics etc (without smashing the phone against a hard thing, - see the book Attack Surface!)
So, what does one do? Just leave phone in bag in the other room?

avoidthehack, to random

Interview With a Investment Spammer

In light of the crypto spam campaigns that targeted various Mastodon communities.From @briankrebs

https://krebsonsecurity.com/2023/05/interview-with-a-crypto-scam-investment-spammer/

kkarhan, to infosec

For those interested in , , & :

is the enemy!
is not your friend!
is your Ally!

avoidthehack, to infosec

Now Lets US Users Search Dark Web for Their ID

Data breaches usually are the source for this type of information being out there. It's good to know what data of yours is already leaked.

https://www.securityweek.com/google-now-lets-us-users-search-dark-web-for-their-gmail-id/

fs0c131y, to random

C’était un plaisir de parler , et de @PredictaLabOff lors de cette 1er édition du .

image/jpeg
image/jpeg
image/jpeg

radaid, to random Polish

Wracając do naszych fizyczych ciał.
Chwytajcie bardzo dobry poradnik na temat interakcji z policją. Must read przed wyjściem na akcje bezpośrednią.
Poradnik "Odmawiam składania wyjaśnień " od ACK Warszawa.
Do przeczytania tutaj ----> https://pl.anarchistlibraries.net/library/ack-warszawa-odmawiam-skladania-wyjasnien

avoidthehack, to random

Update: The Swedish authorities answered our protocol request

Mullvad @mullvadnet gives update on what they learned regarding the attempted search warrant execution they were subject to in mid-April 2023.

https://mullvad.net/en/blog/2023/5/2/update-the-swedish-authorities-answered-our-protocol-request/

hydrox, to infosec

If you get a sales call about your information security stack, you really don't have to answer their questions about what you are using today.

I bet if I cold-called 100 companies I would have solid information about to attack 75% of them by just pretending to sell them a fake product and asking them what they are using currently and why.

mitexleo, (edited ) to fediverse

Have you turned on 2FA Authentication on your fediverse accounts ?

rml, to infosec

Are there any interesting or offensive security reports on cracking or ? I've always been curious what kind of challenges it would present in practice/how much difficulty the immutable store and containerization of packages would really pose, or if there are minor faults throughout the codebase they can easily be tracked down and exploit for professionals. But haven't found any good posts on the matter.

esther, to random

Pretty good security advice for activists on the latest Renegade Cut video. Some of it may feel “paranoid” to the average person but it does make sense to take these steps as an activist who runs a high risk of clashing with law enforcement.

https://youtu.be/TWDUzSToXO0

Some of it isn’t realistically possible in some countries, e.g. you can’t get a SIM card from a store without formal identification. A lot of these precautions are also pretty expensive, although some have DIY alternatives.

I’d add one thing he doesn’t mention: don’t carry your burner phone and your everyday phone together while both are active. It’s easy to correlate the two devices when they share enough of a movement profile. Turn your burner phone off (fully disconnected like described in the video) far enough away from your home and workplace so it’s not correlated to where you live.

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

I recently took a look at Mandiant's yearly M-Trends report (link https://cyberplace.social/@GossiTheDog/110220117253124508 ), so I decided to have a look at Sophos' yearly Sophos X-Ops Incident Response report.

Thread time!

The results are very similar to Mandiant's finding at a top line. E.g. dwell time is down, and your data will get stolen by ransomware groups.

https://news.sophos.com/en-us/2023/04/25/2023-active-adversary-report-for-business-leaders/

kkarhan,

@GossiTheDog nodds in agreement

Instead of , use structural , , & to make attacks not only hard to plan and execute, but also hard to be successful.

Unless one's facing state-sponsored attackers with basically unlimited personnel hours and computing power at their disposal, most organizations will already be "unattractive to target" with too high risk and too low reward if they refuse to use shitty bloatware and unmaintainable CCSS in their .

simplenomad, to random
@simplenomad@rigor-mortis.nmrc.org avatar

The nerd part of me was quite pleased when the recently installed smart blinds in the kitchen automagically closed at sunset last night, and opened to 50% at sunrise this morning. So whether I am home or not, between this and lighting it looks like to the outside world I am home. Also, think of the literal SECONDS I save! More time to install and configure more automations I guess.

dantemercurio, to infosec
@dantemercurio@ioc.exchange avatar

Interesting analysis of Chinese and Russian influence operations through the lens of the recent DOJ indictments. Details include tutorials on how to setup accounts on multiple social networks, tools to gain followers, and measures on how to avoid platform detection.

https://memeticwarfareweekly.substack.com/p/enter-the-912-working-group-34-indictments

igd_news, to tech

"Our enemies have great capabilities and perfected tactics. On their side they have the police and justice systems, the scientists and technocrats, and in some cases the support of the general population. They control vast infrastructure networks. They have infinite memory, archives and DNA databases.

On our side, we have the informal and decentralized nature of our organizations, shadows to hide in, and solidarity to help each other in difficult times, to continue the fights of comrades who cannot do so anymore."

https://itsgoingdown.org/surveillance-bulletin-1/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • cisconetworking
  • mdbf
  • thenastyranch
  • magazineikmin
  • khanakhh
  • rosin
  • Durango
  • ethstaker
  • Youngstown
  • slotface
  • osvaldo12
  • kavyap
  • DreamBathrooms
  • provamag3
  • ngwrru68w68
  • GTA5RPClips
  • InstantRegret
  • tacticalgear
  • modclub
  • everett
  • anitta
  • Leos
  • cubers
  • tester
  • normalnudes
  • megavids
  • lostlight
  • All magazines