Forwarded from cRyPtHoNβ’ INFOSEC (EN)
Magecart gang arrested in Indonesia.
First-ever arrest of a Magecart hacker gang
Interpol and Indonesian police have arrested three men on suspicion of being part of a cybercrime group engaged in Magecart attacks.
"Group-IB Cyber Investigations team determined that some of the GetBilling's infrastructure was located in Indonesia," the company said in a press release today. "Upon discovery of this information, INTERPOL's ASEAN Desk promptly notified Indonesian cyber police."
ZDNet - HERE / Interpol - HERE
Read Via Telegram
#oscp #iocteams #spread #snortteams
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@NoGoolag
First-ever arrest of a Magecart hacker gang
Interpol and Indonesian police have arrested three men on suspicion of being part of a cybercrime group engaged in Magecart attacks.
"Group-IB Cyber Investigations team determined that some of the GetBilling's infrastructure was located in Indonesia," the company said in a press release today. "Upon discovery of this information, INTERPOL's ASEAN Desk promptly notified Indonesian cyber police."
ZDNet - HERE / Interpol - HERE
Read Via Telegram
#oscp #iocteams #spread #snortteams
π‘@cRyPtHoN_INFOSEC_EN
π‘@cRyPtHoN_INFOSEC_DE
π‘@NoGoolag
Forwarded from cRyPtHoNβ’ INFOSEC (EN)
Vulnerability Spotlight: Use-after-free vulnerability in Google Chrome WebGL could lead to code execution.
The Google Chrome web browser contains a use-after-free vulnerability in its WebGL component that could allow a user to execute arbitrary code in the context of the browser process. This vulnerability specifically exists in ANGLE, a compatibility layer between OpenGL and Direct3D that Chrome uses on Windows systems. An adversary could manipulate the memory layout of the browser in a way that they could gain control of the use-after-free exploit, which could ultimately lead to arbitrary code execution.
In accordance with our coordinated disclosure policy, Cisco Talos worked with Google to ensure that these issues are resolved and that an update is available for affected customers.
https://blog.talosintelligence.com/2020/08/vuln-spotlight-chrome-use-free-aug-2020.html
#oscp #iocteams #spread #snortteams
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag
The Google Chrome web browser contains a use-after-free vulnerability in its WebGL component that could allow a user to execute arbitrary code in the context of the browser process. This vulnerability specifically exists in ANGLE, a compatibility layer between OpenGL and Direct3D that Chrome uses on Windows systems. An adversary could manipulate the memory layout of the browser in a way that they could gain control of the use-after-free exploit, which could ultimately lead to arbitrary code execution.
In accordance with our coordinated disclosure policy, Cisco Talos worked with Google to ensure that these issues are resolved and that an update is available for affected customers.
https://blog.talosintelligence.com/2020/08/vuln-spotlight-chrome-use-free-aug-2020.html
#oscp #iocteams #spread #snortteams
π‘@cRyPtHoN_INFOSEC_DE
π‘@cRyPtHoN_INFOSEC_EN
π‘@BlackBox_Archiv
π‘@NoGoolag