Если устанавливать дешевые камеры с подключением в интернет в спальне, то рано или поздно записи с этих камер окажутся в интернете
https://e.vnexpress.net/news/crime/thousands-of-private-camera-footages-from-bedrooms-hacked-sold-online-4688865.html
https://e.vnexpress.net/news/crime/thousands-of-private-camera-footages-from-bedrooms-hacked-sold-online-4688865.html
VnExpress International – Latest news, business, travel and analysis from Vietnam
Bedroom camera footage hacked, sold online - VnExpress International
Untold hours of private camera footage from bedrooms, changing rooms, toilets and massage parlors in Vietnam have been hacked and put on sale online.
🤣58😢9👍2🥰2🤯1🤬1
Срочный патч у Barracuda по исправлению zero day, активно эксплуатируемой китайской хакерской группировкой
https://www.bleepingcomputer.com/news/security/barracuda-fixes-new-esg-zero-day-exploited-by-chinese-hackers/
https://www.bleepingcomputer.com/news/security/barracuda-fixes-new-esg-zero-day-exploited-by-chinese-hackers/
BleepingComputer
Barracuda fixes new ESG zero-day exploited by Chinese hackers
Network and email security firm Barracuda says it remotely patched all active Email Security Gateway (ESG) appliances on December 21 against a zero-day bug exploited by UNC4841 Chinese hackers.
🤔11😱2👍1🥰1
Исходники GTA5 выложили в интернете. В архиве можно найти картинки не только из ГТА, но и из других, в том числе невыпущенных игр
https://rockstarintel.com/gta-v-source-code-leaked-gta-6-files/
https://rockstarintel.com/gta-v-source-code-leaked-gta-6-files/
RockstarINTEL
GTA V source code leaked, includes GTA 6 files - RockstarINTEL
The GTA V source code has leaked and it contains files from GTA VI and more. Due to this, a lot of misinformation has begun spreading about what it could mean for GTA online, GTA 6, Bully 2 and other titles.
🔥40❤5🤔2😢2🤡2😁1🤮1
Кстати, вроде как Ubisoft тоже взломали на 900ГБ
https://www.xfire.com/ubisoft-confirms-new-security-breach/
https://www.xfire.com/ubisoft-confirms-new-security-breach/
Xfire
What does the Ubisoft breach mean for gamers?
After Insomniac Games, Ubisoft is the latest video game developer to fall victim to another potential ransomware attack.
😁25🔥7👍5❤1🤮1
Специалисты ЛК рассказывают об «операции триангуляция», где последовательность из 4 уязвимостей нулевого дня в iOS позволяла создать эксплойт, не требовавший участия пользователя:
• Attackers send a malicious iMessage attachment, which the application processes without showing any signs to the user.
• This attachment exploits the remote code execution vulnerability CVE-2023-41990 in the undocumented, Apple-only ADJUST TrueType font instruction. This instruction had existed since the early nineties before a patch removed it.
• It uses return/jump oriented programming and multiple stages written in the NSExpression/NSPredicate query language, patching the JavaScriptCore library environment to execute a privilege escalation exploit written in JavaScript.
• This JavaScript exploit is obfuscated to make it completely unreadable and to minimize its size. Still, it has around 11,000 lines of code, which are mainly dedicated to JavaScriptCore and kernel memory parsing and manipulation.
• It exploits the JavaScriptCore debugging feature DollarVM ($vm) to gain the ability to manipulate JavaScriptCore’s memory from the script and execute native API functions.
• It was designed to support both old and new iPhones and included a Pointer Authentication Code (PAC) bypass for exploitation of recent models.
• It uses the integer overflow vulnerability CVE-2023-32434 in XNU’s memory mapping syscalls (mach_make_memory_entry and vm_map) to obtain read/write access to the entire physical memory of the device at user level.
• It uses hardware memory-mapped I/O (MMIO) registers to bypass the Page Protection Layer (PPL). This was mitigated as CVE-2023-38606.
• After exploiting all the vulnerabilities, the JavaScript exploit can do whatever it wants to the device including running spyware, but the attackers chose to: (a) launch the IMAgent process and inject a payload that clears the exploitation artefacts from the device; (b) run a Safari process in invisible mode and forward it to a web page with the next stage.
• The web page has a script that verifies the victim and, if the checks pass, receives the next stage: the Safari exploit.
• The Safari exploit uses CVE-2023-32435 to execute a shellcode.
• The shellcode executes another kernel exploit in the form of a Mach object file. It uses the same vulnerabilities: CVE-2023-32434 and CVE-2023-38606. It is also massive in terms of size and functionality, but completely different from the kernel exploit written in JavaScript. Certain parts related to exploitation of the above-mentioned vulnerabilities are all that the two share. Still, most of its code is also dedicated to parsing and manipulation of the kernel memory. It contains various post-exploitation utilities, which are mostly unused.
• The exploit obtains root privileges and proceeds to execute other stages, which load spyware. We covered these stages in our previous posts.
https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/
• Attackers send a malicious iMessage attachment, which the application processes without showing any signs to the user.
• This attachment exploits the remote code execution vulnerability CVE-2023-41990 in the undocumented, Apple-only ADJUST TrueType font instruction. This instruction had existed since the early nineties before a patch removed it.
• It uses return/jump oriented programming and multiple stages written in the NSExpression/NSPredicate query language, patching the JavaScriptCore library environment to execute a privilege escalation exploit written in JavaScript.
• This JavaScript exploit is obfuscated to make it completely unreadable and to minimize its size. Still, it has around 11,000 lines of code, which are mainly dedicated to JavaScriptCore and kernel memory parsing and manipulation.
• It exploits the JavaScriptCore debugging feature DollarVM ($vm) to gain the ability to manipulate JavaScriptCore’s memory from the script and execute native API functions.
• It was designed to support both old and new iPhones and included a Pointer Authentication Code (PAC) bypass for exploitation of recent models.
• It uses the integer overflow vulnerability CVE-2023-32434 in XNU’s memory mapping syscalls (mach_make_memory_entry and vm_map) to obtain read/write access to the entire physical memory of the device at user level.
• It uses hardware memory-mapped I/O (MMIO) registers to bypass the Page Protection Layer (PPL). This was mitigated as CVE-2023-38606.
• After exploiting all the vulnerabilities, the JavaScript exploit can do whatever it wants to the device including running spyware, but the attackers chose to: (a) launch the IMAgent process and inject a payload that clears the exploitation artefacts from the device; (b) run a Safari process in invisible mode and forward it to a web page with the next stage.
• The web page has a script that verifies the victim and, if the checks pass, receives the next stage: the Safari exploit.
• The Safari exploit uses CVE-2023-32435 to execute a shellcode.
• The shellcode executes another kernel exploit in the form of a Mach object file. It uses the same vulnerabilities: CVE-2023-32434 and CVE-2023-38606. It is also massive in terms of size and functionality, but completely different from the kernel exploit written in JavaScript. Certain parts related to exploitation of the above-mentioned vulnerabilities are all that the two share. Still, most of its code is also dedicated to parsing and manipulation of the kernel memory. It contains various post-exploitation utilities, which are mostly unused.
• The exploit obtains root privileges and proceeds to execute other stages, which load spyware. We covered these stages in our previous posts.
https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/
Securelist
Operation Triangulation: The last (hardware) mystery
Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.
🔥46🤯32😁7❤6👍4💅2👎1🍓1
подборка самых крупных кибератак прошедшего года
https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/
https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/
BleepingComputer
The biggest cybersecurity and cyberattack stories of 2023
2023 was a big year for cybersecurity, with significant cyberattacks, data breaches, new threat groups emerging, and, of course, zero-day vulnerabilities.
😱14🔥6👍2
интересная тема про экплойт, позволяющий "оживлять" протухшие куки Google и получать доступ к аккаунту, даже если пользователь изменил пароль
https://www.infostealers.com/article/the-0-day-all-infostealer-groups-are-exploiting/
https://medium.com/@DeputyDog/breaking-through-the-infostealer-exploit-and-the-enigma-of-cookie-restoration-e03e6e3cda50
https://www.infostealers.com/article/the-0-day-all-infostealer-groups-are-exploiting/
https://medium.com/@DeputyDog/breaking-through-the-infostealer-exploit-and-the-enigma-of-cookie-restoration-e03e6e3cda50
InfoStealers
The Google 0-day all Infostealer groups are exploiting.
Today, even despite attempts to alert Google over a month ago that there is an ongoing 0-day being exploited by Infostealer groups.
🔥40🤬24😱20✍2👍2🍾2❤1😁1🤔1
Про взлом Киевстара
The attack wiped "almost everything", including thousands of virtual servers and PCs, he said, describing it as probably the first example of a destructive cyberattack that "completely destroyed the core of a telecoms operator."
During its investigation, the SBU found the hackers probably attempted to penetrate Kyivstar in March or earlier, he said in a Zoom interview on Dec. 27.
https://www.reuters.com/world/europe/russian-hackers-were-inside-ukraine-telecoms-giant-months-cyber-spy-chief-2024-01-04/
The attack wiped "almost everything", including thousands of virtual servers and PCs, he said, describing it as probably the first example of a destructive cyberattack that "completely destroyed the core of a telecoms operator."
During its investigation, the SBU found the hackers probably attempted to penetrate Kyivstar in March or earlier, he said in a Zoom interview on Dec. 27.
https://www.reuters.com/world/europe/russian-hackers-were-inside-ukraine-telecoms-giant-months-cyber-spy-chief-2024-01-04/
Reuters
Exclusive: Russian hackers were inside Ukraine telecoms giant for months
Russian hackers were inside Ukrainian telecoms giant Kyivstar's system from at least May last year in a cyberattack that should serve as a "big warning" to the West, Ukraine's cyber spy chief told Reuters.
😱44👍25👏18🤬12❤🔥6🎉4🤣4❤3😁3🍾2🤝1
Вот кстати тоже про мобильного оператора, взлом и слабый пароль
https://www.infostealers.com/article/infostealer-infection-of-an-orange-employee-results-in-bgp-disruptions/
https://arstechnica.com/security/2024/01/a-ridiculously-weak-password-causes-disaster-for-spains-no-2-mobile-carrier/
https://www.infostealers.com/article/infostealer-infection-of-an-orange-employee-results-in-bgp-disruptions/
https://arstechnica.com/security/2024/01/a-ridiculously-weak-password-causes-disaster-for-spains-no-2-mobile-carrier/
InfoStealers
Infostealer infection of an Orange employee results in BGP disruptions
Using the stolen account, the threat actor modified the AS number belonging to Orange’s IP address, resulting in major disruptions
👍13🌚4
Хакерская группировка Kiborg выложила в открытый доступ полную клиентскую базу «Альфа-Банка», заметили «Важные истории». Доступ к этим данным хакеры получили в октябре 2023 года. Тогда Kiborg опубликовали информацию о 44 тыс. клиентов.
https://storage.googleapis.com/istories/news/2024/01/08/khakeri-opublikovali-lichnie-dannie-bolee-20-millionov-klientov-alfa-banka/index.html
https://storage.googleapis.com/istories/news/2024/01/08/khakeri-opublikovali-lichnie-dannie-bolee-20-millionov-klientov-alfa-banka/index.html
Googleapis
Хакеры опубликовали личные данные более 20 миллионов клиентов «Альфа-Банка»
В утечке содержатся номера телефонов, карт и счетов пользователей
🔥83👍12💩10🤔6🤡4🥰3💔2🤮1🗿1
гаечный ключ, подключенный к сети. казалось бы, что может пойти не так. все, если в устройстве обнаружить 20+ уязвимостей
https://www.nozominetworks.com/blog/vulnerabilities-on-bosch-rexroth-nutrunners
https://www.nozominetworks.com/blog/vulnerabilities-on-bosch-rexroth-nutrunners
Nozominetworks
Vulnerabilities on Bosch Rexroth Nutrunners May Be Abused to Stop Production Lines, Tamper with Safety-Critical Tightenings
New vulnerabilities discovered in the Bosch Rexroth NXA015S-36V-B, a popular smart nutrunner used in automotive production lines, may halt production or compromise safety.
😁74🤡22👍6🔥5❤2💩2🤮1🐳1
Apple выпустила обновление прошивки для bluetooth клавиатуры, исправляющей уязвимость, которая позволяла при физическом доступе к клавиатуре получить ключ спаривания bluetooth. Об этой проблеме в Bluetooth известно вроде как чуть ли не с 2012 года
https://support.apple.com/en-us/HT214050
Google для своих устройств обновление выпустила в начале декабря
https://source.android.com/docs/security/bulletin/2023-12-01
https://www.theregister.com/2023/12/06/bluetooth_bug_apple_linux/
https://support.apple.com/en-us/HT214050
Google для своих устройств обновление выпустила в начале декабря
https://source.android.com/docs/security/bulletin/2023-12-01
https://www.theregister.com/2023/12/06/bluetooth_bug_apple_linux/
Apple Support
About the security content of Magic Keyboard Firmware Update 2.0.6
This document describes the security content of Magic Keyboard Firmware Update 2.0.6.
👍15🤯12❤1
Хакеры взломали чатбота, который проводил интервью кандидатов на позиции в ресторанах фастфуда, и могли принимать или отклонять кандидатов
https://www.404media.co/hackers-break-into-hiring-ai-chat-bot-chattr/
https://www.404media.co/hackers-break-into-hiring-ai-chat-bot-chattr/
404 Media
Hackers Break into AI Hiring Chatbot, Could Hire and Reject Fast Food Applicants
Chat logs sent to 404 Media show the chatbot automatically denying at least one applicant on certain criteria.
😁49👍8❤3🥰2👾1
надеюсь, история вокруг уязвимости в Apple AirDrop наберет достаточно оборотов для того, чтобы они там в Купертино пошевелили булками. уязвимость заключается в том, что при передаче информации между устройствами через AirDrop есть возможность выяснить номер телефона и адрес электронной почты отправителя. в новостях пишут, что эта уязвимость эксплуатируется госорганами в Китае для идентификации отправителей “нежелательной” информации.
https://www.usenix.org/system/files/sec21fall-heinrich.pdf
https://privatedrop.github.io
https://www.bloomberg.com/news/articles/2024-01-09/china-says-cracked-apple-s-airdrop-to-identify-message-sources
кроме этого, исследователи утверждают, что Apple знала об этой уязвимости еще в 2019 году
https://www.cnn.com/2024/01/12/tech/china-apple-airdrop-user-encryption-vulnerability-hnk-intl
https://www.usenix.org/system/files/sec21fall-heinrich.pdf
https://privatedrop.github.io
https://www.bloomberg.com/news/articles/2024-01-09/china-says-cracked-apple-s-airdrop-to-identify-message-sources
кроме этого, исследователи утверждают, что Apple знала об этой уязвимости еще в 2019 году
https://www.cnn.com/2024/01/12/tech/china-apple-airdrop-user-encryption-vulnerability-hnk-intl
🤬44🥰5😁3❤2🍾2🗿2🤮1🤡1
GitLab 10/10
The most critical security issue GitLab patched has the maximum severity score (10 out of 10) and is being tracked as CVE-2023-7028. Successful exploitation does not require any interaction.
https://www.bleepingcomputer.com/news/security/gitlab-warns-of-critical-zero-click-account-hijacking-vulnerability/
The most critical security issue GitLab patched has the maximum severity score (10 out of 10) and is being tracked as CVE-2023-7028. Successful exploitation does not require any interaction.
https://www.bleepingcomputer.com/news/security/gitlab-warns-of-critical-zero-click-account-hijacking-vulnerability/
BleepingComputer
GitLab warns of critical zero-click account hijacking vulnerability
GitLab has released security updates for both the Community and Enterprise Edition to address two critical vulnerabilities, one of them allowing account hijacking with no user interaction.
🤡40😱29🤯8🫡6🤮2💩1
первый zero day в Chrome в этом году
Google is aware of reports that an exploit for CVE-2024-0519 exists in the wild.
https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html
Google is aware of reports that an exploit for CVE-2024-0519 exists in the wild.
https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html
Chrome Releases
Stable Channel Update for Desktop
The Stable channel has been updated to 120.0.6099.234 for Mac and 120.0.6099.224 for Linux and 120.0.6099.224/225 to Windows which will roll...
🎉37🤷♂9😢4🤷♀2🥰2🍾1
уязвимости в UEFI прошивке пятерки крупнейших производителей, использующих TianoCore EDK II, позволяют злоумышленникам при наличии доступа к сети заражать устройства вредоносным ПО на уровне прошивки. Опасносте сервера, которые используют PXE — Preboot Execution Environment — когда он настроен использовать IPv6.
отчет
https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
код
https://github.com/quarkslab/pixiefail
отчет
https://blog.quarkslab.com/pixiefail-nine-vulnerabilities-in-tianocores-edk-ii-ipv6-network-stack.html
код
https://github.com/quarkslab/pixiefail
Quarkslab
PixieFail: Nine vulnerabilities in Tianocore's EDK II IPv6 network stack. - Quarkslab's blog
This blog post provides details about nine vulnerabilities affecting the IPv6 network protocol stack of EDK II, TianoCore's open source reference implementation of UEFI.
😱45🤯11🌚5👍3😁3🤔1🥱1🗿1
The Microsoft security team detected a nation-state attack on our corporate systems on January 12, 2024, and immediately activated our response process to investigate, disrupt malicious activity, mitigate the attack, and deny the threat actor further access. Microsoft has identified the threat actor as Midnight Blizzard, the Russian state-sponsored actor also known as Nobelium. As part of our ongoing commitment to responsible transparency as recently affirmed in our Secure Future Initiative (SFI), we are sharing this update.
https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/
https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/
👏27😁19🤡11🤬4😢2🎉2🍾2❤1❤🔥1👍1😐1