прекрасная история про польский поезд, в котором есть компания производитель, установившая, по сути, некий DRM на ПО для поезда, чтобы предотвратить ремонт третьими сторонами, и польские хакеры, которые взломали этот самый ДРМ после того, как их наняли "починить" ПО. если я правильно понял цепочку, то компания-оператор поездов чинила их силами своих подрядчиков, после чего поезда переставали ездить (брикались). Из последних сил компания наняла хакеров, которые заглянули в софт и нашли закладки, блокирующие работу поездов при стороннем ремонте. Теперь компания-производитель поездов хочет подать в суд на этих хакеров. 
https://gizmodo.com/hackers-hit-with-legal-threats-after-they-fixed-a-brick-1851097424
  
  https://gizmodo.com/hackers-hit-with-legal-threats-after-they-fixed-a-brick-1851097424
Gizmodo
  
  Hackers Hit With Legal Threats After They Fixed a 'Bricked' Polish Train
  The hackers claim Polish trains were deliberately bricked by the manufacturer and they were just providing a service. “It’s DRM gone wild.”
🤣124🔥29👍11🍌3
  Psychedelic cryptography is a way of concealing messages (normally in videos) so that only people who’ve taken LSD can receive the messages.
Такая криптография нам нравится
https://qri.org/blog/psycrypto-contest
  
  Такая криптография нам нравится
https://qri.org/blog/psycrypto-contest
qri.org
  
  Non-Ordinary States of Consciousness Contest: Psychedelic Cryptography (Innovate)
  
💊83😁29❤12👍5🤔4🤮3💩3🤡2👌1🥴1
  теперь вместо секретной госпрограммы о передаче информации о пуш-уведомлениях Apple будет требовать судебный ордер или ордер об обыске — которые требуют подписи судьи. 
https://www.documentcloud.org/documents/24219266-apple-law-enforcement-guidelines-updated-december-2023#document/p19/a2415172
https://www.documentcloud.org/documents/24219266-apple-law-enforcement-guidelines-updated-december-2023#document/p19/a2415172
👏67🤡26👍12🤪4😁3🎉3❤1🤣1
  Oh no, компания, которая заявила, что может активно слушать разговоры пользователей вокруг различных устройств, спиздела, вот это неожиданность:
The company added that it does not "listen to any conversations or have access to anything beyond a third-party aggregated, anonymized and fully encrypted data set that can be used for ad placement" and "regret[s] any confusion."
Но любителей теорий заговоров разве это остановит? «А может это рептилоиды заставили теперь их опровергнуть это утверждение??? ТЫ ПОДУМАЛ ОБ ЭТОМ???»
https://arstechnica.com/gadgets/2023/12/no-a-marketing-firm-isnt-tapping-your-device-to-hear-private-conversations/
  
  The company added that it does not "listen to any conversations or have access to anything beyond a third-party aggregated, anonymized and fully encrypted data set that can be used for ad placement" and "regret[s] any confusion."
Но любителей теорий заговоров разве это остановит? «А может это рептилоиды заставили теперь их опровергнуть это утверждение??? ТЫ ПОДУМАЛ ОБ ЭТОМ???»
https://arstechnica.com/gadgets/2023/12/no-a-marketing-firm-isnt-tapping-your-device-to-hear-private-conversations/
Ars Technica
  
  Marketer sparks panic with claims it uses smart devices to eavesdrop on people
  "Real-time" listening claims were exaggerated, but the creepy factor remains.
🤡34🔥6😁5👍3❤1
  
  Информация опасносте
красивое, как с помощью Flipper Zero можно отправить айфоны в ближайшем радиусе в бесконечную перезагрузку   https://arstechnica.com/security/2023/11/flipper-zero-gadget-that-doses-iphones-takes-once-esoteric-attacks-mainstream/
Кстати, в недавно вышедшем апдейте iOS 17.2 эту проблему наконец-то исправили
🥰24👍11😭4
  MongoDB is actively investigating a security incident involving unauthorized access to certain MongoDB corporate systems, which includes exposure of customer account metadata and contact information. We detected suspicious activity on Wednesday (Dec. 13th, 2023) evening US Eastern Standard Time, immediately activated our incident response process, and believe that this unauthorized access has been going on for some period of time before discovery. At this time, we are not aware of any exposure to the data that customers store in MongoDB Atlas. Nevertheless, we recommend that customers be vigilant for social engineering and phishing attacks, activate phishing-resistant multi-factor authentication (MFA), and regularly rotate their MongoDB Atlas passwords. MongoDB will update this alert page with additional information as we continue to investigate the matter.
https://www.mongodb.com/alerts
https://www.mongodb.com/alerts
👍24🤡4❤1🔥1
  Ух
Data scraped from the servers for Apple's TestFlight service circa 2012 to 2015 have been leaked, giving access to tens of thousands of iOS apps and games.
https://www.eurogamer.net/apple-testflight-servers-from-2012-to-2015-leak-containing-terabytes-of-data
PS вряд ли там будет что-то реально ценное на сегодняшний день, учитывая смену архитектуры и прогресс с того времени, но приколы типа «невыпущенная игра Ровио» будут еще встречаться, видимо
  
  Data scraped from the servers for Apple's TestFlight service circa 2012 to 2015 have been leaked, giving access to tens of thousands of iOS apps and games.
https://www.eurogamer.net/apple-testflight-servers-from-2012-to-2015-leak-containing-terabytes-of-data
PS вряд ли там будет что-то реально ценное на сегодняшний день, учитывая смену архитектуры и прогресс с того времени, но приколы типа «невыпущенная игра Ровио» будут еще встречаться, видимо
Eurogamer.net
  
  Apple TestFlight servers from 2012 to 2015 leak, containing terabytes of data
  Data scraped from the servers for Apple's TestFlight service circa 2012 to 2015 have been leaked, giving access to tens…
🔥20🥴8👍5😁2🤡1
  Forwarded from 42 секунды
  
DTF: Утекли данные про продажи видеоигр Sony
– Студия Insomniac Games допустила крупную утечку данных
– Среди файлов утечки были данные про продажи игр Sony
– Например, продажи Bloodborne составили 7,4+ млн копий
– Продажи Ghost of Tsushima превысили тоже 7,4 млн копий
– Игра The Last of Us Remastered разошлась на 18,2 млн копий
@ftsec x 300.ya.ru
– Студия Insomniac Games допустила крупную утечку данных
– Среди файлов утечки были данные про продажи игр Sony
– Например, продажи Bloodborne составили 7,4+ млн копий
– Продажи Ghost of Tsushima превысили тоже 7,4 млн копий
– Игра The Last of Us Remastered разошлась на 18,2 млн копий
@ftsec x 300.ya.ru
👍26🔥6
  утечка данных в моей больнице, благодаря MOVEit. "извините, мы не виноваты, но лучшее, что мы можем сделать — это год мониторинга ваших данных"
"The following types of your information may have impacted: your name and MRN/patient ID, date of birth, health insurance information, provider name, treatment cost information, and treatment information/diagnosis."
"The following types of your information may have impacted: your name and MRN/patient ID, date of birth, health insurance information, provider name, treatment cost information, and treatment information/diagnosis."
🤡80🎉11😡6😁4🍾3❤2👍2👌1😇1
  Не совсем по теме канала, но интересная заявка на патент у ЦРУ :)
🌚50👀27🗿5🤬3💩2👎1🔥1🥰1🤡1
  Не знаю чем там закончилась история со «взломом» налоговой службы в россии, но теперь вот еще утверждается про взлом росводоканала
https://newsukraine.rbc.ua/news/ukrainian-hackers-breach-rosvodokanal-seize-1703107044.html
  
  https://newsukraine.rbc.ua/news/ukrainian-hackers-breach-rosvodokanal-seize-1703107044.html
RBC-Ukraine
  
  Ukrainian hackers breach Rosvodokanal, seize data of Russia's largest private water utility
  Ukrainian hackers, reportedly with support from the Security Service, sought revenge for the recent cyberattack on Kyivstar and destroyed the IT infra
🤡38❤17😁12👏4
  Если устанавливать дешевые камеры с подключением в интернет в спальне, то рано или поздно записи с этих камер окажутся в интернете 
https://e.vnexpress.net/news/crime/thousands-of-private-camera-footages-from-bedrooms-hacked-sold-online-4688865.html
  
  https://e.vnexpress.net/news/crime/thousands-of-private-camera-footages-from-bedrooms-hacked-sold-online-4688865.html
VnExpress International – Latest news, business, travel and analysis from Vietnam
  
  Bedroom camera footage hacked, sold online - VnExpress International
  Untold hours of private camera footage from bedrooms, changing rooms, toilets and massage parlors in Vietnam have been hacked and put on sale online.
🤣58😢9👍2🥰2🤯1🤬1
  Срочный патч у Barracuda по исправлению zero day, активно эксплуатируемой китайской хакерской группировкой 
https://www.bleepingcomputer.com/news/security/barracuda-fixes-new-esg-zero-day-exploited-by-chinese-hackers/
  
  https://www.bleepingcomputer.com/news/security/barracuda-fixes-new-esg-zero-day-exploited-by-chinese-hackers/
BleepingComputer
  
  Barracuda fixes new ESG zero-day exploited by Chinese hackers
  Network and email security firm Barracuda says it remotely patched all active Email Security Gateway (ESG) appliances on December 21 against a zero-day bug exploited by UNC4841 Chinese hackers.
🤔11😱2👍1🥰1
  Исходники GTA5 выложили в интернете. В архиве можно найти картинки не только из ГТА, но и из других, в том числе невыпущенных игр 
https://rockstarintel.com/gta-v-source-code-leaked-gta-6-files/
  
  https://rockstarintel.com/gta-v-source-code-leaked-gta-6-files/
RockstarINTEL
  
  GTA V source code leaked, includes GTA 6 files - RockstarINTEL
  The GTA V source code has leaked and it contains files from GTA VI and more. Due to this, a lot of misinformation has begun spreading about what it could mean for GTA online, GTA 6, Bully 2 and other titles.
🔥40❤5🤔2😢2🤡2😁1🤮1
  Кстати, вроде как Ubisoft тоже взломали на 900ГБ
https://www.xfire.com/ubisoft-confirms-new-security-breach/
  
  https://www.xfire.com/ubisoft-confirms-new-security-breach/
Xfire
  
  What does the Ubisoft breach mean for gamers?
  After Insomniac Games, Ubisoft is the latest video game developer to fall victim to another potential ransomware attack.
😁25🔥7👍5❤1🤮1
  Специалисты ЛК рассказывают об «операции триангуляция», где последовательность из 4 уязвимостей нулевого дня в iOS позволяла создать эксплойт, не требовавший участия пользователя:
• Attackers send a malicious iMessage attachment, which the application processes without showing any signs to the user.
• This attachment exploits the remote code execution vulnerability CVE-2023-41990 in the undocumented, Apple-only ADJUST TrueType font instruction. This instruction had existed since the early nineties before a patch removed it.
• It uses return/jump oriented programming and multiple stages written in the NSExpression/NSPredicate query language, patching the JavaScriptCore library environment to execute a privilege escalation exploit written in JavaScript.
• This JavaScript exploit is obfuscated to make it completely unreadable and to minimize its size. Still, it has around 11,000 lines of code, which are mainly dedicated to JavaScriptCore and kernel memory parsing and manipulation.
• It exploits the JavaScriptCore debugging feature DollarVM ($vm) to gain the ability to manipulate JavaScriptCore’s memory from the script and execute native API functions.
• It was designed to support both old and new iPhones and included a Pointer Authentication Code (PAC) bypass for exploitation of recent models.
• It uses the integer overflow vulnerability CVE-2023-32434 in XNU’s memory mapping syscalls (mach_make_memory_entry and vm_map) to obtain read/write access to the entire physical memory of the device at user level.
• It uses hardware memory-mapped I/O (MMIO) registers to bypass the Page Protection Layer (PPL). This was mitigated as CVE-2023-38606.
• After exploiting all the vulnerabilities, the JavaScript exploit can do whatever it wants to the device including running spyware, but the attackers chose to: (a) launch the IMAgent process and inject a payload that clears the exploitation artefacts from the device; (b) run a Safari process in invisible mode and forward it to a web page with the next stage.
• The web page has a script that verifies the victim and, if the checks pass, receives the next stage: the Safari exploit.
• The Safari exploit uses CVE-2023-32435 to execute a shellcode.
• The shellcode executes another kernel exploit in the form of a Mach object file. It uses the same vulnerabilities: CVE-2023-32434 and CVE-2023-38606. It is also massive in terms of size and functionality, but completely different from the kernel exploit written in JavaScript. Certain parts related to exploitation of the above-mentioned vulnerabilities are all that the two share. Still, most of its code is also dedicated to parsing and manipulation of the kernel memory. It contains various post-exploitation utilities, which are mostly unused.
• The exploit obtains root privileges and proceeds to execute other stages, which load spyware. We covered these stages in our previous posts.
https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/
  
  • Attackers send a malicious iMessage attachment, which the application processes without showing any signs to the user.
• This attachment exploits the remote code execution vulnerability CVE-2023-41990 in the undocumented, Apple-only ADJUST TrueType font instruction. This instruction had existed since the early nineties before a patch removed it.
• It uses return/jump oriented programming and multiple stages written in the NSExpression/NSPredicate query language, patching the JavaScriptCore library environment to execute a privilege escalation exploit written in JavaScript.
• This JavaScript exploit is obfuscated to make it completely unreadable and to minimize its size. Still, it has around 11,000 lines of code, which are mainly dedicated to JavaScriptCore and kernel memory parsing and manipulation.
• It exploits the JavaScriptCore debugging feature DollarVM ($vm) to gain the ability to manipulate JavaScriptCore’s memory from the script and execute native API functions.
• It was designed to support both old and new iPhones and included a Pointer Authentication Code (PAC) bypass for exploitation of recent models.
• It uses the integer overflow vulnerability CVE-2023-32434 in XNU’s memory mapping syscalls (mach_make_memory_entry and vm_map) to obtain read/write access to the entire physical memory of the device at user level.
• It uses hardware memory-mapped I/O (MMIO) registers to bypass the Page Protection Layer (PPL). This was mitigated as CVE-2023-38606.
• After exploiting all the vulnerabilities, the JavaScript exploit can do whatever it wants to the device including running spyware, but the attackers chose to: (a) launch the IMAgent process and inject a payload that clears the exploitation artefacts from the device; (b) run a Safari process in invisible mode and forward it to a web page with the next stage.
• The web page has a script that verifies the victim and, if the checks pass, receives the next stage: the Safari exploit.
• The Safari exploit uses CVE-2023-32435 to execute a shellcode.
• The shellcode executes another kernel exploit in the form of a Mach object file. It uses the same vulnerabilities: CVE-2023-32434 and CVE-2023-38606. It is also massive in terms of size and functionality, but completely different from the kernel exploit written in JavaScript. Certain parts related to exploitation of the above-mentioned vulnerabilities are all that the two share. Still, most of its code is also dedicated to parsing and manipulation of the kernel memory. It contains various post-exploitation utilities, which are mostly unused.
• The exploit obtains root privileges and proceeds to execute other stages, which load spyware. We covered these stages in our previous posts.
https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/
Securelist
  
  Operation Triangulation: The last (hardware) mystery
  Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.
🔥46🤯32😁7❤6👍4💅2👎1🍓1
  подборка самых крупных кибератак прошедшего года 
https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/
  
  https://www.bleepingcomputer.com/news/security/the-biggest-cybersecurity-and-cyberattack-stories-of-2023/
BleepingComputer
  
  The biggest cybersecurity and cyberattack stories of 2023
  2023 was a big year for cybersecurity, with significant cyberattacks, data breaches, new threat groups emerging, and, of course, zero-day vulnerabilities.
😱14🔥6👍2
  интересная тема про экплойт, позволяющий "оживлять" протухшие куки Google и получать доступ к аккаунту, даже если пользователь изменил пароль
https://www.infostealers.com/article/the-0-day-all-infostealer-groups-are-exploiting/
https://medium.com/@DeputyDog/breaking-through-the-infostealer-exploit-and-the-enigma-of-cookie-restoration-e03e6e3cda50
  
  https://www.infostealers.com/article/the-0-day-all-infostealer-groups-are-exploiting/
https://medium.com/@DeputyDog/breaking-through-the-infostealer-exploit-and-the-enigma-of-cookie-restoration-e03e6e3cda50
InfoStealers
  
  The Google 0-day all Infostealer groups are exploiting.
  Today, even despite attempts to alert Google over a month ago that there is an ongoing 0-day being exploited by Infostealer groups.
🔥40🤬24😱20✍2👍2🍾2❤1😁1🤔1
  