HAQ.NEWS

// Jared Folkins

# Latest Podcast

Description

Reversing Soviet era computers chips, Awesome GPT Agents, and espionage by Islamic Revolutionary Guard Corps' are the top three links for me today.

Tradecraft

[#] The GitHub repository "Awesome-GPT-Agents" is a collection of generative pre-trained transformer (GPT) models specialized in various aspects of cybersecurity, from penetration testing to threat intelligence, and requires a ChatGPT Plus subscription for usage as of November 11, 2023.
https://github.com/fr0gger/Awesome-GPT-Agents
[#] The document is a comprehensive guide for understanding and executing modern post-exploitation techniques to compromise and defend Active Directory, including tactics for discovery, privilege escalation, lateral movement, persistence, and detection.
https://github.com/infosecn1nja/AD-Attack-Defense
[#] The post explores Chrome browser exploitation by delving into the V8 JavaScript engine's intricate internals and memory management to understand and expose potential security vulnerabilities.
https://jhalon.github.io/chrome-browser-exploitation-1/
[#] A security researcher under the alias 5pider details the design of a new form of position-independent malware implant that avoids the use of reflective DLL loaders, includes global variables, and incorporates compile-time hashing for obfuscation.
https://5pider.net/blog/2024/01/27/modern-shellcode-implant-design/
[#] Ken Shirriff's blog offers a detailed walkthrough of reverse-engineering CMOS circuits using a vintage Soviet counter chip as a practical example, explaining how to identify transistor types and their configurations to understand and replicate the chip's logic gates and flip-flops.
http://www.righto.com/2024/01/reverse-engineering-cmos.html
[#] The GitHub repository azureOutlookC2 details a command and control (C2) tool using Microsoft Graph API to remotely control compromised Windows devices via an Outlook mailbox, originally developed as a threat emulation for North Korean APT group InkySquid/ScarCruft/APT37.
https://github.com/boku7/azureOutlookC2
[#] The exploit provided identifies and exploits open /.svn/wc.db files to retrieve the source code of vulnerable web applications and is intended for educational use or authorized penetration testing only.
https://github.com/Praison001/Source-code-via-open-wc.db-file
[#] A new tool named ExecIT functions as an evasive loader using DLLs to deploy shellcode without tripping security flags, despite rundll32.exe being a common execution point monitored by Windows security mechanisms.
https://www.reddit.com/r/netsec/comments/1aczvyw/execit_evasive_dllbased_shellcode_loader/
[#] Tiny Scan is a versatile web analysis tool that allows users to gather detailed information about a URL's infrastructure, performance, and content, with features such as customizable User-Agent strings, language preferences, and HTTP header settings, and it provides insights like IP location, technology stack details, and SSL certificate status, aiding in tasks from SEO optimization to security assessments.
https://www.tiny-scan.com/
[#] Raven is a CI/CD security analysis tool by Cycode Labs, which scans GitHub Actions workflows, identifies vulnerabilities, and uses Neo4j for data visualization, with the aim of improving security practices in software development pipelines.
http://www.kitploit.com/2024/01/raven-cicd-security-analyzer.html
[#] Sshuttle serves as a user-friendly proxy server that provides VPN functionalities over ssh without the need for administrator privileges or complex configurations, supports DNS tunneling, and is compatible with several operating systems including Linux and MacOS.
https://github.com/sshuttle/sshuttle
[#] itm4n's blog post details PrintNightmare's persistence in Windows environments due to mishandled Group Policy settings and offers a step-by-step guide on how to prevent attacks by configuring systems to only install signed printer drivers from trusted servers.
https://itm4n.github.io/printnightmare-exploitation/

News

[#] The Insikt Group report reveals the Islamic Revolutionary Guard Corps' use of cyber contractors for espionage and ransomware attacks against Western targets and suggests financial linkages to the IRGC Quds Force in Middle Eastern countries.
https://www.recordedfuture.com/leaks-and-revelations-irgc-networks-cyber-companies
[#] Cybersecurity firm QuoIntelligence reports a new variant of WIREFIRE web shell targeting Ivanti Connect Secure VPNs through CVE-2023-21887 and CVE-2023-46805, evading established YARA rules by using cookies for encrypted payload transmission and Python's `exec()` for persistent execution.
https://securityonline.info/cybersecurity-alert-unseen-wirefire-web-shell-variant-in-ics-vpn-appliances/
[#] The Medusa ransomware group attacked the Kansas City Area Transportation Authority, demanding a $2 million ransom and threatening to release stolen data, which has disrupted their call centers but not affected transit services.
https://securityaffairs.com/158233/cyber-crime/kansas-city-area-transportation-authority-ransomware-attack.html
[#] A blog post on xilokar.info discusses a method for extracting firmware keys by gaining EL3 access in hardware.
https://www.reddit.com/r/ReverseEngineering/comments/1aco26r/firmware_key_extraction_by_gaining_el3/
[#] Sofia Santos analyzes her year of producing free OSINT challenges, revealing patterns in her creation and publishing schedule, with most tasks designed for beginner to intermediate skill levels and video walkthroughs often recorded during evening hours.
https://gralhix.com/2024/01/27/a-year-of-osint-exercises-insights-unveiling-patterns-trends/
[#] Microsoft has reduced its gaming workforce by 1,900 jobs, specifically impacting the Xbox, Activision Blizzard, and ZeniMax teams, with the Activision Blizzard's recent structural reorganization resulting in the cancellation of their in-development survival game, codenamed Odyssey.
https://www.engadget.com/microsoft-slashes-1900-jobs-across-xbox-and-activision-blizzard-145304693.html
[#] FortiGuard Labs discovered malware in Python Package Index (PyPI) affecting both Windows and Linux systems, with files designed to steal sensitive information and cryptocurrency data by using unique transmission methods and scheduled tasks for data exfiltration.
https://www.hackread.com/crypto-stealing-pypi-malware-windows-linux-users/

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-01-29

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins