HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Analyze and understand various cyber techniques including LOLSpoof for hiding commands, KrustyLoader for sneaking backdoors, tools for cracking passwords using GDB, BucketLoot for detecting data leaks, TeleTracker for disrupting Telegram channels, and methods for network control with SSH-botnet.

# Tradecraft

[#] LOLSpoof is an interactive tool that conceals malicious command line activity by generating a benign-looking process command line to evade detection by security systems.
https://github.com/itaymigdal/LOLSpoof
[#] A critical analysis of the Rust-based malware known as KrustyLoader reveals its function to download and execute a Sliver backdoor after passing built-in security checks, complete with a Python script for URL extraction and a Yara rule for detection, linked to Ivanti Connect Secure VPN vulnerabilities CVE-2024-21887 and CVE-2023-46805.
https://www.synacktiv.com/publications/krustyloader-rust-malware-linked-to-ivanti-connectsecure-compromises.html
[#] A tutorial on how to use GDB and analyze x86 assembly to find passwords in crackme challenges, with step-by-step instructions on setting breakpoints, examining memory, and understanding control flow to solve the tasks.
https://tc.gts3.org/cs6265/tut/tut01-warmup1.html
[#] BucketLoot is an automated inspector for S3-compatible storage buckets that can detect secret exposures, search for sensitive data using custom keywords or regexes, and extract useful assets, with capabilities for scanning publicly-exposed files and flagging accidental leaks in various cloud platforms without needing initial API tokens or access keys.
http://www.kitploit.com/2024/01/bucketloot-automated-s3-compatible.html
[#] TeleTracker is a set of Python scripts for analyzing and interfering with Telegram channels used for malicious command and control operations, providing features for message monitoring, media downloading, and disruptive spamming, with recent updates including media type expansion and improved message retrieval.
https://github.com/tsale/TeleTracker
[#] A Python automation tool called SSH-botnet can scan a network for SSH servers and add them to a botnet, intended for mass management and control within environments such as educational labs with uniform login credentials.
https://github.com/G0uth4m/SSH-botnet
[#] An XML External Entity (XXE) vulnerability in an application was discovered, allowing for server-side request forgery and error-based data exfiltration using manipulated XML schema files which cause the server to display sensitive information in its logs.
https://infosecwriteups.com/xml-external-entity-injection-with-error-based-data-exfiltration-985b063ec820
[#] Protect AI has released 'ai-exploits,' a Docker-friendly repository containing Metasploit modules, Nuclei templates, and CSRF templates for responsibly disclosed vulnerabilities in AI/ML infrastructure to educate the infosec community on real-world attacks and defenses.
https://securityonline.info/ai-exploits-a-collection-of-real-world-ai-ml-exploits-for-responsibly-disclosed-vulnerabilities/
[#] A threat actor exploited an exposed Remote Desktop Protocol host with valid credentials, disabled defenses, exfiltrated data using Rclone to Mega.io, and deployed Trigona ransomware, affecting the entire network within 3 hours.
https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours/
[#] The GitHub repository 'JS_waybackurls' by @Securi3yTalent is a JavaScript tool for retrieving known URLs for a domain from the Wayback Machine, requiring Node.js and the installation of dependencies to execute.
https://github.com/securi3ytalent/JS_waybackurls
[#] The analysis details a comprehensive breakdown of the Stealc information stealer's functionality, including malware analysis, evasion techniques, data exfiltration processes, and remediation strategies.
https://farghlymal.github.io/Stealc-Stealer-Analysis/

# News

[#] To secure a network, continuously monitor system logs, implement encryption, enforce strict access controls, and educate users on security best practices.
https://www.bleepingcomputer.com/news/security/fbi-tech-support-scams-now-use-couriers-to-collect-victims-money/
[#] Microsoft patched a vulnerability in Outlook identified as CVE-2023-35636, which allowed attackers to steal NTLM v2 hashed passwords by convincing a user to open a malicious file, with further risk remaining from unpatched attack methods through Windows Performance Analyzer and File Explorer.
https://thehackernews.com/2024/01/researchers-uncover-outlook.html
[#] Recent cyber incidents include APT29 attacking Microsoft and HPE, LockBit hitting a Wall Street firm, Ukrainian entities facing disruptions by hacktivists, 23andMe suffering a credential stuffing breach, Russian research compromised by Ukrainian hackers, with Apple and Jenkins addressing critical vulnerabilities, and QR-code phishing attacks on the rise.
https://research.checkpoint.com/2024/29th-january-threat-intelligence-report/
[#] Ofuji Fishing Tackles in Japan reported a data breach affecting 200,000 customers due to ransomware encrypting data on their servers after attackers exploited their VPN setup, and the company is now enhancing security measures and cooperating with authorities.
https://securityonline.info/data-breach-at-ofuji-fishing-200000-customers-information-compromised/
[#] Researchers at Pwn2Own Tokyo exposed 49 new zero-day vulnerabilities in automotive tech, including high-reward exploits in Tesla vehicles and EV chargers, while Cisco, Apple, and other tech firms issued patches for critical security flaws ranging from CVSS scores of 8.0 to 10.0, necessitating immediate updates.
https://go.theregister.com/feed/www.theregister.com/2024/01/29/infosec_news_roundup_in_brief/
[#] The Kansas City Area Transportation Authority experienced a ransomware attack on January 23 which disrupted communication systems, but Medusa ransomware operators are demanding $2 million within a 10-day deadline.
https://www.bleepingcomputer.com/news/security/kansas-city-public-transportation-authority-hit-by-ransomware/
[#] Microsoft Edge patched multiple security flaws, including a high-severity one-click vulnerability (CVE-2024-21326, CVSS 9.6), urging users to update their browsers to avoid potential full compromises.
https://securityonline.info/cve-2024-21326-cvss-9-6-one-click-could-compromise-microsoft-edge/
[#] A severe race condition flaw in Linux Kernel's IPv6 stack, CVE-2023-6200, allowing code execution, can be mitigated by updating to kernel version 6.7-rc7 or by disabling IPv6 'accept_ra' parameter.
https://securityonline.info/critical-alert-cve-2023-6200-exploits-linux-kernel-with-code-execution-risk/
[#] Microsoft is investigating a connectivity issue that has been preventing Outlook and other email clients from connecting to Outlook.com accounts since January 23rd and advises users to access their email via the web until a fix is provided.
https://www.bleepingcomputer.com/news/microsoft/microsoft-says-outlook-apps-cant-connect-to-outlookcom/
[#] The incidence of ransomware victims paying demands has plummeted to 29% in late 2023 due to organizations' improved security measures, distrust of cybercriminals, and legal sanctions against paying ransoms in certain locales, with average payment amounts also decreasing significantly.
https://www.bleepingcomputer.com/news/security/ransomware-payments-drop-to-record-low-as-victims-refuse-to-pay/
[#] Cybersecurity researchers have discovered several malicious packages on PyPI, which distribute the WhiteSnake information stealing malware targeting Windows, and incorporate clipper functionality to hijack crypto transactions.
https://thehackernews.com/2024/01/malicious-pypi-packages-slip-whitesnake.html
[#] Italy's data protection authority, Garante, has found OpenAI's ChatGPT in violation of EU data privacy laws and has given the company 30 days to respond to their findings, meanwhile, OpenAI contends that their practices comply with these regulations.
https://packetstormsecurity.com/news/view/35456/OpenAIs-ChatGPT-Breaches-Privacy-Rules-Says-Italian-Watchdog.html
[#] Cybersecurity researchers have uncovered a new Phobos ransomware variant called Faust, which delivers malware using an infected Excel document and practises fileless attack techniques for encryption; alongside this, several new ransomware groups have emerged using languages like Rust and Golang for cross-platform attacks, while ransomware payment rates have decreased, with victims less frequently choosing to pay the ransom.
https://thehackernews.com/2024/01/albabat-kasseika-kuiper-new-ransomware.html
[#] CloudSEK uncovers data breach involving 750 million Indian mobile subscribers with personal details for sale on dark web, while Terraform Labs files for bankruptcy amidst ongoing legal challenges and India announces plans for a supercomputing hub to enhance AI capabilities.
https://go.theregister.com/feed/www.theregister.com/2024/01/28/asia_tech_news_roundup/
[#] Telegram's dark markets have become a hotbed for modern phishing scams, and it appears that no immediate action is being taken by the platform to address this issue.
https://www.reddit.com/r/netsec/comments/1adxdkx/scammers_paradise_exploring_telegrams_dark/
[#] The NSA has acknowledged purchasing American internet browsing records from data brokers without warrants, despite privacy concerns, leading to Senator Wyden urging legal reforms to prevent intelligence agencies from buying data that hasn't been lawfully obtained.
https://thehackernews.com/2024/01/nsa-admits-secretly-buying-your.html
[#] The Lazarus Group continues to escalate their cyber threats on financial entities, utilizing spear-phishing and zero-day exploits, necessitating increased cybersecurity measures and vigilance from organizations.
https://securityonline.info/from-spear-phishing-to-zero-day-lazarus-groups-latest-cyber-strategies/
[#] Trigona Ransomware was analyzed after an attack on Christmas Eve, with significant details and response strategies reported within three hours on TheDFIRReport.
https://www.reddit.com/r/netsec/comments/1adwlas/buzzing_on_christmas_eve_trigona_ransomware_in_3/
[#] A vulnerability in Google Kubernetes Engine can potentially lead to cluster compromises, necessitating prompt security reviews and updates by admins.
https://www.reddit.com/r/netsec/comments/1adycun/sysall_how_a_simple_loophole_in_google_kubernetes/

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-01-30

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins