HAQ.NEWS

// Jared Folkins

# Latest Podcast

#  Description

Checkout BOFHound's new LDAP parsing capabilities and SigFinder's binary authentication signature scanning. Learn how Shielder's analysis of ASUS routers impacts real-world security and explore the use of BOF Launcher for varied programming environments.

#  Tradecraft

[#]  BOFHound, a Python tool for parsing LDAP data into BloodHound-compatible JSON, now includes session and local group data collection with updated BOFs aiding in stealthy Active Directory mapping without triggering common detection mechanisms.
https://posts.specterops.io/bofhound-session-integration-7b88b6f18423 
[#]  SigFinder is a tool for locating binaries with Authenticode digital signatures that are associated with an internal CA or a specific domain, providing options to ignore certain certificates, search directories recursively, and filter by domain keyword, which are actions useful for managing application whitelists in Windows environments.
https://github.com/mlcsec/SigFinder 
[#]  Security researchers at Shielder analyzed critical CVEs in ASUS routers, successfully wrote an n-day exploit confirming a format string vulnerability via emulation, but found the reported unauthenticated access does not hold in properly configured real-world devices.
https://www.shielder.com/blog/2024/01/hunting-for-~~un~~authenticated-n-days-in-asus-routers/ 
[#] The BOF Launcher is an open-source library that enables the execution of Beacon Object Files in various environments, offering compatibility with Cobalt Strike's Beacon, support for multiple programming languages and systems, and features like asynchronous execution and process injection.
https://github.com/The-Z-Labs/bof-launcher 
[#] The article reviews multiple vulnerabilities in the Apache OFBiz ERP system, detailing the history, analysis, and mitigation of RCE exploits due to insecure deserialization and authentication bypasses, emphasizing on CVEs -2023-51467, -2023-49070 and -2020-9496.
https://blog.securelayer7.net/ofbiz-authentication-bypass-cve-2023-51467/ 
[#] PurpleKeep is an open-source platform that automates the testing of detection rules for cyber attacks by simulating Tactics, Techniques, and Procedures (TTPs) in an Azure environment, using Atomic Red Team project tactics and integrating with Azure Monitor for logging.
http://www.kitploit.com/2024/01/purplekeep-providing-azure-pipelines-to.html 
[#] CsWhispers is a source generator for C# projects that automates the addition of D/Invoke and indirect syscall methods, allowing for more advanced interaction with the Windows API without needing manual PInvoke declarations.
https://github.com/rasta-mouse/CsWhispers 
[#] SecureCodeBox is an open-source, Kubernetes-based platform that automates continuous security scanning within CI/CD pipelines, integrating popular tools to help developers address vulnerabilities before deployment.
https://itnext.io/exploring-securecodebox-an-open-source-continuous-security-testing-solution-for-devsecops-b233fc5341e1 
[#] The blog post provides a walkthrough of setting up a Large Language Model (LLM), demonstrating both direct and indirect prompt injection vulnerabilities and how to leverage these for data exfiltration, with practical examples including code snippets and server setup that highlight the importance of understanding and mitigating such security flaws.
https://linear.red/blog/2024/01/29/llm01---prompt-injections-vulnerabilities-in-large-language-models/ 
[#] Understanding the intricacies of network defense can lead to the strategic deployment of honeypots to deceive and monitor potential attackers, enhancing overall system security.
https://securityonline.info/cve-2024-22860-cve-2024-22862-critical-ffmpeg-remote-code-execution-flaws/ 
[#] LEAKEY is a customizable tool for verifying leaked API tokens/keys and can be updated easily by appending new checks in the signatures.json file.
https://securityonline.info/leakey-checks-and-validates-for-leaked-credentials/ 
[#] The EO Browser application allows users to access and analyze a variety of satellite data layers, requiring agreement to its terms of service and providing enhanced features upon free user registration.
http://apps.sentinel-hub.com/eo-browser/ 
[#] The repository 'vulnerability-Checklist' on GitHub is a collection of web and API vulnerability checklists, including various attack vectors such as SQL injection, CSRF, and authentication bypasses, providing a resource for ethical hackers to identify and secure potential security flaws.
https://github.com/Az0x7/vulnerability-Checklist 
[#] Enhance your network's security by employing layered defenses, regularly updating systems, using strong multifactor authentication, and conducting ongoing security training.
https://hackerone.com/reports/2327341 
[#] The GitHub project azureOutlookC2 demonstrates a proof of concept where a compromised Windows device is remotely controlled via commands from an attacker's Outlook mailbox, utilizing Microsoft Graph API for Command & Control (C2) operations, which was also reportedly used by threat actors like North Korean APT InkySquid/ScarCruft/APT37.
https://github.com/boku7/azureOutlookC2 
[#] This guide details methods to identify and protect against fraud by using advanced online search techniques for emails, phone numbers, and names, as well as employing various tools for verification and detection of scams.
https://efimlerner.substack.com/p/unmasking-fraudsters-mastering-email 
[#] The article describes how to compile an Open Source Intelligence (OSINT)-based Cyber Threat Intelligence report, with a case study focusing on Singapore's cybersecurity threats, and provides structured recommendations on mitigating identified vulnerabilities, such as RDP brute-force attacks and TCP SYN flood attacks.
https://osintteam.blog/crafting-an-osint-threat-intelligence-report-a-singapore-case-study-0650691d074b 

#  News

[#] A database containing personal data of 750 million Indian mobile subscribers was offered on dark web forums, including names, phone numbers, addresses, and Aadhaar details, posing significant risks of financial fraud and identity theft.
https://securityaffairs.com/158349/data-breach/750m-indian-mobile-subscribers-dark-web.html 
[#] GitLab has issued a critical update to fix a CVE-2024-0402 vulnerability that allowed authenticated users to write files to any location on the server, and users should update to the latest patched version immediately to prevent exploitation.
https://thehackernews.com/2024/01/urgent-upgrade-gitlab-critical.html 
[#] The Timex Group suffered a data breach between June 1 and June 5, 2023, resulting in the exposure of over 3,000 individuals' names and Social Security numbers, and has since taken steps to strengthen data protection and is working with law enforcement and forensic experts without any indicators of the stolen information being fraudulently used.
https://www.scmagazine.com/news/timex-breach-leaks-employee-social-security-numbers 
[#] Brazilian Federal Police have arrested key individuals linked to the Grandoreiro banking trojan, a malware involved in data theft and unauthorized banking transactions since 2017, with ESET's assistance revealing a protocol flaw instrumental in tracking victim connections to the attackers' servers.
https://thehackernews.com/2024/01/brazilian-feds-dismantle-grandoreiro.html 
[#] Cybercriminals deploy DarkGate malware using Microsoft Teams group chat invitations, with AT&T Cybersecurity suggesting disabling External Access unless necessary and training users on recognizing unsolicited messages to mitigate phishing risks.
https://www.bleepingcomputer.com/news/security/microsoft-teams-phishing-pushes-darkgate-malware-via-group-chats/ 
[#] The FBI warns that a tech support courier scam is targeting seniors to steal cash and metals, combining online and offline tactics, and advises vigilance in protecting personal data and avoiding unsolicited communications.
https://www.hackread.com/fbi-warn-tech-support-courier-scam-cash-metals/ 
[#] The FBI, sanctioned by the White House, recently disrupted a sophisticated botnet operated by Chinese cyberespionage group Volt Typhoon, which had targeted critical infrastructure across multiple sectors in the United States and its territories.
https://www.scmagazine.com/news/fbi-sting-targeted-dangerous-volt-typhoon-botnet-report-claims 
[#] Blockchain analysis is increasingly used in law enforcement to trace and link cryptocurrency transactions to real-world identities, combatting the false notion of anonymity in Bitcoin and similar networks, as detailed in various case studies including the takedown of dark web marketplaces and arresting individuals involved in major thefts and unlawful activities.
https://blog.dshr.org/2024/01/criming-on-blockchain.html 
[#] Citibank is facing a lawsuit from the New York Attorney General for not safeguarding customers from fraud and for refusing to reimburse the victims as mandated by the Electronic Fund Transfer Act, despite claims of using robust security protocols and tools to reduce wire fraud losses.
https://www.bleepingcomputer.com/news/technology/citibank-sued-over-failure-to-defend-customers-against-hacks-fraud/ 
[#] Juniper Networks has acknowledged and corrected an error by not initially assigning individual CVEs to four vulnerabilities reported by watchTowr and has released fixes, advising all Junos OS on SRX and EX series users to apply the necessary updates to mitigate three missing authentication vulnerabilities and an XSS flaw.
https://go.theregister.com/feed/www.theregister.com/2024/01/30/juniper_networks_vulnerabilities/ 
[#] Brazilian Federal Police, with support from ESET, Interpol, Spanish National Police, and Caixa Bank, have halted the Grandoreiro banking malware operation, making five arrests and seizing property across multiple states after tracking at least 3.6 million euros in fraudulent transactions since 2019.
https://www.bleepingcomputer.com/news/security/police-disrupt-grandoreiro-banking-malware-operation-make-arrests/ 
[#] Schneider Electric's Sustainability Business division experienced a ransomware attack and potential data breach on January 17, 2024, impacting systems including Resource Advisor, with indications the Cactus ransomware group may be involved; operations are expected to resume in two business days.
https://packetstormsecurity.com/news/view/35462/Schneider-Electric-Hit-By-Ransomware-Attack-Data-Breach.html 
[#] SolarWinds refutes SEC's fraud charges regarding its 2020 security breach, claiming their risk disclosures were adequate and that disclosing more would aid attackers, while the SEC argues the company and its CISO misled investors about their cybersecurity practices.
https://packetstormsecurity.com/news/view/35463/SolarWinds-Slams-SEC-Lawsuit-As-Unprecedented-Victim-Blaming.html 
[#] Elon Musk's Neuralink has reportedly implanted a brain chip into a human patient for the first time, aiming to test the safety and potential benefits for individuals with disabilities, with ambitions to later develop cybernetic enhancements for general use.
https://packetstormsecurity.com/news/view/35465/Elon-Musk-Has-Implanted-Neuralink-In-A-Human.html 
[#] Malwarebytes reports deepfake images of Taylor Swift have spread online, prompting social media platforms and politicians to push for more robust laws against creating and disseminating such content, while individuals affected by non-consensual pornography, including deepfakes, have resources like the Cyber Civil Rights Initiative's Online Removal Guide to help remove unauthorized content.
https://www.malwarebytes.com/blog/news/2024/01/deepfake-taylor-swift-images-circulate-online-politicians-call-for-laws-to-ban-deepfake-creation 
[#] Italy's data protection authority is investigating OpenAI's ChatGPT for potential privacy law breaches, prompting a response from OpenAI, while Apple contends with UK government proposals that could impact their product privacy protocols.
https://thehackernews.com/2024/01/italian-data-protection-watchdog.html 
[#] Juniper Networks has released urgent updates to Junos OS for SRX and EX Series devices to patch high-severity flaws, including a missing authentication issue and an XSS vulnerability, with versions listed for each fix and a temporary mitigation involving disabling or restricting J-Web access.
https://thehackernews.com/2024/01/juniper-networks-releases-urgent-junos.html 
[#] Security researchers have detected over 1,500 compromised credentials from RIPE, APNIC, AFRINIC, and LACNIC on the dark web, advising affected network operators and IT infrastructure managers to change passwords and enable two-factor authentication to mitigate potential cyberattacks.
https://securityaffairs.com/158329/cyber-crime/network-operators-credentials-found-in-dark-web.html 
[#] A revitalized ZLoader malware variant has surfaced with upgrades such as RSA encryption, 64-bit Windows compatibility, and evasion tactics against analysis, signaling a potential resurgence of ransomware attacks.
https://thehackernews.com/2024/01/new-zloader-malware-variant-surfaces.html 
[#] A recent cybersecurity alert details how the Trigona ransomware group has shifted tactics by employing Bulk Copy Program (BCP) utility to install Mimic ransomware on vulnerable MS-SQL servers, urging administrators to strengthen passwords and keep systems updated to mitigate risks.
https://securityonline.info/new-trigona-ransomware-threat-actor-uses-mimic-ransomware-and-bcp-utility-in-attacks/ 
[#] Keenan & Associates, a California insurance firm, reported a data breach affecting 1.5 million people, with personal information including SSNs and health details exposed, and is now enhancing network security and offering free identity theft protection services.
https://www.bleepingcomputer.com/news/security/keenan-warns-15-million-people-of-data-breach-after-summer-cyberattack/ 
[#] The Facebook page of USAID Colombia was hacked, causing false information to potentially target its 75,000 followers, with the U.S. government and Meta taking action to resolve and investigate the breach, while reinforcing the necessity of secure account practices, such as multi-factor authentication.
https://www.scmagazine.com/news/another-us-government-agency-account-hacked-this-time-on-facebook 
[#] SolarWinds disputes SEC's lawsuit alleging deceptive security practice disclosures, arguing risk factors were warned and specific vulnerability disclosures could aid attackers, while the SEC questions the sufficiency of the firm's cybersecurity program details.
https://go.theregister.com/feed/www.theregister.com/2024/01/29/solarwinds_sec_lawsuit/ 
[#] A critical remote code execution vulnerability, CVE-2024-23897, impacts around 45,000 online Jenkins servers, with public exploits available, and administrators should apply security updates or follow mitigation strategies from the Jenkins security bulletin.
https://www.bleepingcomputer.com/news/security/45k-jenkins-servers-exposed-to-rce-attacks-using-public-exploits/ 
[#] Schneider Electric's Sustainability Business division was hit by a Cactus ransomware attack on January 17, leading to terabytes of data theft and ongoing outages, with the company implementing recovery and containment measures while investigating the incident with cybersecurity experts.
https://www.bleepingcomputer.com/news/security/energy-giant-schneider-electric-hit-by-cactus-ransomware-attack/ 
[#] A global dark web drug trafficking operation led by Banmeet Singh has been dismantled following his guilty plea in the US after extradition from the UK, including a forfeiture of $150M in cryptocurrency, showcasing effective international law enforcement collaboration against online illegal drug markets.
https://www.hackread.com/dark-web-drug-lord-pleads-guilty-cryptocurrency/ 
[#] On January 30, 2024, cybersecurity group alphv reported that Technica, a tech company providing IT solutions to government clients, suffered a data breach with over 300 GB of data leaked, and a ransomware dashboard now tracks and updates such incidents through an SQL database feed, based on ransomFeed project.
http://www.ransomfeed.it/index.php?page=post_details&id_post=13035 
[#] The article details a security flaw within Ivanti Avalanche (CVE-2023-41474), a directory traversal vulnerability that could potentially allow unauthenticated attackers to access sensitive .xml or .html files, emphasizing the importance of immediate patching to prevent information disclosure and server compromise.
https://securityonline.info/cve-2023-41474-ivanti-avalanche-directory-traversal-flaw-poc-published/ 
[#] Mercedes-Benz inadvertently exposed sensitive internal data, including source code, due to a private key left in a public GitHub repository, which was removed following discovery by researchers and notification by TechCrunch.
https://securityaffairs.com/158306/data-breach/mercedes-benz-data-leak.html 

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-01-31

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins