HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Explore Ligolo-Ng as an alternative for network pivoting without SOCKS, contrasting it with Chisel, and delve into its setup in a step-by-step guide. Understand Active Directory attributes and their exploitation, along with defense tactics for Windows security. Update Ivanti Connect Secure to patch a critical XXE vulnerability. Check out a demonstrated BYOVD attack using a Minifilter Driver to halt processes and access its code on GitHub. Decode Cobalt Strike payloads and extract C2 server details from a concise method posted on Reddit. Prevent command injection on NETGEAR WAN by adjusting SSL certificate checks and device time settings to avoid manipulated cron jobs. Consider JSON Smuggling to improve intrusion detection evasion techniques by encoding payloads cleverly. Utilize CloudMiner to run code on Azure Automation service cost-free, meant for responsible educational use. Assess the new Windows sudo command limits and security risks connected to its UAC privileges and RPC server. Protect C2 and phishing ventures with BounceBack, a reverse proxy with extensive filtering options. Unlock STM8-based device firmware using voltage glitches, timers, and scripts, avoiding pricey tools. Quickly apply patches to FortiOS SSL-VPN to close off a severe out-of-bounds write vulnerability. Evaluate honeypot strengths and weaknesses using Honeyscanner. Confirm secure setup of Microsoft 365 with ScubaGear, a tool from CISA. Experience MinDNS, a capable DNS server built in Rust, offering various services under an MIT license. Follow a comprehensive penetration testing guide based on OWASP with real-world examples. Reclaim lost cameras via stolencamerafinder using photo EXIF data.

# Tradecraft

[#] A detailed guide on Ligolo-Ng covers lateral network movement using reverse TCP/TLS connections to establish tunnels without SOCKS for single and double network pivoting, contrasting its features with Chisel and providing a step-by-step setup and execution process.
Read More @ hackingarticles.in
[#] The article provides detailed Active Directory attributes and their exploitation techniques, alongside mitigation strategies to enhance security in Windows environments.
Read More @ redteamrecipe.com
[#] Ivanti Connect Secure detection config. As Ivanti has a high severity XXE vulnerability that can be exploited to access sensitive data or execute code remotely, and users should apply Ivanti's latest security updates to mitigate this risk.
Read More @ githubusercontent.com
[#] A cybersecurity researcher demonstrated the exploitation of a vulnerable signed Minifilter Driver (probmon.sys) for BYOVD attacks, allowing kernel-level termination of a specific process, with the source code available on GitHub.
Read More @ securityaffairs.com
[#] A short video showing how to decode a Cobalt Strike shellcode loader with CyberChef and Emulation.
Read More @ reddit.com
[#] A command injection vulnerability in NETGEAR WAN interface allows an attacker-controlled server to execute arbitrary commands on the device by manipulating SSL certificate validation and device time settings to trigger a cron job within a specific timeframe.
Read More @ nccgroup.com
[#] Insignificant whitespaces in the JSON standard can be used to encode data without breaking the format. This could aid malicious actors in covert lateral movement or data exfiltration.
Read More @ reddit.com
[#] CloudMiner is a Python-based tool that exploits Azure Automation service to execute code without incurring charges, reported to Microsoft but not altered, to be used with proper authorization for educational and research purposes.
Read More @ kitploit.com
[#] The recently introduced sudo command on Windows only provides elevated privileges via UAC without supporting policies for controlled access, and features an RPC server that lacks proper security configurations, potentially allowing any user to execute elevated commands.
Read More @ tiraniddo.dev
[#] BounceBack is a reverse proxy tool designed to protect C2 and phishing operations from detection by analyzing and filtering traffic based on a wide range of customizable parameters including IP geolocation and time-based access controls.
Read More @ kitploit.com
[#] In a project to reverse engineer STM8-based devices' firmware without expensive tools, Jarrett used a simple system employing two 555 timer chips to induce voltage glitches that bypass flash memory readout protection, controlled by adjustable potentiometers, and iteratively refined the process in conjunction with a Python script and STLink V2 programmer until successful firmware dumping was achieved.
Read More @ hackaday.io
[#] Fortinet has advised immediate patching of FortiOS SSL-VPN due to a critical out-of-bounds write vulnerability, tracked as CVE-2024-21762 with a CVSS score of 9.6, which could allow remote unauthenticated attackers to execute arbitrary code via crafted HTTP requests, and using versions 7.4.3, 7.2.7, 7.0.14, 6.4.15, 6.2.16 or migrating from 6.0 will mitigate the issue.
Read More @ securityonline.info
[#] Honeyscanner is a tool that tests honeypots for vulnerabilities by simulating cyber attacks and suggesting security improvements based on its analysis.
Read More @ securityonline.info
[#] ScubaGear, developed by CISA, is a tool for verifying the secure configuration of Microsoft 365 environments against established baseline policies, with additional support for handling exceptions, automated non-interactive assessments, and reporting through various PowerShell commands and OPA policies.
Read More @ github.com
[#] MinDNS is a high-performance, asynchronous DNS server written in Rust, enabling features such as DNS over UDP/TCP, domain blocking, custom DNS records, logging, and DNS server mirroring, all under an MIT license.
Read More @ github.com
[#] The repository Voorivex/pentest-guide on GitHub provides an organized guide for penetration testing following the OWASP framework and includes additional test cases, resources, and examples for conducting various security assessments.
Read More @ github.com
[#] Stolencamerafinder is a website that uses EXIF metadata serial numbers from photographs to locate other images taken with the same camera, intended to help users find lost or stolen cameras, with enhanced search options available for Pro users, but requiring original images and browser support from Chrome or Firefox.
Read More @ stolencamerafinder.com
[#] Pic2Map is an online tool that utilizes the embedded EXIF data in digital images to determine the photo's location and display it on a map, as well as showing other related EXIF information, if GPS data is available.
Read More @ pic2map.com
[#] TinEye provides reverse image search services and image recognition products that enable users to locate online instances of specific images for purposes such as content moderation, fraud detection, labeling, copyright compliance, and color searching, as well as offering consulting expertise in computer vision and large-scale image search challenges.
Read More @ tineye.com
[#] The repository hosts a collection of open-source intelligence tools tailored for gathering data from social media platforms, supporting various aspects of digital investigations such as user information retrieval and content analysis.
Read More @ github.com
[#] A Python script named yesitsme is designed to assist in OSINT investigations by searching for Instagram profiles using a person's name, email, or phone number via the indexing capabilities of dumpor.com.
Read More @ github.com
[#] The content covers a range of topics from introductory to advanced data science and big data analytics using Python and Apache Spark, including deep learning, machine learning for healthcare, ethical considerations in robotics, and includes resources like cheat sheets, university assignments, and certification preparation for AWS and Google Cloud.
Read More @ google.com
[#] DOUGLAS-042 is a PowerShell script designed to accelerate threat hunting and incident response by collecting key evidence from forensic and volatile data within Windows systems, automating the process and saving results with the machine's hostname for efficient forensic analysis.
Read More @ github.com
[#] A repository on GitHub titled "OSINT-for-countries" is a curated list of tools, links, and methodologies for conducting open-source intelligence specific to individual countries and regions, open for contributions through pull requests by the cyber security community.
Read More @ github.com
[#] A GitHub repository titled 'voip-caller' by user iveresk provides code to exploit a vulnerability on VoIP devices through port 5060 to make calls with a predetermined message, with a Docker option available for widespread application.
Read More @ github.com
[#] Scribd.VPDFS.com is an online tool that allows users to download documents from Scribd using various methods including direct website entry, URL modification, and a Telegram bot, with current support including documents, presentations, and a beta test for books and audiobooks.
Read More @ vpdfs.com

# News

[#] U.S. law enforcement action disrupted the operation of the KV-botnet, a network of compromised routers by China-sponsored hackers, leading to its operators restructuring their tactics, as defenders are advised to patch and monitor devices to mitigate such threats.
Read More @ thehackernews.com
[#] HijackLoader, a loader malware, has updated its defense evasion with new techniques increasing stealth, as researchers reveal its use in delivering multiple payloads via phishing, making it a more dangerous and elusive threat to cybersecurity.
Read More @ thehackernews.com
[#] A Saudi Arabian Islamic charity organization was infiltrated by a sophisticated cyber espionage campaign using a novel backdoor named Zardoor, which exfiltrates data and establishes command-and-control using living-off-the-land binaries and open-source tools, with Cisco Talos revealing the operation that possibly began in March 2021.
Read More @ thehackernews.com
[#] Google has initiated a pilot program in Singapore to curtail the sideloading of Android apps that misuse permissions for financial fraud, with those attempts being thwarted by Google Play Protect which displays a warning message, while Apple reinforces its iOS app security policies in the EU under the new DMA regulations.
Read More @ thehackernews.com
[#] Chinese state-sponsored hackers dubbed Volt Typhoon infiltrated U.S. critical infrastructure for five years using advanced stealth techniques to maintain persistent, undetected access, with government agencies advising improved security measures and vigilance to counteract such prolonged threat campaigns.
Read More @ thehackernews.com
[#] A new HijackLoader malware variant uses process hollowing and delayed assembly tactics to evade detection, highlighting the need for security teams to adopt advanced tools and strategies beyond signature-based antivirus products.
Read More @ packetstormsecurity.com
[#] A North Korea-linked hacking group, Kimsuky, is reportedly deploying new Golang-based malware, 'Troll Stealer' and a backdoor named 'GoBear,' aimed at stealing sensitive information and certificates from South Korean targets, with both using stolen legitimate certificates for concealment.
Read More @ thehackernews.com
[#] Fortinet has released updates to address a critical zero-day remote code execution vulnerability in multiple versions of FortiOS, and users of affected versions are advised to apply the patches or upgrade, while also being cautioned about two older unpatched vulnerabilities exploited by APTs.
Read More @ packetstormsecurity.com
[#] ClamAV antivirus has a critical vulnerability, CVE-2024-20328, which can be exploited without user interaction using a crafted file name to execute arbitrary code, and users should update to patched versions 1.2.2 or 1.0.5 to mitigate the risk.
Read More @ securityonline.info
[#] A new variant of MoqHao Android malware automatically starts malicious activities without user interaction, using sophisticated smishing and fraudulent Pinterest links to infect devices and prompting for risky permissions, while Google works on future Android mitigations and cybersecurity firm QiAnXin reports a separate botnet threat from the Bigpanzi group targeting smart TVs and set-top boxes in Brazil.
Read More @ thehackernews.com
[#] Cisco, Fortinet, and VMware have released patches for serious vulnerabilities that could allow unauthorized remote actions, code execution, or denial-of-service, with users advised to update to the latest provided versions to mitigate risk.
Read More @ thehackernews.com
[#] Fortinet has made public a critical vulnerability in its SSL VPN on FortiOS, marked CVE-2024-21762, which is likely exploited in active attacks and can be mitigated by upgrading to versions not affected by this flaw.
Read More @ thehackernews.com
[#] Bitdefender has identified a new malware targeting Mac users, named Trojan.MAC.RustDoor, which disguises itself as a Visual Studio update and possesses the ability to perform various malicious activities, including file manipulation and system reconnaissance, requiring users and cybersecurity professionals to update their defense strategies.
Read More @ securityonline.info
[#] The Black Basta ransomware group claimed responsibility for a cyberattack on Hyundai Motor Europe, allegedly stealing three terabytes of data from various company departments.
Read More @ securityaffairs.com
[#] A critical vulnerability in FortiOS fgfmd daemon, CVE-2024-23113, allows remote code execution and requires users to upgrade to versions 7.4.3, 7.2.7, or 7.0.14 and above, or to restrict fgfm access as a temporary mitigation.
Read More @ fortiguard.com
[#] Ivanti has alerted customers about a new high-severity authentication bypass vulnerability, identified as CVE-2024-22024, affecting its Connect Secure, Policy Secure, and ZTA gateway devices, urging them to patch multiple versions with released fixes to prevent potential unauthorized access.
Read More @ securityaffairs.com
[#] Fortinet reports an actively exploited critical remote code execution vulnerability, CVE-2024-21762, in FortiOS SSL VPN, recommending immediate upgrade to patched versions or disabling SSL VPN as a workaround.
Read More @ securityaffairs.com
[#] SonicWall's SonicOS firmware version 7.1.1-7040 contains a high-severity authentication vulnerability, CVE-2024-22394, which could allow remote attackers to bypass authentication; affected organizations should update their devices promptly to mitigate this risk.
Read More @ securityonline.info
[#] Check Point Research reveals the continued threat of old CVEs in Microsoft Word and Excel as more than 13,000 malware samples from 2023 exploit these vulnerabilities, evading detection through sophisticated methods, with finance, government, and healthcare sectors as primary targets, highlighting the necessity for vigilant software updates and cybersecurity training.
Read More @ securityonline.info
[#] The Reserve Bank of India is enhancing its digital currency with programmability for targeted transactions and offline capabilities to operate in areas with poor internet service, complemented by plans for a framework to bolster digital payment authentication methods.
Read More @ theregister.com
[#] Ivanti Connect Secure's recent patch inadvertently introduced a higher impact bug, CVE-2024-22024, allowing for a basic Out-of-Bounds XML External Entity injection that can be verified using a specific Nuclei template without enabling widespread exploitation.
Read More @ watchtowr.com
[#] Pig butchering scams involve manipulating victims through fake romances and cryptocurrency investments, with scammers using Tether to transfer funds, which despite evidence, companies like Tether and major exchanges often fail to freeze, facilitating large-scale fraud and money laundering.
Read More @ dshr.org
[#] Hyundai Motor Europe was targeted by the Black Basta ransomware group in January, resulting in the theft of 3TB of corporate data from various departments, prompting ongoing investigations and collaboration with cybersecurity experts and authorities to address the breach.
Read More @ bleepingcomputer.com
[#] Researchers have identified a sophisticated new banking Trojan called "Coyote" targeting 61 Brazilian banking apps, utilizing Squirrel and the Nim programming language for evasion and potential to evolve into a wider threat, with Brazilian malware developers historically known to expand attacks globally.
Read More @ darkreading.com
[#] The LectureNotes Learning App exposed over 2.1 million users' data due to a misconfigured MongoDB database, revealing sensitive information, which has been rectified, while other reports discuss breaches affecting French healthcare firms and a cyberattack on a California union as well as a SIM swapping attack on US insurers.
Read More @ scmagazine.com
[#] Two U.S. insurers, Bankers Life and Casualty Company and Washington National Insurance Company, reported a data breach affecting over 66,000 customers due to a SIM swapping attack, and Rebecca Moody recommends using secure authentication apps to prevent such attacks.
Read More @ scmagazine.com
[#] Microsoft has fixed a compatibility issue in Windows 11 23H2 that caused desktop icons to erratically move on systems using Windows Copilot with multiple monitors, with no longer any block on updates for those systems.
Read More @ bleepingcomputer.com
[#] Cisco Talos researchers uncovered the Zardoor backdoor, a sophisticated malware framework utilized in espionage against Islamic non-profits, leveraging customized reverse proxy tools and living-off-the-land binaries for long-term infiltration and evasion.
Read More @ securityonline.info
[#] The FBI advocates for the extension of Section 702 FISA powers to deter Chinese cyber threats without warrants, while critics and potential legislative reforms call for heightened privacy protections including warrant requirements for American data queries.
Read More @ theregister.com
[#] A critical vulnerability, CVE-2024-24821 with a CVSS score of 8.8, has been identified in the Composer PHP tool that could allow code execution and privilege escalation; users should upgrade to Composer versions 2.7.0 or 2.2.23 to mitigate the issue.
Read More @ securityonline.info
[#] Group-IB has uncovered a cybercrime gang called ResumeLooters that used SQL injection and XSS attacks to pilfer personal data from job boards and e-commerce sites across Asia, amassing over two million emails and other personal details, with the majority of targets located in the APAC region.
Read More @ theregister.com
[#] The United States government has increased a bounty up to $15 million for information on Hive ransomware operators after a successful FBI operation that disrupted the gang's activities and provided decryption keys to save potential victim payouts.
Read More @ theregister.com
[#] The Israeli Defense Forces have been inadvertently revealing soldier locations in Gaza due to improper Operation Security practices, sparking a directive for more rigorous adherence to guidelines to prevent such sensitive information leaks.
Read More @ haaretz.com

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-02-10

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins