HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Today, GMER is an anti-rootkit for Windows, specializing in detecting kernel mode rootkits and securing I/O operations, detailed on LinkedIn. A Proof-Of-Concept for CVE-2023-22098 reveals a vulnerability in VirtualBox 7.0.10, with mitigation steps on GitHub. FormThief, another GitHub project, collects spoofed login applications for Windows, aiding in credential capture during tests. Honeypage, a Go language application, creates customizable honeypots to identify malicious web activity, in pre-alpha development on GitHub. Lastly, an article from Asset-Intertech introduces WinDbg and Intel Direct Connect Interface for debugging Windows Secure Kernel on AAEON UP Xtreme i11 boards, focusing on capturing execution details without symbols.

# Tradecraft

[#] GMER is an anti-rootkit tool for Windows systems, capable of detecting kernel mode rootkits by using advanced techniques like direct kernel object manipulation, and offers detailed insights into securing both disk and file I/O operations against malicious activity.
Read More @ linkedin.com
[#] A Proof-Of-Concept to demonstrate exploitation of CVE-2023-22098 was released, affecting VirtualBox 7.0.10 r158379, which requires users to update the software to mitigate this security vulnerability.
Read More @ github.com
[#] The repository "FormThief" is a collection of spoofed Windows desktop login applications made with WinForms and WPF for capturing user credentials during penetration tests, with detailed usage instructions for integration with various tools and pending improvements for code stability and additional application support.
Read More @ github.com
[#] A Go language application named Honeypage is under pre-alpha development, designed to generate a customizable honeypot web page for integration with modpot, simulating a vulnerable system to detect and analyze malicious activity.
Read More @ github.com
[#] The article provides an introduction to using SourcePoint's WinDbg tool and Intel Direct Connect Interface for debugging the Windows Secure Kernel and hypervisor, discussing step-by-step techniques and the utility of Intel Processor Trace for capturing execution details without the need for symbols, as demonstrated on an AAEON UP Xtreme i11 board.
Read More @ asset-intertech.com

# News

[#] An employee at the Stratford-on-Avon District Council misused access to steal 79,000 email addresses to promote a private business, resulting in a police caution and data breach resolution measures by the council.
Read More @ theregister.com
[#] A recent report detailed that up to 275 credit unions using CU Solutions Group's content management system were vulnerable to account takeover and credential theft due to critical vulnerabilities, but these have been mitigated by an update and the implementation of multi-factor authentication is recommended.
Read More @ scmagazine.com
[#] The UK's National Crime Agency has publicly taken over the LockBit ransomware group's operations, seizing infrastructure, arresting affiliates, and planning to expose the group leader's identity, indicating a significant setback for the cybercrime group and emphasizing law enforcement's global collaboration and strategic offensive against such threats.
Read More @ malwarebytes.com
[#] A new malware named Migo, targeting Redis servers to mine cryptocurrency, disables security configurations and uses a user-mode rootkit to evade detection, requiring system administrators to be vigilant about these specific attack vectors and secure their Linux hosts against such cryptojacking attempts.
Read More @ thehackernews.com
[#] A critical vulnerability named KeyTrap, identified as CVE-2023-50387, discovered in the DNSSEC could potentially cause extended Internet outages by sending a single malicious packet that sends DNS servers into an unresolvable loop; updates to patch this issue have been released and need to be applied immediately to affected systems.
Read More @ darkreading.com
[#] Signal has introduced a beta feature allowing users to create usernames that conceal their phone numbers, aiming to enhance privacy but still requiring a phone number during registration process.
Read More @ bleepingcomputer.com
[#] A security lapse at Wyze allowed 13,000 customers to inadvertently access video feeds from other users' cameras, which the company attributes to a third-party library issue during high server load, and has since implemented additional verification measures to prevent future incidents.
Read More @ hackread.com
[#] ConnectWise has patched two critical vulnerabilities in its ScreenConnect software, with the most severe allowing remote code execution, and users should update to version 23.9.8 or apply the provided patches for versions 22.4 through 23.9.7 immediately.
Read More @ thehackernews.com
[#] North Korean hackers, affiliated with the Lazarus Group, have targeted global defense firms for espionage since 2020, using sophisticated social engineering on LinkedIn and software supply chain attacks, consequently, defense organizations should enhance their security practices and employee awareness to mitigate these threats.
Read More @ thehackernews.com
[#] The UK National Crime Agency shut down the LockBit ransomware operation, arresting individuals, freezing cryptocurrency accounts, and releasing decryption keys to assist victims.
Read More @ thehackernews.com
[#] The EU has initiated an investigation into TikTok for potential violations of the Digital Services Act, focusing on the platform's content moderation, protection of minors, and transparency around advertising and algorithmic processes.
Read More @ theregister.com
[#] Starting in July 2024, Vietnam will be collecting extensive biometric data from its citizens, including iris scans, voice samples, and DNA, for a new integrated identification system that aims to include health and social insurance, driving licenses, and other certifications, replacing physical ID cards with a QR code linked system managed by the Ministry of Public Security.
Read More @ packetstormsecurity.com
[#] Microsoft detected foreign hacking groups using its AI tools to enhance their cyber operations and acknowledged the capability to monitor AI tool usage, highlighting potential privacy concerns regarding AI session surveillance.
Read More @ schneier.com
[#] A critical vulnerability CVE-2024-25600 in the WordPress Bricks theme allows unauthenticated attackers to execute remote code; users should update to version 1.9.6.1 to mitigate the risk.
Read More @ thehackernews.com
[#] The FBI has shifted its cybersecurity strategy from a defensive posture to a more aggressive approach by disabling the infrastructure of China's Volt Typhoon APT, aiming to disrupt their potential for cyberattacks and prevent reconstitution of their botnet capabilities.
Read More @ scmagazine.com
[#] Intel has published details about 34 new security vulnerabilities affecting various components and software, including Thunderbolt, with patches available, and users should manually update to protect their systems as some updates may not be automatic.
Read More @ securityonline.info
[#] Autodesk AutoCAD software versions 2021 to 2024 have been discovered to contain 40 zero-day vulnerabilities which could allow arbitrary code execution, with remedies including avoiding the import feature, disabling certain imports, and only importing files from trusted sources.
Read More @ securityonline.info
[#] Starting in July 2024, Vietnam will implement a biometric data collection initiative, requiring iris scans, voice samples, and potentially DNA from citizens for a new ID card system to streamline various identification documents.
Read More @ theregister.com
[#] Operation Cronos led to the seizure of LockBit ransomware group's darknet domains by exploiting a PHP vulnerability (CVE-2023-3824), affecting their operations and compromising their affiliate panel with law enforcement gaining extensive information about their activities.
Read More @ thehackernews.com
[#] Law enforcement agencies from multiple countries have cooperatively seized LockBit ransomware group's website, signaling a significant disruption of the group's operations and foreshadowing detailed revelations regarding the international crackdown.
Read More @ theregister.com
[#] Bellingcat geolocated two separate flag-raising incidents in Guyana and Venezuela, debunking online claims that they were the same event and highlighting the ongoing territorial dispute over the Essequibo region.
Read More @ bellingcat.com
[#] International authorities have disrupted the LockBit ransomware group's operations by seizing their infrastructure and arresting key figures, while also developing decryption tools for victims.
Read More @ medium.com
[#] The SVR's large-scale attack on Microsoft 365 Entra ID tenants highlights the importance of securing these environments, as Andy Robbins outlines attack methods and defensive strategies in a Risky Business interview.
Read More @ risky.biz

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-02-21

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins