HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Today, RepoReaper is a security tool aimed at discovering exposed .git repositories for auditing. Brutespray, now written in golang, enhances service bruteforce capabilities. Monitoring Google Remote Desktop patterns can identify greyware activities. The advanced phishing tool Evilginx Pro grows alongside a community working on ethical phishing, with new updates addressing various vulnerabilities. Blacklight is a privacy tool that uncovers tracking technologies on websites, suggesting privacy-focused solutions. The comparison of anti-cheat and EDR bypasses distinguishes between gaming advantages and security evasion, with a nod towards ethical use. The "Hunting for Persistence in Linux" blog series explores defensive and offensive tactics regarding unauthorized access on Linux. Additional guides focus on Linux system persistence via account manipulation and systemd, with auditd, sysmon, and osquery for detection. An instructional post guides beginners in building C2 implants in C++, while Hetty presents an open-source HTTP toolkit with MITM features. Lastly, a cost-effective deep learning rig is constructed using second-hand hardware, overcoming technical challenges.

In the news, US companies face fines for not adhering to SEC's cybersecurity disclosure rules, urging improved incident responses. Research indicates GPT-4 could autonomously execute website exploits, highlighting AI security risks. Avast is fined $16.5 million by the FTC for unsanctioned data sales, necessitating a new privacy framework. Law enforcement disrupts the LockBit ransomware group, seizing $110 million. A compromised Python package led to a supply chain attack, while Malawi's government and ConnectWise ScreenConnect combat separate cybersecurity incidents. U-Haul's data breach impacts 67,000 customers, and Optum confronts a cyberattack suspected from nation-state actors.

# Tradecraft

[#] RepoReaper is an automated tool designed to identify and scan for exposed .git repositories across specified domains and subdomains, useful for security audits and bug bounty programs.
Read More @ kitploit.com
[#] Brutespray is a tool updated to golang for faster and more extensive service bruteforce capabilities using various input formats, and includes changes in supported services, use cases, and usage instructions.
Read More @ securityonline.info
[#] The document lists various patterns and keywords associated with Google Remote Desktop software usage that can potentially be monitored to detect greyware activities when this tool is misused by adversaries to access computers remotely.
Read More @ github.com
[#] Evilginx is evolving into a professional-grade phishing tool with the upcoming Evilginx Pro, while the community collaborates on ethical phishing techniques via a dedicated Discord channel, and recent updates have improved phishing frameworks and explored vulnerabilities like the Windows ZIP mark-of-the-web bypass and insecure cookie handling in web applications.
Read More @ breakdev.org
[#] Blacklight is a privacy tool that examines websites in real time to reveal tracking technologies and data capture methods, urging users to consider privacy extensions or alternative browsers for better protection.
Read More @ themarkup.org
[#] The article presents a comparison between anti-cheat bypass, which targets gaming platforms to gain unfair advantages, and EDR bypass, which evades enterprise detection software to compromise system security, including techniques like code injection and obfuscation, with emphasis on responsible security research versus malicious exploitation.
Read More @ whiteknightlabs.com
[#] The blog series "Hunting for Persistence in Linux" delves into strategies for maintaining unauthorized access on Linux systems, leveraging tools like auditd, Sysmon, and osquery to detect and monitor changes such as unauthorized web shell installations and command executions by the www-data user, which are essential tactics for both attackers to maintain presence and defenders to protect and monitor their systems.
Read More @ github.io
[#] The text outlines methods for persisting access in Linux systems through account creation and manipulation, and provides detection strategies using tools like auditd, sysmon, and osquery.
Read More @ github.io
[#] This technical guide discusses methods for establishing persistence on Linux systems using systemd services, systemd timers, and cron jobs, and outlines how to detect and monitor such activities using tools like auditd, sysmon, osquery, and auditbeats.
Read More @ github.io
[#] This guide provides an introduction to building C2 implants in C++ for beginners, with a focus on interfacing with the Windows API and creating harder to reverse engineer executables, including a foundational project and resources available on GitHub.
Read More @ gitbook.io
[#] Hetty is an open-source HTTP toolkit for security research offering MITM proxy capabilities, request and response interception, project-based organization, and a web-based admin interface.
Read More @ github.com
[#] The blog post details the construction of a cost-effective deep learning rig using second-hand hardware, resolving initial peer-to-peer GPU communication issues by adjusting BIOS settings and downgrading NVIDIA drivers.
Read More @ github.io

# News

[#] US companies and Chief Information Security Officers (CISOs) could face significant fines and legal repercussions if they fail to comply with the Securities and Exchange Commission's new rules on disclosing cybersecurity incidents, emphasizing the need for robust incident response plans and transparent communications with investors.
Read More @ darkreading.com
[#] New research demonstrates the capabilities of GPT-4 in autonomously exploiting website vulnerabilities such as SQL injections, prompting discussions on the security implications of deploying advanced language models.
Read More @ schneier.com
[#] Avast antivirus vendor has been fined $16.5 million by the FTC for selling users' browsing data to third parties without consent and will now need to get express permission before data sales, delete old data, and start a privacy program.
Read More @ darkreading.com
[#] The LockBit ransomware gang, known for extorting over $125 million in 18 months, was disrupted by global law enforcement, with unspent bitcoin totaling more than $110 million found in associated crypto wallets.
Read More @ bleepingcomputer.com
[#] A Python package on PyPI called django-log-tracker was compromised to spread Nova Sentinel malware through a supply chain attack, prompting users to remove the affected version and validate their dependencies.
Read More @ thehackernews.com
[#] The Malawi government has temporarily stopped issuing passports due to a ransomware attack on its immigration department, with President Chakwera refusing to pay the demanded ransom and seeking temporary and long-term security enhancements.
Read More @ darkreading.com
[#] A severe authentication bypass vulnerability in ConnectWise ScreenConnect remote management service (CVE-2024-1709, CVSS 10) and a related file path traversal weakness (CVE-2024-1708, CVSS 8.4) are being exploited, potentially leading to widescale ransomware attacks, and users should immediately apply the provided patch version 23.9.8 to mitigate these risks.
Read More @ darkreading.com
[#] U-Haul has notified customers of a data breach after an unauthorized party accessed their reservation system using stolen credentials, affecting 67,000 customers in the U.S. and Canada, with impacted individuals offered a one-year identity theft protection service.
Read More @ bleepingcomputer.com
[#] A critical use-after-free vulnerability in the Linux kernel's TLS subsystem (CVE-2024-26582, CVSS 8.4) requires immediate patching, specifically for kernel versions 6.0 to 6.8-rc4, with a fixed version available from 6.8-rc5 onwards.
Read More @ securityonline.info
[#] UnitedHealth Group's subsidiary Optum suffered a cyberattack on its Change Healthcare platform, attributed to "nation-state" actors, resulting in disrupted healthcare billing services and leading to nationwide precautions such as disconnecting affected systems and manual prescription processing.
Read More @ bleepingcomputer.com
[#] In India, the government's directives to social media platforms to block certain accounts linked to farmer protests, citing public order, raises concerns over democratic freedoms and a trend of using internet shutdowns and content takedown to suppress dissent.
Read More @ theregister.com
[#] Apple patched a serious security flaw in the Shortcuts app that allowed shortcuts to access and transmit sensitive data without user permission, fixed in the January 2024 updates for iOS, iPadOS, macOS, and watchOS.
Read More @ thehackernews.com
[#] Law enforcement in Maryland has charged individuals in connection with a scheme that laundered over $9.5 million from BEC frauds, using shell companies without legitimate business activities to move funds and drawing attention from multiple agencies due to the diverse nature of victimized organizations.
Read More @ blogspot.com
[#] The Knight ransomware group, previously known as Cyclops and linked to multiple breaches, is reportedly selling the source code for its version 3.0 ransomware tool on a hacker forum, signaling a potential shutdown of their operations.
Read More @ bleepingcomputer.com
[#] LockBit ransomware group was developing a new cross-platform malware variant named LockBit-NG-Dev which is functional but lacks certain features of its predecessors; however, following a coordinated law enforcement takedown, the group's operations have been significantly disrupted, and the malware's source code is now known to security researchers.
Read More @ bleepingcomputer.com
[#] A critical vulnerability in Atlassian Confluence, CVE-2023-22527, which allows unauthenticated OGNL injection and arbitrary code execution, is being actively exploited with over 620K attempts to deliver C3Pool Cryptominer malware, and Imperva's Cloud WAF and WAF Gateway customers are already protected against it.
Read More @ imperva.com
[#] Take It Down is a free service, provided by the National Center for Missing & Exploited Children, designed to assist in the removal of online sexually explicit images and videos taken before the age of 18 by assigning a unique hash value to the content for detection and deletion by participating platforms, without distribution of the actual image or video.
Read More @ ncmec.org

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-02-24

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins