HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Today, CozyHosting box uses session hijacking, addressing Apache DolphinScheduler's vulnerabilities, and introducing tools like Sebel for blocking malicious SSL/TLS certificates. It discusses Android management with Moukthar, data protection via MultiDump and Excel-Anonymizer, and secure file sharing with QR codes. The guide highlights software like AdGuardHome for ad blocking, TikTok Uploader, and Fossify Messages for SMS automation. It also touches on network security with Onionpipe, social media analysis with Hunt Intelligence, and updates on APT-HUNTER, cURL fuzzing, and IoT exploits. Additionally, it explores SQL injection detection, command and control with Havoc C2, and access to the vulnerability database with CVEMAP.

Phishing campaigns target FCC and crypto firm employees with CryptoChameleon, leading to over 100 breaches. An Indian content farm mimics news outlets to push gambling and crypto scams. Hikvision and Ivanti Pulse Secure address critical vulnerabilities. U.S. cybersecurity agencies alert on Phobos ransomware. NSO Group is compelled to share Pegasus source code with Meta. ConnectWise ScreenConnect and SolarWinds fix severe exploits. McAfee Labs highlights malware in PDFs, and Shodan scans for internet-connected devices.

# Tradecraft

[#] The blog post discusses various techniques for remotely resetting expired user passwords on a network, highlighting methods that leverage Outlook Web Access, Remote Desktop Protocol, smbpasswd, ChangePwd, Impacket smbpasswd.py, and Windows PowerShell, among others, along with their respective caveats or prerequisites.
Read More @ n00py.io
[#] A detailed walkthrough explains how to exploit the CozyHosting box on HackTheBox by leveraging a Java Spring Boot Actuator endpoint for session hijacking, finding a command injection vulnerability, extracting database credentials from a Java JAR file, cracking password hashes, and employing sudo with SSH's ProxyCommand option for privilege escalation to gain root access.
Read More @ gitlab.io
[#] Sebel is a Go package that identifies and blocks SSL/TLS certificates linked to botnet command and control servers, through blacklisting, to prevent malicious network communications.
Read More @ github.com
[#] Apache DolphinScheduler versions 3.1.8 and earlier are vulnerable to Remote Code Execution due to unsafe handling of user input in the SwitchTaskUtils class, with additional issues related to deserialization and Kubernetes namespace handling in different CVEs, all of which have fixes available via pull request and configuration adjustments.
Read More @ aliyun.com
[#] Moukthar serves as a remote administration tool for Android, offering capabilities such as notification and SMS listening, call recording, image capture, persistent access, contact management, app listing, file transfer, and device localization, with installation requiring cloning the repository, moving server files, installing dependencies, setting up database credentials, starting the web socket server, and modifying designated server configuration files.
Read More @ kitploit.com
[#] The GitHub project Excel-Anonymizer utilizes the Python script to anonymize sensitive data in Excel files by identifying and replacing personal information with synthetic alternatives, ensuring privacy without the potential for reverse engineering the original data.
Read More @ github.com
[#] The provided information outlines a lightweight and secure distroless Unbound Docker image based on Alpine Linux, focused on privacy and performance, which includes features like DNSSEC and DNS over HTTPS/TLS and is suitable for integration with Pi-hole.
Read More @ github.com
[#] The qr-file-share project on GitHub provides a method to share files through QR codes that can be generated offline and transferred directly to a recipient without needing an internet connection.
Read More @ github.com
[#] A static website provides information on invisible Unicode characters, which could be relevant for cybersecurity experts looking to understand how such characters might be used in coding or cyber attacks.
Read More @ github.com
[#] OpenGFW is an open-source version of the Great Firewall of China designed for Linux systems, offering features like full IP/TCP reassembly, protocol analysis, encrypted traffic detection, flow-based load balancing, and a powerful rule engine for various use cases such as ad blocking, parental control, and traffic analysis.
Read More @ github.com
[#] AdGuardHome is an open-source DNS server designed to block ads and trackers network-wide, with functionalities including custom filter rules, network monitoring, parental controls, and support for encrypted DNS services, which can be installed via automated scripts or other methods detailed on their GitHub repository.
Read More @ github.com
[#] The text outlines the TikTok Uploader, a Selenium-based automation tool for scheduling and uploading videos to TikTok, which includes features like handling mentions, hashtags, stitches, duets, comments, and proxies, along with customization options for web browser selection and headless operations.
Read More @ github.com
[#] Fossify Messages is an open-source Android application that allows users to manage SMS and MMS messages without ads, featuring functionalities like message blocking, SMS backup, privacy on lock screen notifications, an efficient search tool, and a lightweight design.
Read More @ github.com
[#] Onionpipe is a tool for creating secure network tunnels to Onion addresses through Tor, which can be used to access services from anywhere without relying on public IP addresses or third-party services.
Read More @ github.com
[#] Hunt Intelligence offers a platform that aggregates and simplifies the analysis of location-based social media data for security professionals and investigators, featuring an intuitive search function, unlimited queries, and a location-first approach for real-time insights.
Read More @ Huntintel.io
[#] Shells.Systems reports on cyber security developments including Froxlor server management vulnerability, enhancements to APT-HUNTER for Windows event log analysis, methods to circumvent AppLocker security, techniques to disguise malicious traffic using TYK cloud API, updates to NinjaC2 command and control tool, DNSStager improvements to hide payloads, and the creation of new cyber security tools and strategies.
Read More @ Shells.Systems
[#] APT-Hunter is a Python-based threat hunting tool that facilitates the detection of Advanced Persistent Threat (APT) movements by analyzing Windows event logs, providing automated log collection scripts, and generating output compatible with timeline analysis tools like Timesketch.
Read More @ shells.systems
[#] Trail of Bits improved fuzzing for cURL by enhancing code coverage in areas like HSTS and Alt-Svc headers, adding seed files, implementing new libcurl options, and suggested further techniques such as dictionaries, argv fuzzing, and structure-aware fuzzing.
Read More @ trailofbits.com
[#] APTs pose a severe threat to various sectors by utilizing sophisticated, multi-stage attacks to infiltrate networks and extract sensitive data, necessitating robust detection, prevention, and incident response strategies.
Read More @ securityboulevard.com
[#] Sean Pesce discloses a method to exploit the ssh-keygen command on Linux-based IoT devices with sudo privileges by loading a malicious shared library, achieving root access, complete with proof of concept code and detailed implementation guidance available on GitHub.
Read More @ blogspot.com
[#] The repository "SQLi_Sleeps" contains a simple Python script for detecting SQL injection vulnerabilities by sending GET requests to specified URLs with different data inputs and identifying responses that take longer than 20 seconds, indicating potential time-based SQL injection points.
Read More @ github.com
[#] The article details a method for setting up Havoc C2 for stealthy command and control operations by using encrypted HTTPS connections, custom headers, and DLL proxy hijacking to evade detection by antivirus and EDR systems.
Read More @ medium.com
[#] The GitHub repository 'outflanknl/unmanaged-dotnet-patch' contains a proof-of-concept demonstrating how to modify managed .NET functions using unmanaged code, without any related security advisories or solutions provided.
Read More @ github.com
[#] MetaHub is an open-source automation tool designed to enrich security findings from AWS Security Hub or ASFF-compatible scanners, providing context-specific impact evaluations and customizable reporting to enhance vulnerability management.
Read More @ github.com
[#] A Proof of Concept (PoC) for CVE-2023-22527 demonstrates a Remote Code Execution (RCE) vulnerability in Confluence Data Center and Server, which can be mitigated by applying a patch that blocks specific object-navigation language (Ognl) expressions identified by the ConfluenceOgnlGuard class.
Read More @ github.com
[#] CVEMAP is a command-line tool that provides structured access and filtering to multiple vulnerability databases, and it requires Go 1.21 for installation, with functionality to map CVEs to various endpoints like EPSS, KEV, and potential exploits, which can be configured with a ProjectDiscovery Cloud Platform API token.
Read More @ github.com
[#] MultiDump is a tool designed to discreetly extract LSASS memory without detection, using modified legitimate binaries, encryption, and evasion techniques, with further defenses against Windows Defender outlined in post-exploitation scenarios.
Read More @ xre0us.io

# News

[#] A sophisticated phishing operation is targeting FCC and crypto firm employees using a phishing kit called CryptoChameleon, which mimics legitimate login pages to steal sensitive information, with over 100 successful compromises reported and indicators of compromise provided by Lookout researchers.
Read More @ bleepingcomputer.com
[#] BleepingComputer reports a content farm in India impersonating over 60 news outlets like BBC, CNN, and The Guardian to boost SEO for gambling and crypto ventures, and unethically selling ad space; readers should verify authenticity and copyright standing before trust or use.
Read More @ bleepingcomputer.com
[#] Security vulnerabilities CVE-2024-25063 and CVE-2024-25064 in Hikvision's HikCentral Professional platform have been patched; users should update to V2.5.1 or later to mitigate unauthorized access and privilege escalation risks.
Read More @ securityonline.info
[#] NVISO researchers have discovered two advanced TLS-based backdoors, named SparkCockpit and SparkTar, that target organizations through Ivanti Pulse Secure vulnerabilities, offering persistent access and avoiding detection through TLS handshake interception and malicious JAR plugins for boot persistence.
Read More @ securityonline.info
[#] The US cybersecurity agencies CISA, FBI, and MS-ISAC issued an alert about ongoing Phobos ransomware attacks targeting critical sectors, advising to secure RDP services, detect phishing attempts, and implement data backup and recovery plans.
Read More @ securityaffairs.com
[#] The U.S. DoJ has indicted Iranian Alireza Shafie Nasab for a cyber campaign targeting U.S. entities and offers $10 million for information leading to his capture, with charges including computer and wire fraud, and identity theft.
Read More @ thehackernews.com
[#] A U.S. judge has mandated NSO Group to give Meta the Pegasus spyware source code, signaling a win for Meta and highlighting global concerns over privacy rights and the legal shielding of spyware clients' identities.
Read More @ thehackernews.com
[#] Taiwan's largest telecom operator, Chunghwa Telecom, experienced a cyber breach with 1.7TB of data including government agency details stolen and sold on the Dark Web, prompting the defense ministry to call for enhanced cybersecurity measures.
Read More @ darkreading.com
[#] Russia will enforce a VPN ban starting 1st March 2024 to prevent access to banned content and evade surveillance, affecting privacy, free speech, and risks to activists, amid increased efforts to control and monitor internet usage within its borders.
Read More @ hackread.com
[#] German law enforcement has dismantled Crimemarket, the largest German-speaking cybercrime marketplace, leading to the arrest of its operators and seizure of drugs, tutorials for criminal activities, and cash, while continuing to target the platform's users.
Read More @ securityaffairs.com
[#] A critical vulnerability in ConnectWise ScreenConnect software, CVE-2024-1709, has been exploited by multiple ransomware groups including Play and LockBit, targeting an MSP and other organizations, highlighting the urgent need for affected systems to apply the recently released patches.
Read More @ scmagazine.com
[#] Air National Guardsman Jack Teixeira, who leaked classified Pentagon documents on his Discord server, is expected to enter a guilty plea in court, while 15 Air Guard leaders have been disciplined, and the US Air Force is updating its classified data access policies in response to the incident.
Read More @ theregister.com
[#] A California judge has mandated NSO Group to provide WhatsApp with the source code of its Pegasus spyware used between 2018 and 2020, while the identities of its government clients and server architecture remain undisclosed.
Read More @ theregister.com
[#] SolarWinds has patched a critical remote code execution vulnerability, CVE-2024-0692, in their Security Event Manager, and users should update to version 2023.4.1 to prevent unauthenticated attackers from potentially gaining control of their systems.
Read More @ securityonline.info
[#] McAfee Labs has identified a rise in malware distributed through PDFs exploiting embedded URLs and JavaScript for redirecting users to malicious sites, with sophisticated methods like Agent Tesla bypassing defenses and compromising data, highlighting the need for updated software and vigilant email attachment scrutiny.
Read More @ securityonline.info
[#] Apache Ambari version 2.7.8 patches a stored cross-site scripting (XSS) vulnerability identified as CVE-2023-50378, which could allow attackers to steal sensitive data, hijack sessions, or inject malware, and administrators should update their installations promptly to mitigate these risks.
Read More @ securityonline.info
[#] The SolarWinds Security Event Manager (SEM) version 2023.4 and earlier has a critical deserialization vulnerability (CVE-2024-0692) with a severity rating of 8.8, which allows remote code execution and has been resolved in the updated release SEM 2023.4.1 SR.
Read More @ solarwinds.com
[#] Shodan is a search engine for internet-connected devices, offering various services like Maps and Images for visualization, and requires users to log in for advanced search filters and API access.
Read More @ shodan.io
[#] Researchers have developed a model that learns real-world humanoid robot control by predicting sensorimotor trajectories, enabling a humanoid to navigate complex environments like the streets of San Francisco without prior specific training.
Read More @ arxiv.org

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-03-03

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins