HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Today, Windows File Explorer is vulnerable to DLL Hijacking using missing DLLs, notably cscapi.dll, allowing for persistent malicious access. The "awesome-threat-detection" repository on GitHub serves as a resource hub for cyber threat detection and hunting. An exploit in LaborOfficeFree version 19.10 can reveal the MySQL root password using two constants without admin rights. Heartwood, an update to the Radicle Protocol, provides secure, peer-to-peer code collaboration tools. Ubicloud's Linux flowtables integration has shown a 7.5% latency reduction in PostgreSQL benchmarks. MobSleuth simplifies setting up a mobile app hacking lab for Android with a variety of tools in a Dockerized environment. A comprehensive Windows 10 hardening guide script offers security enhancements without sacrificing usability. Nemesis streamlines repetitive tasks in cybersecurity assessments with its Kubernetes-based platform. Exploitation of DevOps environments is detailed, highlighting methods to leverage common security gaps. Another repository showcases techniques for gaining local privilege in Windows via misconfigurations. DNS Spy alerts to DNS changes and ensures DNS consistency with historical data for security assessments. BobTheSmuggler, an open-source tool, evades firewalls using encrypted payloads concealed in image polyglots. Huntress analysts found a healthcare endpoint infiltrated by BlackCat ransomware, which demonstrates the necessity for thorough asset management. Tools for detecting the Sliver C2 framework's traffic and decrypting payloads are available in a distinct repository. The screenshot-to-code repository uses AI, including GPT-4 Vision and DALL-E 3, to turn screenshots into framework-specific code and can replicate websites from URLs.

# Tradecraft

[#] Windows File Explorer can be compromised through DLL Hijacking by identifying missing DLLs like cscapi.dll, creating a malicious DLL, and using a public tool to load it on the target system for persistent access.
Read More @ pentestlab.blog
[#] The "awesome-threat-detection" repository on GitHub is a comprehensive collection of tools, resources, and guides for cyber threat detection and hunting, ranging from detection strategies to datasets, with the aim of supporting security professionals in identifying and mitigating cyber threats.
Read More @ github.com
[#] A new exploit for LaborOfficeFree version 19.10 allows attackers to calculate the MySQL root password using two constants, without needing administrative rights.
Read More @ github.com
[#] Heartwood is the third update of the Radicle Protocol, which aims to offer a secure, peer-to-peer alternative to platforms like GitHub for code collaboration, and includes a command-line interface along with a network daemon that can be installed from binaries, source, or directly from a seed node.
Read More @ radicle.xyz
[#] Ubicloud introduced a seven-line code implementation of Linux flowtables, enhancing their cloud networking performance by reducing latency by 7.5% in a PostgreSQL benchmark test.
Read More @ ubicloud.com
[#] MobSleuth provides scripts for setting up a mobile app hacking lab focused on Android, including a suite of open-source and proprietary tools for security testing, dynamic analysis, and network traffic manipulation within a Dockerized environment.
Read More @ github.com
[#] The provided script is a comprehensive Windows 10 hardening guide, detailing registry and system modifications to enhance security against common cyber threats, with a focus on maintaining usability.
Read More @ github.com
[#] Nemesis is a Kubernetes-based platform designed to automate repetitive tasks during cybersecurity assessments, facilitating data analysis and enhancing operational efficiency for security professionals.
Read More @ github.com
[#] The article details methods for identifying and exploiting security weaknesses in DevOps environments, including authentication flaws, misconfigurations, and vulnerable CI/CD pipelines, while providing commands and tools for each type of attack.
Read More @ hashnode.dev
[#] The repository features a collection of methods and tools for assessing and exploiting various Windows misconfigurations that could lead to local privilege escalation.
Read More @ github.com
[#] DNS Spy is a service for monitoring DNS record changes, alerting users to modifications, verifying nameserver synchronicity, supporting zone transfers for comprehensive coverage, and offering historical DNS data for backup and security assessment purposes.
Read More @ dnsspy.io
[#] BobTheSmuggler is a new open-source tool created by Harpreet Singh that compresses, encrypts payloads in image polyglots, and employs HTML smuggling to bypass firewalls and data loss prevention systems for secure and stealthy payload delivery during penetration testing.
Read More @ helpnetsecurity.com
[#] Huntress analysts discovered a healthcare endpoint compromised by the BlackCat ransomware, leveraging a second ScreenConnect instance, using techniques like disabling Windows Defender, employing embedded ransomware commands, and initiating lateral movement in the network, underscoring the importance of comprehensive asset inventory and attack surface reduction.
Read More @ huntress.com
[#] The Sliver C2 Forensics repository provides tools and rules for detecting Sliver command and control (C2) traffic and decrypting payloads, supported by technical documentation on threat hunting.
Read More @ github.com
[#] A GitHub repository named screenshot-to-code provides a web application that utilizes GPT-4 Vision and DALL-E 3 to transform screenshots into clean code in various frameworks, and now offers the option to replicate live websites via URL input.
Read More @ github.com

# News

[#] Microsoft has been investing in archival storage research to develop economical, sustainable, and high-bandwidth systems using advanced media like DNA and silica for cloud-scale data preservation, addressing the increasing global data storage requirements.
Read More @ dshr.org
[#] Since August 2023, Dataplane.org has detected a novel pattern in DNS scanning called Destination-Adjacent Source Address Spoofing, where fake source IPs neighboring the target's IP are used in scans, potentially signifying either a new mapping technique or an academic study from China, with efforts made to triangulate the true origin using IP TTL values.
Read More @ substack.com
[#] The BlackCat ransomware group, also known as ALPHV, has reportedly conducted an exit scam, shutting down their operation and claiming that the FBI seized their site, a move that aligns with their history of changing names and tactics after law enforcement scrutiny and affiliate accusations of stolen ransom payments.
Read More @ bleepingcomputer.com
[#] A retired US Army Lieutenant Colonel and former Air Force civilian employee faces charges for allegedly transmitting classified defense information to an individual on a dating app who was posing as a Ukrainian woman.
Read More @ theregister.com
[#] The RA World ransomware group, formerly known as RA Group, leverages the leaked Babuk source code to deploy high-impact multistage cyberattacks on diverse international targets, necessitating a robust multi-layered security strategy that includes employee education on social engineering and routine data backups to mitigate risks.
Read More @ darkreading.com
[#] Meta Platforms' services including Facebook, Instagram, Messenger, and Threads are experiencing a global outage with users facing login issues since approximately 4:30 PM GMT, with no official statement yet but users are advised to follow Meta's official channels for updates and avoid repeated login attempts.
Read More @ hackread.com
[#] Cybersecurity analysts uncovered that attackers are exploiting QEMU, a free hypervisor and emulator, to create covert network tunnels, bypass security, and establish communication channels without raising suspicion, suggesting enterprises to implement multi-level protection including continuous network and endpoint monitoring to detect such activities.
Read More @ bleepingcomputer.com
[#] Microsoft patched a Windows zero-day vulnerability that was exploited by North Korea's Lazarus group for six months to install the stealthy and advanced rootkit "FudModule", which interacts directly with the OS kernel by exploiting the appid.sys driver.
Read More @ packetstormsecurity.com
[#] Facebook and Instagram users were involuntarily logged out and faced login issues due to incorrect password errors during a global outage, which was resolved after Meta's engineering teams intervened.
Read More @ bleepingcomputer.com
[#] A retired U.S. Air Force employee with Top Secret clearance was arrested for sharing classified military details about the war in Ukraine on a dating app, potentially facing up to 10 years in prison if convicted.
Read More @ packetstormsecurity.com
[#] Android's "run-as" tool can be manipulated to let an attacker bypass app debuggability checks and gain access to privileged app data due to newline injection vulnerability, with a patch released in the March 2024 Android Security Bulletin to address the flaw.
Read More @ meta.security
[#] Cybercriminals merged the GhostSec and Stormous groups, launching GhostLocker 2.0 ransomware in double-extortion attacks targeting diverse organizations across the Middle East, Africa, and Asia, with defenses including in-depth security measures and updated detection signatures recommended by Cisco Talos.
Read More @ darkreading.com
[#] Rapid7 criticized JetBrains for not coordinating on vulnerability disclosure of two critical flaws in the TeamCity CI/CD server, recommending immediate patching with versions 2023.11.4 or the security patch plugin to mitigate risks of administrative control loss and potential supply chain attacks.
Read More @ theregister.com
[#] The European Commission has fined Apple €1.8 billion for anti-competitive practices, as they restricted alternative music streaming services on the App Store, a violation of EU antitrust laws.
Read More @ engadget.com
[#] A team of hackers exploited vulnerabilities in Google's AI, including a denial of service in Google Cloud and a data exfiltration issue in Bard, leading to a collective $50,000 reward and identification of critical security flaws during a Bug Bounty event.
Read More @ landh.tech
[#] Security researchers successfully exploited a flaw in Google's AI and earned a $50,000 bounty; a SAML authentication bypass was identified in go-saml; methods for exploiting CSP wildcards on Google domains were discussed; and a new tool, ReqsMiner, was introduced for finding CDN request inconsistency vulnerabilities through grammar-based fuzzing.
Read More @ dayzerosec.com
[#] Researchers in Israel have demonstrated a new type of malware, Morris II, which can manipulate AI-powered email systems into spreading malicious prompts that compromise data integrity and propagate further infections, prompting the need for AI developers to create systems that clearly distinguish between user input and machine output to prevent such attacks.
Read More @ darkreading.com
[#] Marco Ivaldi reported various security flaws in RT-Thread OS, including buffer overflows and weak randomness sources, with some fixed by developers but others still open, and details are now public after coordinated disclosure efforts.
Read More @ humanativaspa.it
[#] HashiCorp's Vault has a critical flaw, CVE-2024-2048, that allows authentication bypass due to flawed client certificate validation, affecting versions before 1.15.5 and 1.14.10 using non-CA-signed certificates; patching to the latest versions is advised.
Read More @ securityonline.info
[#] Cybersecurity alert: A new banking Trojan named CHAVECLOAK is targeting Brazilian users through phishing and utilizes DLL sideloading in Windows to steal banking credentials, with the recommendation to use caution, enable 2FA, update software regularly, and avoid suspicious links to mitigate risk.
Read More @ hackread.com
[#] A cybercrime group known as Savvy Seahorse uses CNAME DNS records to redirect victims to fraudulent investment platforms and evade detection while selectively excluding certain countries from their scams.
Read More @ thehackernews.com
[#] Linux systems require urgent patching due to two critical vulnerabilities in the DNF package manager's dnf5daemon-server component: a local root exploit vulnerability (CVE-2024-1929) that allows attackers to execute arbitrary code, and a denial of service vulnerability (CVE-2024-1930) that enables them to create excessive sessions, both of which have been addressed through specific upstream commits.
Read More @ securityonline.info
[#] The verification process for hakin9.org, involving a check to secure the connection, has been completed successfully, allowing access to the site's content.
Read More @ hakin9.org
[#] A cybersecurity expert in Hanoi used a homemade antenna to collect vulnerable Wi-Fi passwords from 10,000 networks, showcasing the risk of simple passwords and the importance of stronger security measures like complex passwords and separate network setups for guests.
Read More @ vnexpress.net
[#] A sophisticated phishing operation named "SubdoMailing" targeted over 8,000 compromised subdomains from brands such as eBay and VMware, bypassing standard email security like SPF and DKIM, with Guardio Labs providing a tool for organizations to check if their domains are affected.
Read More @ darkreading.com
[#] Facial recognition tools like PimEys and AWS Rekognition were crucial in the identification of long-hidden RAF fugitive Daniela Klette, highlighting that social media engagement and background appearances in photographs can compromise attempts to remain unphotographed and therefore, anonymous.
Read More @ medium.com

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-03-06

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins