HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Researchers at Horizon3.ai have disclosed a critical vulnerability (CVE-2024-1403) in Progress Software OpenEdge, advising users to upgrade to secure versions. Minder by Stacklok offers an open source software supply chain security platform with free services for open source repositories. Cloudtopolis facilitates password cracking for free using Google Cloud services. A technical guide on malware development for macOS is provided, delving into the Mach API and various attack techniques. The Frida toolkit helps identify DLL sideloading exploits in Windows, while the Windows Feature Hunter tool automates this. A GitHub repository, "process-injection," presents a proof-of-concept for process injection in Windows. The article discusses Android app vulnerabilities related to deep links and WebViews while proposing mitigation approaches. SharpCovertTube enables remote command execution on Windows via YouTube video QR codes. The repository WinHotchkiss/Hotchkiss_OSINT compiles various OSINT resources, while EmploLeaks is an OSINT tool focusing on employee credential leaks. "EliteServices" by 'sethycake' provides Python tools for network stress testing and information. The Human Intelligence Narrowing Tool Set (HINTS) aids in organizing OSINT research, and Bigbro is an OSINT utility designed to locate individuals through a clicked link. HackingEnVivo's Doxing script streamlines the doxxing process, and H4X-Tools offers a toolkit for web scraping and OSINT activities. The OSINT resource compilation lists various tools for cybersecurity information gathering, including specialized software. "The_spy_job" by XDeadHackerX is yet another OSINT collection tool, and finally, Bython introduces a Python preprocessor enabling brace-based syntax.

Roku experienced a data breach affecting over 15,000 customer accounts, leading to fraudulent activities. The Cybersecurity and Infrastructure Security Agency (CISA) faced a breach from Ivanti product vulnerabilities. A counterfeit Leather wallet app was implicated in cryptocurrency theft and removed from the Apple App Store. QNAP addressed security flaws in NAS devices, and a banking trojan called CHAVECLOAK targeted Brazilian users, underscoring the urgency of robust cybersecurity measures. Paysign investigates a data breach potentially impacting 1.2 million records. New sanctions target individuals associated with Intellexa Consortium's Predator spyware.

# Tradecraft

[#] Researchers at Horizon3.ai have published details and a proof-of-concept exploit for CVE-2024-1403, a critical authentication bypass vulnerability in Progress Software OpenEdge, urging users to update to patched versions 11.7.19, 12.2.14, and 12.8.1 to prevent unauthorized access.
Read More @ securityaffairs.com
[#] Minder by Stacklok is an open source software supply chain security platform that provides proactive security checks, policy enforcement, artifact attestation, and dependency management for development teams, with a public instance available for free for open source repositories.
Read More @ github.com
[#] Cloudtopolis is a tool that uses Google Cloud Shell and Google Colaboratory to enable unattended and free password cracking by setting up Hashtopolis agents, which can be further scaled by repeating the setup process with additional Google accounts.
Read More @ github.com
[#] This article provides a technical guide on designing, developing, and understanding malware for macOS, focusing on the Mach API and macOS architecture, and covering system calls, code injection techniques, and persistence methods used for cyber security exploitation and defense.
Read More @ github.io
[#] Frida, a dynamic instrumentation toolkit, enables security researchers to identify potential DLL sideloading exploits in Windows applications, with the Windows Feature Hunter tool automating this process for efficiency and scale.
Read More @ securityintelligence.com
[#] A GitHub repository called "process-injection" hosts a simple proof of concept to demonstrate how process injection techniques operate in Windows, targeting Microsoft Edge for memory allocation, shellcode writing, and execution.
Read More @ github.com
[#] The article details vulnerabilities in Android app deep links and WebViews, demonstrating exploitations like open redirects and file theft while providing mitigation strategies such as proper input validation and secure WebView configurations.
Read More @ medium.com
[#] SharpCovertTube is a tool designed to remotely control Windows systems via commands hidden in YouTube video QR codes, with features for both straightforward and AES-encrypted command execution and options for logging and DNS-based exfiltration of command responses.
Read More @ github.com
[#] WinHotchkiss/Hotchkiss_OSINT is a public GitHub repository providing a compilation of OSINT (Open Source Intelligence) resources and tools for target identification in various domains including social media, real estate, and satellite imagery.
Read More @ github.com
[#] EmploLeaks is an open-source intelligence (OSINT) tool designed to uncover employees of a specific company who might have compromised credentials exposed in a custom COMB database, and details the installation process and functionality for collecting information from LinkedIn and checking associated personal emails against the leaked data.
Read More @ github.com
[#] The GitHub repository 'EliteServices' by user 'sethycake' is a collection of Python-based tools for IP stress testing, obtaining IP information, and checking IP ports, made to assist users in evaluating network robustness.
Read More @ github.com
[#] The Human Intelligence Narrowing Tool Set (HINTS) is an open-source intelligence (OSINT) tool for organizing research on individuals and organizations with a React interface for tasks, a Strapi CMS backend, and a knowledge base filled with OSINT resources.
Read More @ github.com
[#] Bigbro is an OSINT tool designed for pinpointing peoples' location within a 1-30 meter radius by using a link they access, compatible with kali linux and termux, featuring both a free and premium version.
Read More @ github.com
[#] HackingEnVivo's Doxing repository on GitHub offers a Python script for information gathering and espionage, aiming to simplify the process of finding data on individuals through automated website searches, and is compatible with various operating systems such as Kali Linux, Parrot Security OS, Windows 10, and Ubuntu.
Read More @ github.com
[#] The H4X-Tools repository on GitHub provides an open-source toolkit for web scraping, OSINT, data gathering, and other hacking activities, requiring Python for setup and offering various utilities including IG Scrape, Phone Lookup, and Port Scanner.
Read More @ github.com
[#] The text lists various open-source intelligence (OSINT) tools and resources used in cybersecurity to gather information, perform forensic analyses, automate tasks, and aid in investigations, including specialized software for social media analysis, data extraction from mobile devices, and digital evidence recovery.
Read More @ github.com
[#] The repository "The_spy_job" by XDeadHackerX is a tool designed for Open Source Intelligence (OSINT) gathering, automating the collection of information from various sources such as websites, social media, emails, phone numbers, IP addresses, and images, while emphasizing the creator's disclaimer of non-responsibility for misuse.
Read More @ github.com
[#] Bython is a Python preprocessor that allows coding with braces instead of indentation, compatible with existing Python modules, and can be installed or uninstalled via pip.
Read More @ pypi.org

# News

[#] Roku experienced a data breach where over 15,000 customer accounts were compromised due to credential stuffing attacks, leading to fraudulent purchases with these accounts being subsequently sold for $0.50 each on account marketplaces.
Read More @ bleepingcomputer.com
[#] CISA's systems were compromised by hackers exploiting Ivanti product vulnerabilities, prompting the immediate offline response of impacted systems and an advisory urging organizations to assess the risk of continued operation of these Ivanti devices.
Read More @ scmagazine.com
[#] An imposter Leather wallet app was distributing on the Apple App Store, functioning as a cryptocurrency drainer by stealing users' assets with a fake secret passphrase input, which has now been removed following the company's and media reports.
Read More @ bleepingcomputer.com
[#] QNAP has released patches for multiple security vulnerabilities, including a critical flaw allowing unauthorised access to NAS devices, and advises users to update to the latest software versions to mitigate the risk of exploitation.
Read More @ packetstormsecurity.com
[#] A new banking trojan named CHAVECLOAK targeting Brazilian users through phishing with PDFs, leverages DLL side-loading for information theft, and is also distributed via a sophisticated ecosystem involving smishing, vishing, and Phishing as a Service platforms like "Mr. Robot" and "JOKER RAT".
Read More @ thehackernews.com
[#] A new information-stealing malware called Planet Stealer is compromising computers to exfiltrate passwords, crypto wallets, and other data, requiring strong cybersecurity measures including skepticism towards email attachments, up-to-date software, robust antivirus solutions, and the use of unique passwords managed by a password manager.
Read More @ securityonline.info
[#] Paysign is investigating a potential data breach where a hacker claims to have leaked over 1.2 million consumer records, while other reports include a breach at Acuity with federal data exposure and an unsecured server at Glosbe revealing user data.
Read More @ scmagazine.com
[#] The United States has sanctioned Tal Jonathan Dillian and Sara Aleksandra Fayssal Hamou for their roles in the Intellexa Consortium's sale of Predator spyware, leading to concern within the spyware industry about the reliability of customers and the impact of political actions on their operations.
Read More @ scmagazine.com
[#] Researchers are using large language models (LLMs) to successfully predict the content of redacted text based on the size of redaction rectangles, exposing potential privacy concerns and highlighting the need for more effective redaction methods.
Read More @ schneier.com
[#] BianLian ransomware operators are exploiting JetBrains TeamCity vulnerabilities CVE-2024-27198 or CVE-2023-42793 for initial access and deploying a PowerShell version of their backdoor when their Go-based version fails, as they pivot to extort by exfiltrating data.
Read More @ thehackernews.com
[#] Security researchers at GuidePoint discovered a new PowerShell backdoor used by BianLian ransomware following Avast's decryption tool release, leveraging encryption and Runspace Pools for stealthier command execution and connection to their C2 server.
Read More @ securityonline.info
[#] Toolify provides a categorized directory of AI tools and applications, including a ranking system by usage, revenue, and regional popularity, with featured articles on using open-source intelligence for geolocation and discovering AI tools for various functions.
Read More @ toolify.ai
[#] On March 11, 2024, Mozilla announced Speedometer 3, a cross-industry collaboration benchmark developed to test and drive browser performance improvements across the web, which affected real-world Firefox user experience positively by implementing wide-ranging bug fixes and optimizations.
Read More @ mozilla.org
[#] This repository on GitHub lists key services and resources for open-source intelligence work focused on Poland and Polish-speaking communities, covering a wide range of categories from public registries, social media, and personal identification to specialized domains like maritime transport and SIGINT.
Read More @ github.com
[#] A discovered security issue allows authentication to all domains within a forest across external non-transitive trusts in Windows Active Directory, meaning attackers can exploit supposedly isolated domain trusts to gain broader access, with no current fix from Microsoft except avoiding external trusts entirely.
Read More @ exploit.ph

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-03-12

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins