HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Techniques for discreetly loading DLLs using Windows Thread Pool API's and exploiting Windows kernel vulnerabilities through ROP chains are explained. Clément Amic focuses on exploiting Java deserialization flaws, and the GAP-Burp-Extension helps with fuzzing web apps. Learn a Direct Pointer execution method for shellcode, and check out RustRedOps, a Rust-based repository for Red Team tools. GitAlerts aids in monitoring sensitive files on GitHub, while an exploit, CVE-2023-6241, is out for bypassing memory protections on Pixel 8. Tips for preventing secrets leaks in Docker images, detecting yellow tracking dots with Dotspotter, and exploiting facial recognition systems are discussed. Emora emerges as a tool for searching social network usernames, while various tools for finding JavaScript vulnerabilities are listed. An "Awesome ChatGPT Prompts" repository offers creative prompts, and techniques to exploit identity providers are covered. GTPDOOR Scan helps detect malware-infected hosts, and a list of satellite OSINT tools is compiled. Learn about Ralph Merkle's cryptographic work, and discover Kiddy, a tool for obscuring Linux kernel information.

# Tradecraft

[#] This blog post explains how to discreetly load DLLs using Windows Thread Pool API's I/O completion callbacks to avoid detection by EDR systems, with a detailed walkthrough and code examples provided.
Read More @ fin3ss3g0d.net
[#] This article dives into advanced exploit techniques for Windows kernel vulnerabilities, discussing alternate methods to execute code at the kernel level without violating protective mechanisms like HVCI and Kernel CFG by using Return-Oriented Programming (ROP) chains to leverage existing signed code.
Read More @ github.io
[#] Clément Amic shares advanced techniques for exploiting Java deserialization vulnerabilities in web applications, focusing on bypassing security measures like WAFs and EDRs to exfiltrate data discreetly and potentially hijack web server flows.
Read More @ synacktiv.com
[#] The GAP-Burp-Extension is a tool for Burp Suite that identifies possible endpoints, parameters, and creates a wordlist specifically for the target to assist in fuzzing and testing web applications.
Read More @ kitploit.com
[#] The blog post explains how to use Direct Pointer execution as an evasion technique for running shellcode undetected by avoiding the creation of new threads and API calls, making it difficult for antivirus and endpoint detection to flag the binary's execution processes.
Read More @ github.io
[#] RustRedOps is a repository that provides a collection of advanced Red Team tools and techniques using Rust for offensive cybersecurity tasks, including payload execution, process injection, anti-analysis, and more.
Read More @ github.com
[#] GitAlerts is a tool for detecting and monitoring sensitive files and secrets in public repositories of GitHub organization users, with features for scanning, reporting, and alerting through Slack integration.
Read More @ securityonline.info
[#] A security researcher disclosed CVE-2023-6241, an exploit that bypasses Memory Tagging Extension's protections on Pixel 8 by using a GPU bug to manipulate kernel code execution, which was addressed in Android's March security update.
Read More @ github.blog
[#] To prevent secrets from leaking in Docker images, use multi-stage builds to exclude secrets from the final image or BuildKit to inject secrets safely during the build process without including them in the final image.
Read More @ trufflesecurity.com
[#] Dotspotter is a tool to detect hidden yellow tracking dots in printed documents by uploading a high-quality scanned image, which it analyzes to reveal any coded information.
Read More @ forensicdots.de
[#] This article explains how to exploit security weaknesses in facial recognition and lock systems of turnstiles, illustrating attacks like using high-resolution photos with masks and lock bumping techniques, and advising on protective measures against such vulnerabilities.
Read More @ com.br
[#] Emora is a new open-source OSINT tool with a graphical user interface that helps users search for usernames across various social networks, with an easy installation process and frequent updates.
Read More @ github.com
[#] Learn to find and exploit vulnerabilities in JavaScript using manual inspection and automated tools like wget, RegHex, keyhacks, Gau, waybackurls, httpx, subjs, Nuclei, Mantra, SecretFinder, and JSFScan.sh to enhance bug bounty hunting.
Read More @ medium.com
[#] GitAlerts is a tool that enables organizations to detect and monitor secret leaks in public repositories of their GitHub users, offering features such as scanning, monitoring, Slack notifications, and integration with TruffleHog for secret detection.
Read More @ github.com
[#] The repository "Awesome ChatGPT Prompts" is a curated collection of examples designed to enhance the user experience with ChatGPT, offering customized prompts for various applications, from code generation to creative writing, and even includes links to additional resources like e-books and a prompt generator app.
Read More @ github.com
[#] Identity providers like AzureAD, Okta, Ping, and OneLogin have techniques that can be exploited by Red Teamers to intercept credentials and authenticate as other users, but awareness and proper defense mechanisms are critical to mitigate these security risks.
Read More @ xpnsec.com
[#] A new multithreaded network scanning tool called GTPDOOR Scan has been released to detect hosts infected with the GTPDOOR malware, offering three different scanning methods to accommodate various firewall configurations.
Read More @ github.com
[#] The list provided is a compilation of satellite Open Source Intelligence (OSINT) tools and resources for real-time tracking, visualization, and analysis of man-made objects in Earth's orbit, useful for anyone interested in space activity monitoring.
Read More @ start.me
[#] Kiddy is a Linux kernel modification tool that hides its version information to deflect kernel exploitation by using security through obscurity techniques and altering kernel function behavior.
Read More @ github.com

# News

[#] Trend Micro, a cybersecurity company, collaborates with law enforcement to disrupt operations of LockBit ransomware, a service used by criminals to attack global organizations, by introducing more stable and innovative ransomware versions and providing managed detection and response services.
Read More @ trendmicro.com
[#] The U.S. Federal Trade Commission has issued a warning about scammers posing as its employees to trick people into paying money, providing safety guidelines and urging victims to report incidents on their website.
Read More @ bleepingcomputer.com
[#] Nations Direct Mortgage reported a data breach affecting 83,000 individuals, compromising personal details but found no evidence of data exfiltration or fraudulent use, and is providing free identity monitoring services to the impacted parties.
Read More @ packetstormsecurity.com
[#] Cloudflare experienced a 22% loss in hosted domains following the shutdown of .tk, .cf, and .gq domains by Freenom, impacting nearly all websites previously using these top-level domains due to legal issues and abuse complaints.
Read More @ packetstormsecurity.com
[#] Research at Rhino Security Labs revealed an unauthenticated command injection vulnerability in the Progress Kemp LoadMaster, tracked as CVE-2024-1212, which allowed attackers to gain control if they could access the admin web interface; a patch is now available which administrators should apply immediately to secure their devices.
Read More @ rhinosecuritylabs.com
[#] The post discusses the mechanics of password-spraying tools and strategies for their effective utilization in gaining unauthorized access.
Read More @ reddit.com
[#] Ukrainian law enforcement has detained three individuals for hacking over 100 million email and Instagram accounts and selling them to fraudsters on the darknet, recommending users to strengthen their security with complex passwords and multi-factor authentication.
Read More @ bleepingcomputer.com
[#] Oracle has advised against installing the macOS 14.4 update on Apple silicon CPUs because it causes Java processes to unexpectedly terminate, with no current fix or workaround available.
Read More @ bleepingcomputer.com
[#] The Imperva 2024 Report reveals that APIs, which make up 71% of internet traffic, are increasingly targeted by cybercriminals, due to common security oversights like shadow, deprecated, and unauthenticated APIs, resulting in annual costs of up to $75 billion for businesses; the report advises continuous API inventory and monitoring, risk assessment, and integrated protection strategies to mitigate this threat.
Read More @ thehackernews.com
[#] A failure to specify vendor and product IDs in USBGuard configurations can be exploited to circumvent USB device authorization policies on Linux systems.
Read More @ reddit.com
[#] A critical vulnerability in FortiOS SSL VPN identified as CVE-2024-21762 allows for remote code execution and affects over 133,000 systems, which requires immediate patching to the specified secure versions to mitigate risks.
Read More @ securityonline.info
[#] Two serious vulnerabilities in the Automatic WordPress plugin, CVE-2024-27956 allowing SQL query manipulation and CVE-2024-27954 enabling file downloads, have been fixed in version 3.92.1.
Read More @ securityonline.info
[#] A Moldovan national was sentenced to 42 months in prison for operating E-Root Marketplace, a site selling over 350,000 stolen credentials that led to ransomware and tax fraud attacks, and law enforcement has recovered $2.3 million in cryptocurrencies from a related romance scam.
Read More @ thehackernews.com
[#] A new version of AcidRain malware called AcidPour is targeting Linux x86 devices, designed to erase data on RAID arrays and UBI filesystems, with unknown victims and scale of attack, while brute-force methods are being used against Linux systems to create backdoor entries for malware like ransomware and DDoS bots.
Read More @ thehackernews.com
[#] Brazilian law enforcement, with support from Interpol, captured five individuals linked to the Grandoreiro banking Trojan by correlating malware samples.
Read More @ darkreading.com
[#] Researchers have uncovered a "pig butchering" cryptocurrency scam network where criminals have shifted at least $75.3 billion through exchanges, using complex patterns and multiple currencies to disguise illegal transfers and victimize primarily US-based users.
Read More @ dshr.org
[#] Cybersecurity researchers have discovered that attackers are using document publishing sites like FlipSnack and Issuu to host phishing scams, avoiding detection by email filters and stealing user credentials through fake Microsoft 365 login pages.
Read More @ thehackernews.com
[#] The Apex Legends Global Series tournament was postponed after a remote code execution exploit was used to hack two players' in-game clients, compromising the event's integrity.
Read More @ securityaffairs.com
[#] Microsoft's AITM honeytoken may provide an alert to impersonation attacks, but attackers can quickly identify and resolve the alert, making it a less effective defense strategy.
Read More @ reddit.com
[#] Ethereum's CREATE2 opcode is being exploited in cyber-attacks to empty cryptocurrency wallets, urging a need for enhanced security measures.
Read More @ theregister.com
[#] A new malware called AcidPour targets Linux x86 IoT and network devices, wipes data, and may pose a bigger threat by affecting a wider range of systems compared to its predecessor AcidRain.
Read More @ bleepingcomputer.com
[#] NHS Dumfries and Galloway in Scotland is responding to a cyberattack which may have exposed patient and staff data, and while there's no immediate threat to life, they remind everyone to be cautious with unknown communications and report any suspicious activities.
Read More @ hackread.com
[#] Over 83,000 clients of Nations Direct Mortgage had personal data compromised in a cyberattack, prompting legal actions and the provision of free identity protection services.
Read More @ scmagazine.com
[#] Mintlify, an AI documentation firm, had a data breach leading to 91 GitHub tokens being exposed due to a system flaw, but further misuse of tokens is under investigation.
Read More @ scmagazine.com
[#] A new variant of AcidRain wiper malware, called AcidPour, has been enhanced to target embedded device memory and make data recovery more difficult, posing a significant threat to various devices and systems.
Read More @ scmagazine.com
[#] The U.S. government is actively breaking down the Chinese cyberespionage operation Volt Typhoon, which poses a serious threat to the nation's critical infrastructure, while also forming task forces to protect the water supply from cyberattacks.
Read More @ scmagazine.com
[#] Chinese advanced persistent threat group Earth Krahang has compromised over 70 organizations worldwide by exploiting vulnerabilities in Openfire servers and Control Web Panel, using tactics like spear-phishing and VPNs to infiltrate networks.
Read More @ scmagazine.com
[#] Social media influencers, particularly those giving financial advice, are being targeted by identity thieves using fake brand endorsement deals to obtain personal information; authorities from various countries are advocating for stronger fraud prevention on social platforms.
Read More @ malwarebytes.com
[#] Atos' stock value dropped by 20% after Airbus ended talks to buy Atos' big data and security units, leaving Atos looking for other strategic options for these assets while facing upcoming debt repayments.
Read More @ theregister.com
[#] A telecom manager pled guilty to conducting illegal SIM swaps using his managerial credentials, in exchange for Bitcoin payments, allowing co-conspirators to hijack customers' phone numbers and access their accounts, with sentencing scheduled for July 2024.
Read More @ malwarebytes.com
[#] Trend Micro researchers uncovered that the Earth Krahang APT group breached over 70 government organizations worldwide, using spear-phishing and exploiting vulnerabilities such as CVE-2023-32315 and CVE-2022-21587 for cyberespionage.
Read More @ securityaffairs.com
[#] A phishing campaign, called Operation PhantomBlu, is using a Microsoft Office exploit involving OLE template manipulation to distribute NetSupport RAT, by tricking victims into opening a bogus salary report email and running a malicious embedded printer icon.
Read More @ thehackernews.com
[#] The website Have I Been Pwned provides an overview of various data breaches, allowing users to check if their personal information has been compromised by searching through exposed email addresses, passwords, and other sensitive data from numerous incidents across various services.
Read More @ haveibeenpwned.com
[#] The SEC has fined two investment advisers a total of $400,000 for falsely claiming to use AI technology in their financial products, a practice known as "AI washing."
Read More @ bleepingcomputer.com
[#] The Chinese hacking group Earth Krahang has infiltrated 70 organizations worldwide, mostly government entities, using spear-phishing and exploiting server vulnerabilities, prompting the need for stronger cyber defenses and password management.
Read More @ bleepingcomputer.com
[#] Over 900 websites using Google Firebase were found with misconfigurations, exposing sensitive data like user passwords and billing details; website owners are advised to secure their Firebase configurations to prevent data leaks.
Read More @ theregister.com
[#] Fujitsu has announced a security breach involving malware which possibly led to unauthorized access to customer data, prompting the company to strengthen their defenses, notify affected individuals, and report the incident to the appropriate authorities.
Read More @ theregister.com
[#] Over 133,000 Fortinet devices remain unpatched for a critical remote code execution vulnerability CVE-2024-21762, exposing them to potential cyber-attacks, while a new SQL injection bug CVE-2023-48788 in FortiClient EMS also needs immediate patching.
Read More @ theregister.com
[#] Fortra has fixed a critical remote code execution bug, CVE-2024-25153, in its FileCatalyst file transfer tool, and users are advised to update to version 5.1.6 Build 114 to prevent potential cyber attacks.
Read More @ securityaffairs.com
[#] Microsoft plans to stop supporting RSA keys under 2048 bits for TLS server authentication to improve security, and organizations should upgrade their keys to avoid connection issues with Windows servers.
Read More @ bleepingcomputer.com
[#] SonicWall Capture Labs researchers have identified a trend of Android adware apps imitating popular games to deliver unwanted ads and collect personal data, recommending users to check app permissions and legitimacy, and to use security solutions for protection.
Read More @ securityonline.info
[#] SonicWall researchers have discovered a new version of WhiteSnake malware that steals sensitive data and can remotely control infected computers; users should avoid suspicious downloads, update software, and use security tools to protect themselves.
Read More @ securityonline.info
[#] Microsoft announced the release of Copilot for Security, a generative AI tool that increases efficiency and accuracy for security teams by providing natural language insights from security products and custom prompts with support for multiple languages, aiming to improve incident response and analysis.
Read More @ microsoft.com
[#] The blog env.fail reports an infosec issue where a singular vulnerability led to the compromise of 900 sites, affecting 125 million accounts.
Read More @ env.fail
[#] Researchers discovered a widespread misconfiguration in Firebase that exposed approximately 125 million user records, including plaintext passwords and financial details, across 900 websites, prompting them to inform the affected parties and suggest fixes for the security weakness.
Read More @ env.fail
[#] The website GLOBE_ is experiencing unusually high traffic and has reduced search quality temporarily, urging users to sign up for updates on the upcoming launch of Explorer V2.
Read More @ globe.engineer
[#] Real-time air quality data from the World Air Quality Index project shows pollution levels worldwide based on particulates, ozone, and various gases, aiding in personal and public health risk assessment.
Read More @ waqi.info
[#] The public cadastral map has been updated with a new layer titled "Belarus Literary" which features the state land registry, addresses, unconstructed plots, territorial zoning, and more data layers for enhanced attribute information.
Read More @ nca.by
[#] EasyCounter is a web service providing insights into websites' traffic, user engagement, domain data, safety, server technology, and presence on social media for web analytics and competitive analysis.
Read More @ easycounter.com
[#] The Middle East Forum provides a database to help law enforcement identify over 125 jihadist groups recruiting in the West and offers intelligence bulletins on threats and training seminars for identifying signs of extremism linked to past attacks like the Boston bombings.
Read More @ meforum.org
[#] The CrisisWatch global conflict tracker reports escalations in several regions, including a significant increase in violence in Gaza, political instability in Chad, and mounting tensions in Senegal and the DR Congo, while also noting potential peace opportunities in the Israel/Palestine conflict.
Read More @ crisisgroup.org

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-03-20

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins