HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

This series helps with emulating IoT malware using Docker and Qiling. A pro explains using Velociraptor on VMware ESXi hypervisors for forensics. Security flaws in ChatGPT allow XSS attacks. A JavaScript file cleverly hides AsyncRAT deployment. There's a binary exploitation roadmap from basics through pwn.college. SARA teaches making Android Trojans. BruteUnpackage cracks compressed file passwords. Demonstrate elevated privileges with CVE-2024-1086 on Linux. CVE-2023-48788 exploit for Fortinet's FortiClient EMS is on GitHub. Understand Open Redirect vulnerability in IIS using JavaScript. CVE-2024-25153 proof-of-concept affects Fortra FileCatalyst Workflow. Xiaomi WiFi routers had security issues now fixed. A 64-bit library loads DLLs stealthily. Lastly, Meckazin/ChromeKatz extracts browser cookies from memory.

# Tradecraft

[#] The first part of a series on emulating destructive IoT malware outlines setting up a secure environment using Docker and the Qiling framework to isolate and analyze malware without damaging the host system.
Read More @ cyber.wtf
[#] A cybersecurity professional outlines a method for using Velociraptor's new features to perform forensic analysis on VMware ESXi hypervisors by accessing their filesystem over SSH, without deploying an agent, to collect, triage, and analyze potential security threats.
Read More @ synacktiv.com
[#] Security researchers have discovered ways to bypass recent security measures in ChatGPT by exploiting persistent XSS vulnerabilities to manipulate conversations, steal data, and maintain unauthorized control, despite steps toward securing the AI against such information exfiltration.
Read More @ imperva.com
[#] A deceptive JavaScript file uses encoding, large amounts of irrelevant code, and Base64 to hide its real purpose: to execute a PowerShell script that downloads and runs the AsyncRAT malware.
Read More @ sans.edu
[#] This roadmap is a guide for beginners on how to learn binary exploitation through courses like pwn.college and Nightmare, providing resources to develop skills in reversing and vulnerability research, with links to supportive communities for help and further learning.
Read More @ hoppersroppers.org
[#] SARA is an educational tool for creating Trojans and Ransomware targeting Android systems, with a straightforward installation process hosted on GitHub.
Read More @ github.com
[#] The BruteUnpackage toolkit provides a method for cracking passwords on compressed files using brute force techniques, including a built-in common password list and support for multithreading to enhance the efficiency of the cracking process.
Read More @ github.com
[#] A Proof-of-Concept exploit for the CVE-2024-1086 vulnerability provides a method for gaining escalated privileges on Linux systems running kernels between versions 5.14 and 6.6, and includes instructions for configuration and usage.
Read More @ github.com
[#] The GitHub repository contains a proof of concept exploit for a SQL injection vulnerability in Fortinet's FortiClient EMS, referenced as CVE-2023-48788, with instructions on how to use it.
Read More @ github.com
[#] Soroush Dalili details an Open Redirect vulnerability caused by improper validation of 'window.location.pathname' in JavaScript, which can be exploited in a Windows-hosted IIS environment to hijack sensitive URL parameters.
Read More @ soroush.me
[#] A proof-of-concept exploit for a remote code execution vulnerability designated as CVE-2024-25153 affecting Fortra FileCatalyst Workflow versions up to 5.1.5 is available, and users should update to version 5.1.6 Build 114 or later for protection.
Read More @ github.com
[#] A research paper details the identification of multiple security flaws in Xiaomi WiFi routers, providing evidence of remediation by Xiaomi through updates and assignment of CVE identifiers.
Read More @ thalium.re
[#] The repository features a small, 64-bit library designed to load DLL files into memory, supporting a variety of functions including bypassing image load callbacks and executing libraries from both disk and memory buffers.
Read More @ github.com
[#] The GitHub repository Meckazin/ChromeKatz offers a tool for extracting cookies from Chrome, Edge, or webview processes directly from memory without needing on-disk database files or decryption keys, and includes different applications for live processes and analyzing minidumps.
Read More @ github.com

# News

[#] American retailer Hot Topic suffered credential stuffing attacks in November, compromising personal and partial payment information, and prompting the implementation of bot protection and mandatory password resets for affected customers.
Read More @ bleepingcomputer.com
[#] Indian government and oil companies have been compromised by an espionage campaign using a tool called "HackBrowserData" to steal credentials, cookies, and browser history through phishing emails, with data being uploaded to Slack channels in an operation named "Operation FlightNight."
Read More @ darkreading.com
[#] CISA has issued a warning for all to patch a critical Microsoft SharePoint vulnerability, CVE-2023-24955, by April 16th to prevent remote code execution by attackers.
Read More @ hackread.com
[#] The Python Package Index halted new user registrations and project creations to stop a malware attack involving over 365 fake packages designed to steal information from developers' browsers.
Read More @ bleepingcomputer.com
[#] JetBrains TeamCity users should update to version 2024.03 to fix 26 undisclosed security issues and enable semi-automatic downloading of critical security updates for on-prem installations.
Read More @ theregister.com
[#] Cisco has issued guidance to counter password-spraying attacks on VPNs, recommending the use of remote logging, sinkhole servers, TCP shun, control-plane ACLs, and certificate-based authentication to improve security.
Read More @ bleepingcomputer.com
[#] Finland's police have confirmed the involvement of Chinese hacking group APT31 in the 2020 cyber attack against its parliament and have identified suspects, as the US and UK governments sanction individuals and a company linked to the group.
Read More @ thehackernews.com
[#] Kaspersky has detected a Linux variant of DinodasRAT malware targeting countries like China and Taiwan, which can control infected servers, avoiding detection and encrypting its communications.
Read More @ thehackernews.com
[#] Security researchers have identified a new Trojan, written in Golang, that uses a fake certificate to stealthily communicate with a control server, and to protect against it, users must update their systems, apply patches, and follow safe browsing practices.
Read More @ securityonline.info
[#] Grafana users must patch their systems immediately due to a BOLA vulnerability, CVE-2024-1313, which lets attackers delete dashboard snapshots if they have the unique key.
Read More @ securityonline.info
[#] Synology has identified several critical vulnerabilities in their Surveillance Station software, notably CVE-2024-29228, CVE-2024-29229, and CVE-2024-29241, advising users to update immediately to avoid unauthorized access and potential system takeover.
Read More @ securityonline.info
[#] GitLab has updated its software to fix security bugs, with important changes being patches for an XSS vulnerability in Wiki pages and a DoS issue caused by emojis, and users should update their systems immediately to protect against these threats.
Read More @ securityonline.info
[#] Sam Bankman-Fried, the former FTX CEO, received a 25-year prison sentence for fraud related to the cryptocurrency exchange's collapse, and an $11.02 billion forfeiture was ordered to aid victim repayment.
Read More @ packetstormsecurity.com
[#] Over 10,000 hotels around the world are at risk due to a vulnerability in Saflok keycard locks, requiring a physical update to each door's hardware and a software patch to fix the issue.
Read More @ darkreading.com
[#] A serious code execution vulnerability identified as CVE-2024-0980 in the Okta Verify for Windows app requires users to urgently update to version 4.10.7.
Read More @ securityonline.info
[#] NHS Scotland contained a ransomware attack within the Dumfries and Galloway region, preventing wider spread while authorities and cybersecurity experts assess the breach, which included the theft of 3TB of data and aimed to pressure the organization by leaking sensitive information online.
Read More @ theregister.com
[#] Rockwell Automation announced security alerts for 10 vulnerabilities affecting multiple products; users should apply mitigations and patch as guided.
Read More @ scmagazine.com
[#] Rent Go, a Turkish car rental company, experienced a data leak from an unsecured server, revealing personal identification documents of over 161,000 customers and creating risks of identity theft and fraud.
Read More @ scmagazine.com
[#] Nvidia has updated its ChatRTX application to version 0.2, patching two security vulnerabilities that could allow privilege escalation and remote code execution, and users should reinstall the application to ensure safety.
Read More @ theregister.com
[#] Facebook allegedly monitored and analyzed encrypted traffic from competitors like Snapchat by deploying server-side SSL bumps, a method considered likely illegal under wiretapping laws.
Read More @ malwarebytes.com
[#] A Phishing-as-a-Service platform named Darcula is exploiting iMessage and RCS to bypass detection, using 20,000 fake domains to mimic brands and trick users into submitting personal data.
Read More @ thehackernews.com
[#] The US government proposes a rule requiring critical infrastructure operators to report major cyber incidents within 72 hours and ransom payments within 24 hours to improve national security and defense.
Read More @ theregister.com
[#] Drozer 3.0.0, which now supports Python 3 and updated Java, is a recently released security tool for Android platform testing.
Read More @ reddit.com
[#] A phishing scam called "push bombing" involving repeated Apple ID password reset requests and caller ID spoofing is targeting tech professionals, leading to potential iCloud account takeovers and urging individuals to remove personal data from people search sites.
Read More @ packetstormsecurity.com
[#] German authorities report over 17,000 Microsoft Exchange servers are at risk due to unpatched critical vulnerabilities, prompting urgent calls for system administrators to apply updates to guard against potential exploitations, specifically addressing the elevation-of-privilege vulnerability CVE-2024-21410.
Read More @ packetstormsecurity.com
[#] A misconfigured cloud server from UK-based Juniper Education's OTrack software exposed nearly a million records of student data, which has since been secured following a responsible disclosure by researcher Jeremiah Fowler.
Read More @ hackread.com
[#] Sellafield Ltd, operators of a high-risk nuclear site in Western Europe, faces legal action over IT security breaches from 2019 to early 2023, despite denying any safety compromise after reported hacks linked to Russia and China.
Read More @ packetstormsecurity.com
[#] The United States Department of State is offering a reward of $10 million for information that leads to the identification or location of the BlackCat/ALPHV ransomware group members who have attacked US critical infrastructure.
Read More @ darkreading.com
[#] Python Package Index took emergency action by stopping new account creation and project uploads due to a flood of malicious packages using typosquatting to deploy multi-stage attacks designed to steal sensitive data and maintain persistence on victims' systems.
Read More @ securityonline.info
[#] Kaspersky Labs has identified a new Linux-focused version of the DinodasRAT malware, known for targeting government sectors, which utilizes stealth techniques and encryption to evade detection and communicate with its attackers, emphasizing the need for regular system updates, antivirus protection, network monitoring, and user training to mitigate the risk.
Read More @ securityonline.info
[#] Japanese authorities have arrested two executives for outsourcing software development to North Korean IT engineers, potentially financing North Korea's nuclear and missile programs, violating sanctions, and committing fraud.
Read More @ theregister.com
[#] Canonical is manually reviewing all new Snap Store name registrations to combat a surge of fake cryptocurrency wallet apps that deceive users and steal their funds.
Read More @ theregister.com
[#] Cybersecurity researchers have discovered a new RowHammer attack method called ZenHammer that effectively targets AMD CPUs with Zen 2 and Zen 3 architectures and can even induce bit flips in DDR5 chips, necessitating further action from AMD and DRAM vendors to bolster defenses against these evolving threats.
Read More @ thehackernews.com
[#] Google has updated Chrome to fix seven security issues, including a critical vulnerability that could let attackers corrupt memory and potentially take over a system, so users should update their browser immediately to version 123.0.6312.86 or later.
Read More @ malwarebytes.com
[#] Security researcher Bar Lanyado has demonstrated that AI-generated fake Python package names can be registered and actually downloaded by developers, posing a potential malware risk.
Read More @ theregister.com
[#] The website 'Have I Been Pwned' provides a comprehensive list of data breaches that users can search to see if their personal information has been compromised in any online attacks, ensuring individuals remain informed about their digital security.
Read More @ haveibeenpwned.com
[#] A phishing-as-a-service operation named Darcula uses sophisticated methods like Rich Communication Services and iMessage, instead of SMS, to conduct targeted phishing attacks against users from over 100 countries, employing 200 templates to mimic legitimate businesses and employing strategies to circumvent platform restrictions.
Read More @ bleepingcomputer.com
[#] The INC Ransom extortion group compromised the National Health Service of Scotland and threatened to release 3 terabytes of stolen data, including sensitive patient and staff information.
Read More @ securityaffairs.com
[#] Apple device users are being targeted with a massive number of fake password reset requests, followed by fraudulent support calls trying to acquire personal information, in a sophisticated multi-factor authentication fatigue attack.
Read More @ theregister.com
[#] A study shows that 52% of Americans use ad blockers to improve privacy and web browsing speed, and the percentage is higher among tech professionals.
Read More @ theregister.com
[#] China has been indirectly supporting armed groups to combat scam operations in Myanmar, leading to a significant military confrontation and exchange of scammers and victims with Chinese authorities.
Read More @ theregister.com
[#] A successful demonstration of a 31-round collision in the SHA256 cryptographic function has been documented on GitHub.
Read More @ reddit.com
[#] A search query for the term "the wp-config.php creation script uses this file" on ZoomEye.hk reveals a list of IP addresses linked to potentially malicious activity on servers located in various countries, with details accessible upon login.
Read More @ zoomeye.hk
[#] A search on ZoomEye reveals multiple Docker containers with port 2375 open, indicating potentially unprotected instances across various countries and IP ranges that should be secured to prevent unauthorized access.
Read More @ zoomeye.hk
[#] The ZoomEye cybersecurity search engine has detected 74,773 instances, predominantly from China, of potentially malicious activity targeting exposed Jenkins dashboard interfaces over HTTP on port 8081, observed on 2024-03-30.
Read More @ zoomeye.hk
[#] ZoomEye, a search engine for cyber assets, has released a limited-time lifetime membership for $149, which includes 1 million bonus points for threat hunting and additional features like Honeypot Detection.
Read More @ medium.com
[#] As of March 29, 2024, there are 10,748 cybersecurity incidents related to "nosuchbucket"+"bucketname" with the majority of affected devices using the nginx web server, predominantly located in China and the United States, emphasizing the need for secure bucket configurations and monitoring.
Read More @ zoomeye.hk
[#] The Agenda ransomware group, known for targeting various industries, has updated its Rust variant to spread across VMWare vCenter and ESXi servers using a custom PowerShell script and other tactics to evade detection and disrupt virtual infrastructure.
Read More @ trendmicro.com
[#] AhnLab Security Intelligence Center reports an uptick in phishing scripts that steal user data including emails, passwords, IP addresses, and user agent details through Telegram's API, with attackers using code obfuscation to evade detection and redirecting victims to legitimate sites after theft to avoid suspicion.
Read More @ ahnlab.com

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-03-29

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins