HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

This article teaches malware developers how to dodge antivirus by changing NTFS attributes, in-memory tricks, digital certificates, and more, with tips for security pros. There's updates on malware IOCs vital for knowing and stopping threats. Cloud_Enum looks for open cloud stuff on AWS, Azure, and others using keywords. Telerecon helps with Intel on Telegram, like scraping chats and seeing user links, but you need to set it up right. Awesome Cloud Security Labs has free security exercises for cloud tech. Netlas.io scans the internet for research and can spot industrial controls online needing better security. Backslash-powered-scanner finds hidden injection problems in servers and slides past firewalls. You can learn how to use Rust language in cybersecurity with their tool. There's a full guide on Windows for malware work, and a project for a DNS Tunnel Keylogger to sneak out info without getting caught. Lastly, learn to spot .NET malware with GUIDs and MVIDs, and find Yara rules online.

# Tradecraft

[#] This article provides detailed techniques and code snippets for malware developers to evade antivirus detection by manipulating NTFS file attributes, using in-memory code execution, employing stolen digital certificates, and other methods, while including defensive strategies for cybersecurity professionals to counter such tactics.
Read More @ redteamrecipe.com
[#] The repository provides updated lists of indicators of compromise (IOCs) from various malware investigations, which are crucial for cybersecurity practitioners to detect and mitigate threats effectively.
Read More @ github.com
[#] Cloud_Enum is a tool used for Open Source Intelligence (OSINT) that can identify publicly accessible resources on various cloud platforms, including AWS, Azure, and Google Cloud, by using keywords and brute-force techniques.
Read More @ kitploit.com
[#] Telerecon is a tool designed for Open Source Intelligence gathering on Telegram, providing users with various abilities such as scraping messages, identifying user links, analyzing ideological indicators, and mapping user networks, all of which require prerequisite steps including installation of required software and obtaining API access to Telegram.
Read More @ github.com
[#] Awesome Cloud Security Labs offers a collection of free, cloud-native security training exercises, including Capture The Flag (CTF) challenges, self-hosted workshops, guided vulnerability labs, and research labs, across various cloud environments and technologies.
Read More @ github.com
[#] Experts to locate internet-exposed industrial control systems and SCADA interfaces, using specific search queries tailored to protocols and vendors, which enables the assessment and enhancement of the security of critical infrastructure.
Read More @ netlas.io
[#] The backslash-powered-scanner is a Burp Suite extension that enhances active scanning by finding both known and unknown server-side injection vulnerabilities, reducing false positives and subtly evading web application firewalls.
Read More @ github.com
[#] The page describes the OffensiveRust repository, which contains experiments in developing and using the Rust programming language for creating tools and techniques applicable in offensive cybersecurity operations.
Read More @ github.com
[#] The article provides a detailed technical guide on Windows architecture, memory management, API calls, and DLLs, focusing on their importance in cyber security and malware development.
Read More @ medium.com
[#] The repository contains a DNS Tunnel Keylogger project which involves a server and client setup to exfiltrate keystrokes from a compromised system using DNS tunneling to bypass firewalls and avoid detection.
Read More @ github.com
[#] A security researcher details how to analyze and classify .NET malware using GUIDs and MVIDs, providing tools and Yara rules for more efficient and reliable detection on their GitHub page.
Read More @ blogspot.com

# News

[#] Ubuntu's Snap Store, which distributes apps for the Linux system, is implementing a manual review process to prevent fake cryptocurrency wallet apps that have been scamming users by stealing their currencies.
Read More @ packetstormsecurity.com
[#] JetBrains updated TeamCity to fix 26 security issues, but didn't share the details, while also introducing a semi-automatic update feature for critical security patches.
Read More @ packetstormsecurity.com
[#] Harvard Pilgrim Health Care revealed a ransomware incident from last year affected roughly 2.9 million individuals, a figure that has been revised upward after further investigation.
Read More @ scmagazine.com
[#] Activision Blizzard has initiated an investigation into a malware campaign that steals user credentials, while also working to secure affected accounts by urging players to reset passwords and enable two-factor authentication.
Read More @ scmagazine.com
[#] A critical security concern has arisen due to a backdoor found in the xz/liblzma 5.6.0 and 5.6.1 releases that affects ssh servers, and users should urgently check their systems with the provided detection script and update their installations to avoid unauthorized access.
Read More @ openwall.com
[#] A botnet called TheMoon, first identified in 2014, has been reactivated and is exploiting outdated small office/home office routers and IoT devices to create a proxy service named Faceless, which cybercriminals use to conceal their activities.
Read More @ thehackernews.com
[#] Google will discontinue its Podcasts service in the U.S. on April 2, with a complete shutdown in July, steering users to export their subscriptions to YouTube Music or another platform.
Read More @ bleepingcomputer.com
[#] Security researchers have discovered vulnerabilities in Dormakaba's hotel room locks that could allow attackers to create master keys and gain unauthorized access, but a fix from the company is already underway.
Read More @ thehackernews.com
[#] The U.S. Treasury sanctioned entities aiding Russian and Chinese cybersecurity threats, a new phishing kit targets MFA measures, and Chinese APTs conducted cyber espionage on ASEAN members.
Read More @ sentinelone.com
[#] Hot Topic experienced credential stuffing attacks potentially exposing customer personal and partial payment information; they have since enhanced their website and app security and advise customers to change their passwords.
Read More @ securityaffairs.com
[#] Python Package Index temporarily stopped new user registrations and project creations to deal with a malware campaign that targeted developers with fake packages meant to steal sensitive data and persist on Windows systems after reboot.
Read More @ thehackernews.com
[#] A vulnerability allowing NTLM hash leaks through a Microsoft Teams "Website" tab via an Office URL scheme has been reported, but Microsoft deems it low severity as it requires user consent in Office applications, with no immediate fix planned.
Read More @ github.com
[#] Recent research highlights a significant risk in using AI language models for coding, as they frequently suggest imaginary code libraries, which can be exploited by attackers to distribute malware, and developers are advised to verify package legitimacy before implementation.
Read More @ darkreading.com
[#] Cybersecurity firm Netcraft has identified a phishing-as-a-service platform called "Darcula" leveraging iMessage and RCS to target postal services worldwide, urging vigilance and verification to protect against such smishing attacks.
Read More @ hackread.com
[#] Cisco has published security updates to address 14 vulnerabilities in their IOS, IOS XE, and Access Point software, including critical remote denial-of-service attacks and one secure boot bypass, which administrators should apply promptly to maintain system protection.
Read More @ darkreading.com
[#] Cybersecurity researchers uncovered a link between malware known as MS Drainer and attacks on Solana wallets, with leaked code suggesting a rise in crypto-targeting cyber threats.
Read More @ securityonline.info
[#] A critical vulnerability, CVE-2023-50969, in Imperva SecureSphere Web Application Firewall version 14.7.0.40, allows attackers to bypass security rules and the solution is to apply an update released on February 26, 2024.
Read More @ securityonline.info
[#] The website "Have I Been Pwned" provides a searchable database of data breaches, which users can use to check if their email addresses, passwords, or other personal information have been compromised in past cyber incidents.
Read More @ haveibeenpwned.com
[#] XZ Utils versions 5.6.0 and 5.6.1 have been compromised with a backdoor allowing remote code execution, with the fix being to downgrade and check for system breaches.
Read More @ wiz.io
[#] A large botnet named Brutus, noticed since March 15th, is conducting brute force attacks using tens of thousands of unique and previously undisclosed usernames across various devices and IPs globally, with no clear connection, also involving two IPs previously associated with APT29, and the botnet's activities potentially link back to an undisclosed Microsoft breach.
Read More @ annoyed.engineer
[#] The 'AllAboutBugBounty' repository on GitHub has a missing 'cross site scripting.md' file, and you need to return to the main repository page to find the information you seek.
Read More @ github.com
[#] Checkmarx Security Research Team uncovered a cyber attack on the software supply chain affecting over 170,000 users, utilizing false Python package repositories to inject malware into systems, requiring heightened verification of package sources and dependencies to prevent such breaches.
Read More @ checkmarx.com
[#] Sekoia analysts have reported an in-depth analysis of Tycoon 2FA, a prevalent phishing kit designed to bypass two-factor authentication, providing insights on its tactics and suggesting ways to monitor its infrastructure.
Read More @ sekoia.io

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-03-30

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins