Oneironaut

@Oneironaut@infosec.exchange
13 Followers
106 Following
1.4K Posts
GRC advocate. Cyber adjacent. Celine Dion fan
FortiWeb Pre-Auth RCE (CVE-2025-25257)

Hey! and welcome to another THEY BURNED MY BUG episode. This time, we introduce CVE-2025-25257. An SQLi that I spotted back in Feb. in case someone burn them before i get my bragging rights8157d42995395ba0c0cfccce37b934ebb63d3d5740ba43eda7fa853f389bca2a8fc4ca6426ae50c7673326eacb6644a8b361ad1051138d04cbd9da8b807a0973— faulty *ptrrr (@0x_shaq) February 9, 2025 This is a pre-auth SQLi bug that can be leveraged to an RCE in FortiWeb.

( ͡◕ _ ͡◕)👌

CVE-2025-5777 aka CitrixBleed 2 has been added to CISA KEV now over evidence of active exploitation.

Citrix are still declining to comment about evidence of exploitation as of writing.

https://www.cisa.gov/news-events/alerts/2025/07/10/cisa-adds-one-known-exploited-vulnerability-catalog

@neurovagrant it can put them back too, right?

Belkin WEMO to shut down cloud operations and cripple WEMO iot devices in January 2026

https://www.belkin.com/support-article/?articleNum=335419

Belkin Official Support - Wemo Support Ending – What You Need to Know

Get help with Wemo Support Ending – What You Need to Know

Belkin US

How's that AI coding going for you? Ah... I see.

Wired: McDonald’s AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Using the Password ‘123456’

"... Carroll and Curry, hackers with a long track record of independent security testing, discovered that simple web-based vulnerabilities—including guessing one laughably weak password—allowed them to access a Paradox.ai account and query the company's databases that held every McHire user's chats with Olivia. The data appears to include as many as 64 million records, including applicants' names, email addresses, and phone numbers...."

https://www.wired.com/story/mcdonalds-ai-hiring-chat-bot-paradoxai/

#ai #cybersecurity #llm

McDonald’s AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Using the Password ‘123456’

Basic security flaws left the personal info of tens of millions of McDonald’s job-seekers vulnerable on the “McHire” site built by AI software firm Paradox.ai.

WIRED

I just saw copilot leave "[nitpick]..." PR comments. Given that these things just reflect a probabilistic sample of our own writing back at us, I am even more convinced that programmers are bad at using programming tools. And that this is in large part driven by the need and desire to perform constant displays of dominance.

So vast swathes of projects just never set up linters or style guides. Because they don't know how. And because they don't want to learn. Because it would reduce their opportunity to make "[nitpick]..." comments on other people's PRs. And thus, so does copilot

New from 404 Media: the open-source piece of software saving the internet from AI bot scrapers. Anubis has been downloaded almost 200,000 times. We spoke to the creator: https://www.404media.co/the-open-source-software-saving-the-internet-from-ai-bot-scrapers/
The Open-Source Software Saving the Internet From AI Bot Scrapers

Anubis, which block AI scrapers from scraping websites to death, has been downloaded almost 200,000 times.

404 Media

Are you still on #Spotify?

Spotify’s CEO Daniel Ek has raised €600M for his new startup, which is developing AI TECH FOR WAR. Ek still owns 9% of Spotify, but has 37% voting control. His net worth went from $2.5B to $10B in the last two years alone, on the back of paying musicians a pittance in royalties.

And don’t forget:

• Spotify spent $250M of your subscription dollars to invite Joe Rogan to spew his disinformation on their platform.
• They’re still trying to embrace and extinguish Podcasts.
• They’re developing in-house, AI-generated “music” so users will play them (royalty-free) instead of music created by humans (who demand royalty).

And now, he’s using his wealth, created by your subscriptions, to fund tech that will use AI to literally murder humans in war.

Stop funding him. Quit Spotify now.

#QuitSpotify #music #ai #militaryTech #techbro

“Spotify’s CEO invests $1 billion into an AI military start-up — and musicians are fuming”

https://www.news.com.au/finance/work/leaders/spotifys-ceo-invests-1-billion-into-an-ai-military-startup-and-musicians-are-fuming/news-story/78805666e2374281801622066dc87319

Guest Post: How I Scanned all of GitHub’s “Oops Commits” for Leaked Secrets ◆ Truffle Security Co.

GitHub Archive logs every public commit, even the ones developers try to delete. Force pushes often cover up mistakes like leaked credentials by rewriting Git history. GitHub keeps these dangling commits, from what we can tell, forever. In the archive, they show up as “zero-commit” PushEvents.

Flock Safety has built a system where ICE can access local police data via informal backchannels and abortion seekers can be tracked under the guise of “missing persons.” And they’re continuing to expand it. https://www.eff.org/deeplinks/2025/06/flock-safetys-feature-updates-cannot-make-automated-license-plate-readers-safe
Flock Safety’s Feature Updates Cannot Make Automated License Plate Readers Safe

Two recent statements from the surveillance company—one addressing Illinois privacy violations and another defending the company's national surveillance network—reveal a troubling pattern: when confronted by evidence of widespread abuse, Flock Safety has blamed users, downplayed harms, and doubled...

Electronic Frontier Foundation
×
Ingram Micro have been experiencing some kind of ’technical issue’, including of their corporate and orders website.
14-hour+ global blackout at Ingram Micro halts customer orders

Exclusive: Fears mount while distie remains silent and phone lines down

The Register
Ingram Micro are now 24 hours into a total outage, which includes their website and all of their internal IT.
The only comms they’ve posted is this, phone lines are all down.
Ingram Micro sell anti-ransomware products and ransomware incident response training btw.

If anybody wonders who Ingram Micro are, they turn over $48 billion a year and have about 20 different business units and brands.

Their network border is dead. Haven’t checked network traffic to see if ransomware yet.

Ingram Micro had network traffic from their ASN to a C2 server used by SafePay ransomware group, for the past week. #threatintel #ransomware
Ingram Micro outage caused by SafePay ransomware attack

An ongoing outage at IT giant Ingram Micro is caused by a SafePay ransomware attack that led to the shutdown of internal systems, BleepingComputer has learned.

BleepingComputer

2 and a bit days in and Ingram Micro still haven’t admitted what is happening, instead saying “Maintenance”

They’re both a large MSP and MSSP who sell anti-ransomware services.

#threatintel #ransomware

There's also several hundred gigabytes of data out of Ingram Micro's network. I suspect they'll have a long running, uhm, maintenance.

Three days in, Ingram Micro have updated their website to say they’re having a cybersecurity incident. They’ve also linked their press release, calling it ransomware. https://www.ingrammicro.com/

It’s a smart play as it makes them the owner of the narrative.

Ingram Micro have filed an 8-K for ransomware.

Some incredible wordsmithing here - rather than say when the incident began, they say when they issued a press release. Which was days later than when the incident began. I think this is because they missed SEC reporting deadlines.

https://www.sec.gov/ix?doc=/Archives/edgar/data/1897762/000162828025034372/ingm-20250705.htm

#ransomware

@GossiTheDog
Item 8.01. Other Events.

On July 5, 2025, Ingram Micro Holding Corporation (the “Company”) issued a press release stating the Company identified ransomware on certain of its internal systems. Promptly after learning of the issue, the Company took steps to secure the relevant environment, including proactively taking certain systems offline and implementing other mitigation measures. The Company also launched an investigation with the assistance of leading cybersecurity experts and notified law enforcement.

A copy of the press release is attached hereto as Exhibit 99.1, noting that the Company is working diligently to restore the affected systems so that it can process and ship orders.
#AltText #Alt4You

@GossiTheDog live shot of Ingram Micro issuing its press release in the middle of a ransomware attack
@zackwhittaker @GossiTheDog it's just as glorious as enron's shredder evolution

@GossiTheDog It's always "we found ransomware", and never "we couldn't bother to secure our shit and got pwned"

It's as if ransomware is a mythical act of the gods...

@GossiTheDog
German translatio of 8-K
= Ad-Hoc Meldung
https://www.deltavalue.de/form-8-k-sec-filing/
Form 8-K SEC Filing - Definition & Erklärung

Form 8-K Filing (SEC) ✅ Anleitung, Bedeutung & Interpretation ✅ So investierst und handelst du erfolgreich ✅ Jetzt mehr erfahren ➤

DeltaValue.de
@GossiTheDog refreshingly honest, in comparison to M&S at least.

@greem @GossiTheDog

“refreshing honest” would have been wighin the first two hours…

@GossiTheDog because you wouldn’t want Palo Alto Networks to take over.
@GossiTheDog how/where do you observe global network flow like this, fwiw?
@GossiTheDog Is this one of those irregular verbs? I am maintaining / you are restoring / she is pwned.
@GossiTheDog Tabletop Exercise? 😁
@GossiTheDog their main line of business is as a distributor of IT equipment. Lots of smaller IT equipment resellers depend on Ingram Micro to fulfill their orders as Ingram does the warehousing and shipping of the products for them. One example: they are one of Cisco’s largest distributors. Same for thousands of computer accessory makers like Logitech, Belkin, etc.

@deepthoughts10 @GossiTheDog this is a fundamental misunderstanding.

Ingram Micro is a *TIER 1*. There are only three of them; IM, TD Synnex, and AVNET. They do not do business with 'small.' I just happen to be a grandfathered customer in good standing from the 90's.

All the low tier MSPs are dealing with an entirely different arm. The minimums for a REAL customer is an insurable LoC of at least $10M last I looked.

@rootwyrm @GossiTheDog so I should have clarified what I meant by small. Some would call $10 million small, others would say medium. Regardless, there are thousands of resellers who rely on Ingram who will be hurting come Monday.

@GossiTheDog and iirc it's not possible to eject a reseller partner (even one that isn't currently placing licences in your tenant) from your MS365 tenant, either - the reseller has to delete the relationship (or maybe, if you can figure out a way to contact them, MS can do it for you).

Can't reseller partners create new global admins to do tenant recovery even if they have no role assigned?

@GossiTheDog So that became the baseline..
@GossiTheDog Worth remembering that Ingram hold highly privileged roles in every 365 tenant they resell to - they can create and manage tenant Global Administrators.

@root @GossiTheDog do want to give the nuance that their ‘regular’ tenant (ingrammicro.com) does not have access to the customer tenants. The GDAP relation is with their MSP tenant (msp.ingrammicro.com).

Not that it matters much if they have access to workstations and idp’s 🤷

@jtig @root @GossiTheDog I'm curious if MS has a thought out trigger condition for 'his methods have become unsound' and just nuking all the GDAP relationships. Probably not something they'd prefer to do, loud, scary, really underscores supply chain risk; but also something where the alternative is potentially a lot worse.
@GossiTheDog That doesn’t look good… A ~50 Billion company seemingly hit with ransomware and goes radio silent. www.theregister.com/2025/07/0…
14-hour+ global blackout at Ingram Micro halts customer orders

Exclusive: Fears mount while distie remains silent and phone lines down

The Register
@GossiTheDog Where did you get this information without access to their network or ISP?
@GossiTheDog like, they're not announcing routes?
Technical difficulties or cyber attack? Ingram Micro’s website goes down just in time for the holiday weekend

Nothing says “Holiday Weekend” like a mysterious IT outage.

Graham Cluley

@GossiTheDog One of those business units is AWS resale. Potentially there could be tens or hundreds of thousands of their customer's AWS accounts compromised as part of this - my understanding is that Ingram have full admin privileges to their resale customers accounts.

Many AWS partners use Ingram Micro to provide white label resale, so companies won't necessarily be aware they are affected because they don't deal with them directly.

@bashtoni @GossiTheDog Same with Azure. My former employer used an MSP who used Ingram as the reseller. Could be very nasty if even a fraction of those accounts were compromised.
@GossiTheDog pretty much every computer part in your local computer store is distributed through Ingram Micro
@GossiTheDog reminiscent of the old meme:
- my friend just finished writing his book "how to earn big money", now we just need to get the funds to print
- he should read his book then
@GossiTheDog pretty sure I know of some folks very much nit having a 'Happy Independence Day!'

@GossiTheDog

Tellingly, their “please contact us” does not list an email address.

@GossiTheDog I've been told its ransomware, trying to get more details/confirmation on this though.
@GossiTheDog basically zero chance this is not an 8K incident. Account reps worldwide have not been answering their phones. Including cellular.
@GossiTheDog Thank you! Mastodon (and you) are always the best source of news.
I appreciate you.