Arwa Alomari

39 Followers
173 Following
68 Posts
If you're feeling overwhelmed, remember that

Microsoft enabled the notorious "Recall" with the last update (for Windows 11 copilot+ enabled pcs only). It's part of the OS and can't be uninstalled. This software stores metadata about EVERYTHING that appears on your screen, including passwords/urls/images/videos/any messages you send or emails etc

To disable this gross spyware, run the following as admin on the command line:

Dism /Online /Disable-Feature
/Featurename:Recall

#Windows #Spyware #Recall #PrivacyAbuse

My RedisDB honeypot is now open source:

https://gitlab.com/bontchev/redispot

It is based on the RedisDB honeypot from the honeypots package

https://github.com/qeeqbox/honeypots

but has many improvements:

- output plugins - the ability to send reports to various places
- bugfixes - the original assumes that numbers are single-digit in a couple of places
- correct error messages - the original doesn't use exactly the same error messages as a real server
- supports the inline protocol - the original supports only the bulk one; all credential stuffing attackers use the inline one

Vesselin Bontchev / RedisPot · GitLab

GitLab.com

GitLab

Time for my monthly reminder to support your instance. Most instances are volunteer run and paid for by donations, including from the instance administrators. I know these are tough times and not everyone can afford it, and that is OK (I am personally out of work, so I understand that first hand).

You can generally find information to donate on youe instance's "about" page. For example, https://infosec.exchange/about, for those on infosec.exchange.

Thank you for being here and making this place awesome, regardless of your ability to donate. 

Infosec Exchange

A Mastodon instance for info/cyber security-minded people.

Mastodon hosted on infosec.exchange
Somebody made a tool called Total Recall to dump Recall database and screenshots. https://x.com/xaitax/status/1797349055917416457?s=46
Alex (@xaitax) on X

Will release TotalRecall in a few days. Loads to play with and to work on. Thank you @GossiTheDog for the inspiration! #WindowsRecall #CyberSecurity #Microsoft #TotalRecall

X (formerly Twitter)
I wrote a blog on everything I know about the Snowflake situation https://doublepulsar.com/snowflake-at-central-of-worlds-largest-data-breach-939fc400912e
Snowflake at centre of world’s largest data breach - DoublePulsar

Cloud AI Data platform Snowflake are having a bad month. Due to teenager threat actors and cybersecurity of its own customers… and its own cybersecurity, too, in terms of optics. There are several…

DoublePulsar

Just published the second-longest blog post in my 14 year career as an independent reporter.

This story is the result of a ridiculous amount of research. I hope you like it, because I learned tons reporting this, and there needs to be a broader conversation about some of the issues raised by this research. The lede:

Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and Europe. An investigation into Stark Industries reveals it is being used as a global proxy network that conceals the true source of cyberattacks and disinformation campaigns against enemies of Russia.

https://krebsonsecurity.com/2024/05/stark-industries-solutions-an-iron-hammer-in-the-cloud/

Stark Industries Solutions: An Iron Hammer in the Cloud – Krebs on Security

Palo Alto Networks released additional details about CVE-2024-3400: the fact that it is a combination of two bugs in PAN-OS; how an attacker was exploiting it; how disabling telemetry initially worked; and how they fixed it. The timeline from discovery to remediation encompasses the whole blog post. Overall a comprehensive after-action review from a company that notified the public almost immediately of an exploited zero-day. 🔗https://www.paloaltonetworks.com/blog/2024/04/more-on-the-pan-os-cve/

#CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #PANOS #IOC

More on the PAN-OS CVE-2024-3400

PSIRT learned of a suspicious exfiltration attempt at a customer site. Palo Alto Network's team investigated the issue with Volexity's team.

Palo Alto Networks Blog

MITRE disclosed that one of their research and development networks was compromised by a foreign nation-state threat actor in January 2024 using Ivanti Connect Secure zero-days CVE-2023-46805 and CVE-2024-21887. Networked Experimentation, Research, and Virtualization Environment (NERVE) is a collaborative network used for research, development, and prototyping. MITRE included a timeline, observed TTP methods (mapped out to MITRE ATT&CK techniques cc: @howelloneill) and their incident response actions. No IOC provided. 🔗 https://www.mitre.org/news-insights/news-release/mitre-response-cyber-attack-one-its-rd-networks and https://medium.com/mitre-engenuity/advanced-cyber-threats-impact-even-the-most-prepared-56444e980dc8 h/t @reverseics

cc: @campuscodi @briankrebs

#MITRE #Ivanti #ConnectSecure #CVE_2023_46805 #CVE_2024_21887 #threatintel #cyberespionage