146 Followers
366 Following
269 Posts
threat intel, detection engineering and research. Member of Curatedintel.
bird linkhttps://twitter.com/robstunkist
work onhttps://www.threatable.io

finished reading A Song For The Void ๐ŸŒ•๐ŸŒ•๐ŸŒ•๐ŸŒ—๐ŸŒ‘

A Song For The Void

A Mind Imprisoned Is The Greatest Of Hells. 1853. South China Sea. While on patrol between the Opium Wars, the crew of the steam frigate HMS Charger pursue

NeoDB Book

finished reading Reset ๐ŸŒ•๐ŸŒ•๐ŸŒ•๐ŸŒ•๐ŸŒ•

Reset

Bestselling author and renowned technology and security expert Ronald J. Deibert exposes the disturbing influence and impact of the internet on politics, t

NeoDB Book
Ship of Gold in the Deep Blue Sea

"White knuckle reading...with generous portions of adventure, intrigue, heroism, and high technology interwoven." -- Los Angeles Times Book Review This

NeoDB Book
There is something potentially huge popping up now. Has to do with a compromise at business intelligence vendor Sisense. I'm hearing this is a supply chain attack affecting many millions of credentials and hundreds of tenants. This is a message the Sisense CISO just sent to customers.

Heads up to people/orgs running ConnectWise ScreenConnect. There is a bad-as-it-gets bug being exploited right now that is basically no-tech hacking to gain remote admin access. Patch now if you haven't already.

ConnectWise's advisory on the vulnerabilities and exploitation is here:

https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8

A working proof of concept for this attack:

https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc

Huntress does a good job dissecting the ConnectWise advisory and showing the exploit in action.

https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass

https://www.youtube.com/watch?v=AWGoGO5jnvY

@wdormann sums up the technical capabilities needed to exploit this flaw:

"Apparently the exploit is to add a '/' to the end of the URI.
That's it."

https://infosec.exchange/@wdormann/111969450560709377

Great write-up by @Kaspersky on Operation Triangulation, the 0-click iMessage attack which chained together four (now patched) zero-days as part of it's attack chain.

Read up on this incredibly sophisticated attack:
https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/

#cybersecurity #cti #zeroday #threatintel

Operation Triangulation: The last (hardware) mystery

Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.

Kaspersky
โ—‹โ—‹ๅŸบๅœฐใซๆ–ผใ‘ใ‚‹้ซ˜็ ‚็พฉๅ‹‡้šŠใฎๆดป่บ National Taiwan University Library Collection https://dl.lib.ntu.edu.tw/s/photo/page/list #taiwan #taiwanhistory #taiwanphoto
็…ง็‰‡ๅ‡บ่™• ยท ๅœ‹็ซ‹่‡บ็ฃๅคงๅญธๅœ–ๆ›ธ้คจๆ•ธไฝๅ…ธ่—้คจ

Cyberattacks hit military, Parliament websites as India-based group targets Canada | CBC News

The federal government is coping with cyberattacks this week, as a hacker group in India claims it has sowed chaos in Ottawa โ€” but Canada's signals-intelligence agency says the "nuisance" attacks likely haven't put private information at risk.

CBC
Researchers at Citizen Lab and Google uncover attempt to hack opposition Egyptian presidential candidate with spyware, say Egyptian govt likely to blame. Itโ€™s why Apple rushed to release a critical iOS update this week. https://apnews.com/article/6e5ab454bff94e1712c94b20b0756f7f
Leading Egyptian opposition politician targeted with spyware, researchers find

Security researchers say a leading Egyptian opposition politician was targeted with Predator spyware after announcing a president bid. They say it's highly likely Egyptian authorities were behind the hacking attempt. Its discovery by researchers at Citizen Lab and Google prompted Apple to rush out operating system updates for iPhones, iPads, Mac computers and Apple Watches to patch the vulnerability. Citizen Lab said in a blog post Friday that attempts beginning in August to hack former lawmaker Ahmed Altantawy involved configuring his connection on the Vodaphone Egypt mobile network to automatically infect his devices if he visited certain websites not using the secure HTTPS protocol.

AP News

Weekly analysis (attribution by others)

-๐Ÿ‡ท๐Ÿ‡บ diplo ๐ŸŽฃ ops
-๐Ÿ‡ฐ๐Ÿ‡ต ops in response to ๐Ÿ‡ฐ๐Ÿ‡ท mil exercises
-๐Ÿ‡ฐ๐Ÿ‡ต โ‚ฟ ops using n-day
-๐Ÿ‡จ๐Ÿ‡ณ ๐Ÿ“ฑ ops
-๐Ÿ‡จ๐Ÿ‡ณ telco ops in Middle East
-๐Ÿ‡ต๐Ÿ‡ฐ ops in ๐Ÿ‡ฎ๐Ÿ‡ณ
-๐Ÿ‡ฎ๐Ÿ‡ท โ˜๏ธ ops
-๐Ÿฆน๐Ÿฝโ€โ™‚๏ธ โ˜๏ธ ops
-๐Ÿฆน๐Ÿปโ€โ™€๏ธ SMS ๐ŸŽฃ ops

plus off/def tradecraft analysis etc.

https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-b1f

Bluepurple Pulse: week ending September 24th

The amount of commercial mobile capability both on show and burnt this week is material..

Cyber Defence Analysis for Blue & Purple Teams