CYBERSECURITY / DEFENSE / INTELLIGENCE

  • Malware commonly encrypts its traffic (stolen data sent to a command-and-control server) and internal strings (like URLs and configurations) to prevent security systems from recognizing malicious content. 

    Cryptography fundamentals, classical ciphers, bitwise operations, XOR functions, and XOR cipher detection and decryption techniques, and showcase a practical example of how to decrypt malware C2 communication encrypted with XOR. 

    Common encryption methods:

    • XOR
    • Rc4
    • AES
    • DES
    • 3DES (Tripple DES)

    Main concepts in encryption are:

    • Plaintext is the raw data that hasn’t been encrypted and can be read and understood without processing.
    • Ciphertext is the encrypted data that looks like a bunch of random letters or bytes and can’t be read. It’s what the coding process turns into.
    • An encryption algorithm is a set of rules that turns plaintext into ciphertext. Several substitutions and permutations are usually used in plain text.
    • A key is a piece of data, usually a string of letters or numbers, used with an encryption algorithm to secure and decrypt data.

    Analyze Encrypted Traffic inΒ ANY.RUN with HTTPS MTIM ProxyΒ - Register for Free

    Fundamentals of Encryption:

    The encryption algorithm dictates how the data is manipulated, typically through substitutions and permutations, allowing decryption with the correct key.Β 

    There are two encryption methods: symmetric and asymmetric, whereas symmetric encryption utilizes a single key for both encryption and decryption, making it faster and simpler, which necessitates a secure channel for key exchange. 

    Asymmetric encryption, also known as public-key cryptography, addresses this by using two mathematically linked keys: a public key for encryption, freely distributable, and a private key for decryption, kept confidential, which allows for more secure key exchange but comes at the cost of increased complexity and slower processing times. 

    The breakdown will explore encryption concepts through a Lego-like approach, building towards understanding XOR with simple substitution, where a cleartext message is transformed based on a key. 

    Mutating the message at the bit level, introducing bitwise operations, and synthesizing concepts result in a comprehensive understanding of XOR, a fundamental operation in cryptography. 

    Simple substitution ciphers replace plaintext characters with alternative symbols according to a key, like swapping letters for emojis, as the concept underlies all encryption. 

    Caesar ciphers, a type of simple substitution, shift plaintext letters by a fixed amount. 

    Example of Caesar Cipher

    Caesar ciphers are vulnerable due to predictable patterns and unchanged symbol frequencies, where encryption relies on substituting symbols based on a defined rule. 

    The VigenΓ¨re cipher demonstrates the concept of using a key to mutate plaintext for encryption. A keyword generates multiple Caesar ciphers, applying a shift based on the corresponding key letter’s position (A = 0).

    Conversion of Plain text into Key, and Ciphertext

    Repetition arises when the key is shorter than the message, making the cipher vulnerable. This vulnerability, due to key brevity, is also applicable to modern symmetric encryption methods like XOR. 

    ANY.RUN explored bitwise operations, specifically XOR, for their role in encryption, where XOR operates on individual bits, returning 1 if only one input bit is 1, allowing to combine a message (plaintext) with a key using XOR, resulting in an encrypted ciphertext.Β 

    Conversion of plain text to 8-bit binary

    Decryption without the key is computationally impossible because the key controls the bit-wise changes and is thrown away after a single use (one-time pad). This shows how bitwise operations can be used to encrypt data securely.

    The XOR cipher encrypts data by performing a bitwise XOR operation between the plaintext and a secret key, where each bit in the plaintext is flipped (0 to 1 or 1 to 0) if the corresponding bit in the key is 1. 

    Cyberchef Screenshot

    By XORing the ciphertext with the same key once more, decryption is possible. This exposes the cipher’s flaw when using short, repetitive keys. In the hexadecimal representation of the encrypted data, it appears as repeating patterns of zeros, indicating a potential XOR encryption. 

    Any.Run Interface

    ANY.RUN analysis revealed a process sending a suspicious GET request for a .mp4 file, where the requested content, exhibiting repetitive patterns of 5s and 3s, suggested XOR encryption. While the key likely involved a sequence of 5s and 3s, its exact length remained unknown. 

    Downloading the executable from it and examining it in dnSpy could reveal the encryption function and the key itself. Once obtained, the key could decrypt the downloaded file (potentially malware) using tools like CyberChef.Β 

    Quickly analyze malware dynamically and statically inΒ ANY.RUN sandboxΒ  - Register for free

    What is ANY.RUN?

    ANY.RUN is a cloud-based malware lab that does most of the work for security teams. 400,000 professionals use ANY.RUN platform every day to look into events and speed up threat research on Linux and Windows cloud VMs.

    Advantages of ANY.RUN 

    • Real-time Detection: ANY.RUN can find malware and instantly identify many malware families using YARA and Suricata rules within about 40 seconds of posting a file.
    • Interactive Malware Analysis:Β ANY.RUN differs from many automated options because it lets you connect with the virtual machine from your browser. This live feature helps stop zero-day vulnerabilities and advanced malware that can get past signature-based protection.
    • Value for money: ANY.RUN’s cloud-based nature makes it a cost-effective option for businesses since your DevOps team doesn’t have to do any setup or support work.
    • Best for onboarding new security team members: ANY. RUN’s easy-to-use interface allows even new SOC researchers to quickly learn to examine malware and identify signs of compromise (IOCs).

    The post What is Encryption in Malware? – Understand From Basics to XOR appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Authorities have dismantled LabHost, a notorious cybercrime platform that facilitated widespread phishing attacks across the globe.

    The crackdown on LabHost, founded in the UK in 2021, marks a significant victory against cybercriminal networks that have long exploited digital platforms to conduct their illicit activities.

    LabHost, known for its Phishing-as-a-Service (PhaaS) offerings, allowed criminals, even those with limited IT skills, to create and manage phishing websites designed to mimic legitimate organizations such as banks, healthcare agencies, and postal services.

    For a monthly fee of up to Β£300, subscribers were provided with phishing kits, tutorials, and tools necessary to deceive victims into handing over sensitive information, including bank card details, PIN numbers, and passwords.

    Free Live Webinarfor DIFR/SOC Teams: Securing the Top 3 SME Cyber Attack Vectors - Register Here.

    Take Down Operation

    The operation led to the arrest of dozens of individuals, and LabHost’s fraudulent sites were seized.

    Authorities have revealed that the platform was instrumental in tricking nearly half a million people into divulging their bank card details and PIN numbers.

    Additionally, LabHost’s activities resulted in the theft of 1.2 million unique usernames and passwords, highlighting the extensive reach and impact of its operations

    LabHost’s subscription model included various tiers, targeting financial institutions primarily in North America, with a notable increase in phishing attacks against Canadian banks.

    Following a disruptive outage in October 2023, the platform’s resurgence in activity underscored the persistent threat posed by such cybercrime services.

    The international investigation into LabHost’s activities involved collaboration between law enforcement agencies and private sector partners, demonstrating a unified approach to combating online fraud.

    The Metropolitan Police Service, the National Economic Crime Centre, and other international partners played a crucial role in infiltrating and disrupting the platform.

    The seizure of LabHost has sent a strong message to online fraudsters, challenging the notion that they can operate with impunity behind digital identities.

    Authorities have emphasized their commitment to dismantling international fraud networks, leveraging global collaboration to target cybercriminals at their source.

    As the investigation continues, up to 25,000 UK-based victims have been contacted to inform them of the data breach, with efforts underway to identify and support additional victims worldwide.

    The operation against LabHost underscores the ongoing challenges in the fight against cybercrime and highlights the effectiveness of international cooperation in protecting digital spaces from exploitation.

    Protect Your Business Emails with Trusitifi'sΒ AI-PoweredΒ Security β€”stopping 99% of phishing attacks - Request a Free Demo

    The post Phishing-as-a-Service Platform LabHost Seized by Authorities appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Armis, a leading cybersecurity company, has acquired Silk Security, an AI-powered vulnerability detection firm.

    The acquisition comes when organizations grapple with a surge of security findings, with no scalable and automated way to prioritize and operationalize remediation.

    Ineffective processes and inconsistent risk prioritization have resulted in costly and suboptimal remediation efforts, leaving security teams struggling to address the most critical vulnerabilities.

    Armis to Address Full Exposure Management Lifecycle

    Silk Security’s capabilities are set to be integrated into the Armis Centrixβ„’ platform, marking a paradigm shift in how organizations approach risk resolution.

    Free Live Webinar for DIFR/SOC Teams: Securing the Top 3 SME Cyber Attack Vectors - Register Here.

    The combined solution will offer a comprehensive approach to risk prioritization and resolution lifecycle management across code, infrastructure, cloud, and application findings.

    Leveraging advanced AI technologies, Armis Centrixβ„’ will enable advanced security and collaborative exposure management by identifying and consolidating security issues, communicating and ranking priorities, finding and assigning the right owners, and collaborating with developers and operations stakeholders to remediate and reduce risk effectively.

    Outcomes and Proof Points

    The impact of the Armis and Silk Security integration is already felt by organizations that have leveraged these capabilities.

    Organizations have reported significantly reduced time spent identifying owners and assigning access, leading to more efficient risk assessment and remediation processes.

    Through machine learning-powered deduplication, organizations have experienced a severe reduction in the volume of security findings, resulting in improved Mean Time to Remediation (MTTR).

    The integrated solution has enabled organizations to close many findings, reducing overall threat debt and enhancing their security posture.

    Armis’ acquisition of Silk Security marks a significant leap forward in exposure management.

    By integrating Silk Security into the Armis Centrixβ„’ platform, Armis continues to push the boundaries of security excellence, empowering organizations to stay ahead of emerging threats and confidently safeguard their digital footprint.

    Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP

    The post Armis Acquires AI-based Vulnerability Detection Firm Silk Security appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to Kubernetes workloads and leverage them for cryptocurrency mining activity. That’s according to the Microsoft Threat Intelligence team, which said the flaws have been weaponized since the start of April 2024. OpenMetadata is an open-source platform that operates as a

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software to deliver a previously unknown backdoor dubbed MadMxShell. “The threat actor registered multiple look-alike domains using a typosquatting technique and leveraged Google Ads to push these domains to the top of search engine results targeting specific search keywords, thereby

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Our State of Defense series continues with discussion with the CNO and the 4th Fleet.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Could Poland or Romania be eyeing the USAF’s old Warthogs?

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Program officials also say they’ll β€œreimagine” their upgrade plan, with new delays for some capabilities.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • If officials confirm it, Moscow would join the list of recent foreign infiltrators of U.S. water infrastructure.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • In the wake of the recent disclosure of a critical vulnerability (CVE-2024-3400) affecting a leading firewall solution, Xiid Corporation reminds organizations that Xiid SealedTunnel customers remain secure. This latest vulnerability, currently unpatched and rated 10/10 on the CVSS (Common Vulnerability Scoring System), highlights the limitations of traditional security approaches.

    Xiid SealedTunnel, the world’s first and only Zero Knowledge Networking (ZKN) solution, goes beyond Zero Trust architecture. Unlike today’s firewalls susceptible to zero-day exploits because of their break-and-inspect approach and the inevitable use of “smart” detection techniques that can and do fail, SealedTunnel is inherently resilient by design.

    β€œThis is a great example of why complex firewalls become their own security risk. Keep your firewalls simple, and just have them block all inbound access,” said Josh Herr, Head of Deployment and Integration at Xiid Corp. β€œXiid SealedTunnel takes a fundamentally different approach. Our ZKN architecture ensures that data remains completely private and never exposed, even in the face of unknown threats.”

    Xiid’s ZKN technology leverages the power of Zero Knowledge Proofs, allowing users to verify access rights without ever revealing sensitive information. This eliminates attack surfaces and renders data unreadable to unauthorized parties, even if a network breach occurs.

    About Xiid Corporation

    Xiid Corporation is a leading cybersecurity provider specializing in Zero Knowledge Networking solutions. Xiid’s flagship product, SealedTunnel, empowers organizations to achieve unparalleled security and privacy through a revolutionary approach that goes beyond traditional firewalls and zero-trust models. www.xiid.com

    Contact
    CEO
    Steve Visconti
    Xiid Corporation
    steve@xiid.com
    7753382174

    The post Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400) appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ