CYBERSECURITY / DEFENSE / INTELLIGENCE

  • Ukraine, robotics, and more are driving a six-year plan to improve training in irregular warfare, technology, and psyops.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Its CEO also said the company won’t compete to build cheap, non-survivable drones.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Hackers exploit PowerShell, a built-in scripting tool on Windows (and sometimes Linux), to launch various attacks. PowerShell scripts can download malware, bypass antivirus, steal data, and grant remote access.Β Β 

    The scripts are attractive to attackers because they are easy to write, difficult to detect due to obfuscation techniques (like partial name matching), and leverage legitimate system resources for malicious actions (β€œliving off the land”) but some tools can analyze these PowerShell scripts for safe detonation and step-by-step tracing.Β 

    PowerShell scripts are a type of automation tool used on Windows systems that can be used for legitimate purposes like configuration management or for malicious purposes like installing malware.Β Β 

    Easily see detailed function input and output in PowerShell Tracer

    The new PowerShell Script Tracer helps analysts understand what a PowerShell script does by providing a detailed breakdown of the script’s functions and how they connect to each other, which can help analysts identify malicious behaviour in the script more easily.Β 

    Hackers often use it to perform a variety of malicious actions, such as:Β 

    • Download and execute malicious binaries from a separate source.Β 
    • Bypass antivirus software by executing the script in memory.Β 
    • Execute malicious scripts.Β 
    • Collect and exfiltrate system data.Β 
    • Remotely control the infected system.Β 
    Document

    Integrate ANY.RUN in Your Company for Effective Malware Analysis

    Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

    • Real-time Detection
    • Interactive Malware Analysis
    • Easy to Learn by New Security Team members
    • Get detailed reports with maximum data
    • Set Up Virtual Machine in Linux & all Windows OS Versions
    • Interact with Malware Safely

    If you want to test all these features now with completely free access to the sandbox:

    ANY.RUN’s Script Tracer helps analyze PowerShell scripts used in malware and to access it, locate the process tree on the right side of the interface, which shows processes launched, including PowerShell commands.Β 

    PowerShell command launched

    For further investigation where you can see how this tracer works, click on the specific PowerShell process in the tree, which will display a process details tab at the bottom and within this tab, click “More Info” to access the Script Tracer and gain detailed insights into the deobfuscated script’s activities.Β Β 

    The Advanced Details window replaces the general process information with a detailed view of what it is doing.

    The Script Tracer tab focuses on PowerShell executions and shows the functions called by the process in order, from top to bottom.

    This allows you to determine how the process is acting by examining the function calls and how they are executed.

    Advanced details of a process window

    A malicious program downloads data from a URL using the System.Net.WebClient class. The downloaded data are binary and encoded in Base64.

    The program then decodes the data using the FromBase64String method and converts it to a Unicode string using System. Text.UnicodeEncoding.GetString.Β 

    The MZ signature in the trace indicates that the string is the actual PowerShell command that the program wants to execute, which is most likely an encoded executable file. 

    Static Discovering

    The provided PowerShell code exhibits several indicators of malicious intent and executes hidden, bypassing security measures (-windowstyle hidden, -executionpolicy bypass) by downloading data from image URLs ($links) and extracting a Base64-encoded command hidden within the downloaded content ($imageText.Substring). 

    This retrieved command is then loaded directly into memory as a.NET assembly for execution ([System.Reflection.Assembly]::Load), bypassing traditional file-based detection methods suggesting the code aims to download and execute a hidden malicious payload (hidden) within an image. 

    Analysis revealed the script’s malicious nature, where extracted URLs, https://uploaddeimagens[.]com.br/images/004/766/978/full/new_image_vbs.jpg?1712588469 and https://uploaddeimagens[.]com.br/images/004/766/979/original/new_image_vbs.jpg?1712588500, can be used as Indicators of Compromise (IOCs) for further investigation.

    Analyze PowerShell Scripts in Malware inΒ ANY.RUNΒ - Register for Free

    What is ANY RUN?

    ANY.RUN is a renowned ally for over 400,000 cybersecurity experts globally. This interactive sandbox platform streamlines the malware analysis process for threats aimed at both Windows and Linux systems, equipping analysts with a sophisticated tool for their investigative work.

    Additionally, ANY.RUN’s threat intelligence offerings, namely Lookup and Feeds, deliver precise indicators of compromise and contextual insights that enable users to detect threats and manage incident responses swiftly.

    ANY.RUN enhances the speed and accuracy of threat analysis. The platform is adept at identifying common malware families using YARA and Suricata rules and can pinpoint malware behaviors through signatures when specific family detection is unfeasible.

    Key Features of ANY.RUN:

    • Rapid Malware Detection: ANY.RUN can detect malware in approximately 40 seconds following a file upload. It utilizes YARA and Suricata rules to recognize well-known malware families and employs behavioral signatures to identify malicious activities in new threats.
    • Real-Time Interaction with Samples: Powered by VNC, ANY.RUN’s interactive cloud sandbox allows users to perform real-system activities such as browsing web pages, navigating through installers, and accessing password-protected archives.
    • Cost-Effective and Maintenance-Free: As a cloud-based solution, ANY.RUN eliminates the need for initial setup or ongoing maintenance, saving time and resources for businesses.
    • Comprehensive Malware Behavior Analysis: ANY.RUN offers an in-depth examination of malware behavior, tracking network traffic, system calls, and file system modifications.
    • Enhanced Team Collaboration: The platform facilitates easy sharing of analysis results among team members. Senior analysts can also review the work of junior colleagues by accessing recordings of their analysis sessions.
    • Scalability: ANY.RUN’s cloud service model allows for easy scaling of security operations by simply adding more licenses.

    For a closer look at how ANY.RUN can benefit your security team, contact ANY.RUN for a personalized guided tour of the platform.

    Β 

    The post Analyze Malicious Powershell Scripts by Running Malware in ANY.RUN Sandbox appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The North Korea-linked threat actor known as Lazarus Group employed its time-tested fabricated job lures to deliver a new remote access trojan called Kaolin RAT. The malware could, “aside from standard RAT functionality, change the last write timestamp of a selected file and load any received DLL binary from [command-and-control] server,” Avast security researcher Luigino

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • A new cybersecurity threat has emerged as a zero-click remote code execution (RCE) exploit targeting Apple’s iMessage service is reportedly being circulated on various hacker forums.

    This exploit, which allows hackers to take control of an iPhone without any interaction from the user, poses a significant risk to millions of iMessage users worldwide.

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

    A zero-click exploit is a cybersecurity threat that does not require the victim to click on a link, download a file, or take any action to trigger the exploit.

    This makes zero-click exploits particularly dangerous and effective, as they can compromise devices silently without the user’s knowledge.

    A recent tweet by Dark Web Informer brought to our attention an article discussing the circulation of a Zero-click Remote Code Execution (RCE) exploit for iMessage on hacker forums.

    The iMessage Vulnerability

    The exploit takes advantage of a vulnerability in iMessage, which is integrated deeply into the iOS system used by iPhones and iPads.

    Document

    Integrate ANY.RUN in Your Company for Effective Malware Analysis

    Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

    • Real-time Detection
    • Interactive Malware Analysis
    • Easy to Learn by New Security Team members
    • Get detailed reports with maximum data
    • Set Up Virtual Machine in Linux & all Windows OS Versions
    • Interact with Malware Safely

    If you want to test all these features now with completely free access to the sandbox:

    Details about the specific nature of the vulnerability have not been disclosed publicly, but it is known that the exploit can allow unauthorized access to the device’s data and functionalities.

    The exploit reportedly uses sophisticated techniques to bypass Apple’s security measures.

    Once it is executed, the attacker can remotely control the device, access sensitive information, and potentially deploy further malware.

    Response from Apple

    Apple has not yet released an official statement regarding this specific exploit.

    However, the company is known for its swift response to security threats and is likely working on a patch to fix the vulnerability.

    Users are advised to keep their devices updated to the latest version of iOS to protect against such exploits.

    The circulation of this exploit on hacker forums increases the risk of it being used by malicious actors.

    Users are advised to be extra cautious and avoid opening or interacting with suspicious messages.

    Tips for Protection:

    • Update Regularly: Ensure your device’s operating system is up-to-date with the latest security patches.
    • Be Cautious: Be wary of your device’s unusual messages or behavior.
    • Use Security Software: Consider using security software designed for mobile devices.

    The discovery of the zero-click RCE exploit for iMessage is a reminder of the constant vigilance required in the digital age.

    Users and corporations must stay informed about potential threats and proactively protect their digital environments.

    Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo 

    The post Beware! Zero-click RCE Exploit for iMessage Circulating on Hacker Forums appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Hackers exploit LOCKBIT Builder due to its versatility in creating customized ransomware payloads which enable them to tailor attacks to specific targets and evade detection by security measures.

    DragonForce Ransomware emerged in November 2023, employing double extortion tactics – data theft followed by encryption, with victims’ data leaked if the ransom is unpaid.Β 

    Though sharing the name with a Malaysian hacktivist group, the origins of the DragonForce Ransomware are unclear.Β 

    Cyble’s cybersecurity researchers’ analysis recently revealed that the DragonForce’s binary is based on the leaked LOCKBIT Black builder, allowing customization like encryption modes, filename obfuscation, process impersonation, file & folder exclusions, and ransom note templating.

    DragonForce Leak Site (Source – Cyble)

    DragonForce LOCKBIT Builder

    Over 25 global victims have been disclosed so far, and the group leverages the leaked LOCKBIT infrastructure for operational efficiency while maintaining anonymity through the rebranded “DragonForce” identity.

    After analyzing the code, it was found that DragonForce ransomware uses the leaked LOCKBIT builder, which shares many characteristics in terms of design and functionalities.

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach -Β Download Free Guide

    Upon execution, this virus stops many processes and services such as Oracle, Microsoft Office apps, antivirus software, and even backup solutions to speed up encryption.Β 

    The encrypted files are given a random name followed by the ‘.AoVOpni2N’ extension.Β 

    Encrypted Files (Source – Cyble)

    The criminals also put a ransom note called ‘AoVOpni2N.README.txt’ into each encrypted folder. It contains instructions on how to pay for decryption.

    Ransom Note (Source – Cyble)

    What DragonForce does is take advantage of their knowledge about Lockbit, which they got from another leak, to make their attacks fast, but it is not easy to attribute them back through rebranding themselves.

    The DragonForce ransomware shows how dangerous the situation becomes with leaked malware builders such as LOCKBIT Black.Β 

    These types of programs allow threat actors to create personalized ransomware quickly and without much effort, making it harder for international companies to protect themselves against them.Β 

    This data-stealing and encrypting method demonstrates that cyber attackers continuously evolve their strategies to impose maximum monetary harm through ransomware attacks, such as those performed by groups such as DragonForce, which utilizes the “double extortion” method, reads Cyble report.

    This particular case serves as another reminder of why strong safeguards should always exist against the ever-changing threats posed by ransomware groups that take advantage when developers leak their tools into the public domain.

    Recommendations

    Here below we have mentioned all the recommendations:-

    • Verify links and email attachments before opening.
    • Regularly backup data and store it offline.
    • Enable automatic software updates on all devices.
    • Utilize reputable antivirus and security software.
    • Disconnect infected devices from the network.
    • Disconnect external storage devices if connected.
    • Monitor system logs for suspicious activity.

    Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security AwarenessΒ Training -> Try Free DemoΒ 

    The post New DragonForce Ransomware Emerged From The Leaked LOCKBIT Builder appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • A critical flaw has been identified in the popular online code editor, JudgeO.

    If exploited, this vulnerability could allow attackers to execute arbitrary code with root-level privileges, posing a significant threat to systems and data integrity.

    Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

    The vulnerability, tracked under the identifier, was discovered in the JudgeO online code editor, as reported by GitHub.

    This tool, widely used by developers and educational institutions for coding and testing purposes, has been found to contain a severe security flaw that malicious actors could exploit.

    This release fixes the following security vulnerabilities:

    • CVE-2024-28185
    • CVE-2024-28189
    • CVE-2024-29021

    The issue’s core lies in the application’s handling of symbolic links (symlinks) within the sandbox directory.

    Attackers can exploit this oversight by creating symlinks that point to critical system files.

    Details:

    When JudgeO writes a run_script to the sandbox directory, it inadvertently writes to these linked system files instead due to the symlink.

    unless submission.is_project
    
          # gsub is mandatory!
    
          command_line_arguments = submission.command_line_arguments.to_s.strip.encode("UTF-8", invalid: :replace).gsub(/[$&;<>|`]/, "")
    
          File.open(run_script, "w") { |f| f.write("#{submission.language.run_cmd} #{command_line_arguments}")}
    
        end

    The vulnerability manifests when executing a submission. JudgeO’s process involves writing a run_script to the sandbox directory.

    However, if an attacker has already placed a symlink at the run_script path, the f.write operation in the code will write to an arbitrary file on the system that is not sandboxed.

    Document

    Integrate ANY.RUN in Your Company for Effective Malware Analysis

    Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

    • Real-time Detection
    • Interactive Malware Analysis
    • Easy to Learn by New Security Team members
    • Get detailed reports with maximum data
    • Set Up Virtual Machine in Linux & all Windows OS Versions
    • Interact with Malware Safely

    If you want to test all these features now with completely free access to the sandbox:

    This security gap allows an attacker to overwrite system scripts and achieve code execution outside the confines of the sandbox environment.

    The vulnerability stems from the application’s Β chownΒ command on files within the sandbox that users can manipulate.

    Attackers can exploit this by creating a symbolic link (symlink) from within the sandbox to a file outside.

    This allows theΒ chownΒ command, intended only for internal sandbox operations, to be executed on any file on the system.Β Β Β Β Β Β Β 

    Details:

    The specific issue arises in the context where the application attempts to change the ownership of a file name run_script, which is crucial for the execution of user-submitted code.

    The relevant code snippet is as follows:

    `sudo chown $(whoami): #{run_script} && rm #{run_script}` unless submission.is_project

    This command is executed unless the submission is marked as a project.

    By strategically creating a symlink named run_script that points to a critical system file, an attacker can force the application to change the ownership of an external file, effectively gaining control over it.

    CVE-2024-29021: SSRF into Sandbox Escape through Unsafe Default Configuration

    The vulnerability is rooted in Judge0’s default configuration, particularly its handling of network requests within the sandboxed environment.

    This configuration flaw can be exploited via SSRF, an attack where an attacker induces the server-side application to make requests to an unintended location.

    Details:

    Judge0 includes a configuration option labeled enable_network, which, when enabled, allows the sandboxed application to perform network requests.

    This includes communication with internal services such as Judge0’s PostgreSQL database, accessible within the internal Docker network.

    The exploit targets the following critical lines of code:

    command = "isolate #{cgroups} \

    Β Β Β  -s \

    Β Β Β  -b #{box_id} \

    Β Β Β  -M #{metadata_file} \

    Β Β Β  #{submission.redirect_stderr_to_stdout ? "--stderr-to-stdout" : ""} \

    Β Β Β  #{submission.enable_network ? "--share-net" : ""} \

    Β Β Β  -t #{submission.cpu_time_limit} \

    Β Β Β  -x #{submission.cpu_extra_time} \

    Β Β Β  -w #{submission.wall_time_limit} \

    Β Β Β  -k #{submission.stack_limit} \

    Β Β Β  -p#{submission.max_processes_and_or_threads} \

    Β Β Β  #{submission.enable_per_process_and_thread_time_limit ? (cgroups.present? ? "--no-cg-timing" : "") : "--cg-timing"} \

    Β Β Β  #{submission.enable_per_process_and_thread_memory_limit ? "-m " : "--cg-mem="}#{submission.memory_limit} \

    Β Β Β  -f #{submission.max_file_size} \

    Β Β Β  -E HOME=/tmp \

    Β Β Β  -E PATH=\"/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\" \

    Β Β Β  -E LANG -E LANGUAGE -E LC_ALL -E JUDGE0_HOMEPAGE -E JUDGE0_SOURCE_CODE -E JUDGE0_MAINTAINER -E JUDGE0_VERSION \

    Β Β Β  -d /etc:noexec \

    Β Β Β  --run \

    Β Β Β  -- /bin/bash run \

    Β Β Β  < #{stdin_file} > #{stdout_file} 2> #{stderr_file} \

    Β Β Β  "
    Β Β Β  puts "[#{DateTime.now}] Running submission #{submission.token} (#{submission.id}):"
    Β Β Β  puts command.gsub(/\s+/, " ")
    Β Β Β  puts
    Β Β Β  `#{command}`

    This command setup is generally secure against command injection vulnerabilities, as all variables injected into the shell command are controlled (either string literals or numerical values).

    However, the SSRF vulnerability allows an attacker to manipulate these settings by interacting with the database to change the data types of relevant columns, potentially leading to command injection.

    This incident serves as a stark reminder of the importance of cybersecurity vigilance.

    As the developers of JudgeO have demonstrated, prompt action and transparency in addressing security issues are critical.

    Users, for their part, must remain proactive in updating their software and staying informed about potential vulnerabilities.

    Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo 

    The post JudgeO Online Code Editor Flaw Let Attackers Execute Code as Root User appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest tools and why you need multiple choke points in your defense strategy. Surprisingly, most network attacks are not exceptionally sophisticated, technologically advanced, or reliant on zero-day tools that exploit

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

  • The U.S. Department of Justice (DoJ) on Wednesday announced the arrest of two co-founders of a cryptocurrency mixer called Samourai and seized the service for allegedly facilitating over $2 billion in illegal transactions and for laundering more than $100 million in criminal proceeds. To that end, Keonne Rodriguez, 35, and William Lonergan Hill, 65, have been charged

    Go to source

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ

    ΒΆΒΆΒΆΒΆΒΆ