- Vulnerable U
- Posts
- šļø Vulnerable U | #079
šļø Vulnerable U | #079
Telegram CEO saga, Russian APT group using Predator and Pegasus spyware code, Bounty for info on Angler Exploit Dev, Volt Typhoon 0day hacking ISPs, and more!
Read Time: 7 minutes
Howdy friends!
Anyone else just really tired this week? I feel like a bunch of people, myself included, that Iāve bumped into are just running on a lower gear the past few days.
I did have some time this morning with a good friend that really invigorated me. Weāre also hiring a bit of help at the Vulnerable U side of things to bring you all even cooler stuff in the coming months. Excited!
Letās get Vulnerable.
ICYMI
šļø Something I wrote: This thread on the TechCrunchās highlight of the best talks out of Vegas this month
š§ļø Something I heard: Anyone else on D&D social algorithm? I started getting memes related to a fake campaign involving a Goblin named Fartbuckle and it features an epic new Childish Gambino song. RIP Fartbuckle.
š¤ Something I said: I was on the Decipher podcast and Iāve gotten about half a dozen texts from people saying it was a good one. So apparently folks listen to it and I didnāt make a fool of myself.
š Something I read: My friend Jen Leggioās interview with my other friend Runa - Rising Tides: Runa Sandvik on Creating Work that Makes a Difference
š£ Sponsor
Advanced Kubernetes Security Best Practices
In this new Kubernetes Security Cheat Sheet, Wiz shares 10 advanced steps to safeguard your Kubernetes Clusters across the following areas:
Components
- End-to-end TLS communications for etc
- Securing kebeles
- Securing the API server via third-party authentication
Network security
- Network policies
- Monitoring traffic and communication
Pods
- Admission controllers and validating admission policies
- Process whitelisting
Unlock these actionable Kubernetes Security best practices today.
Vulnerable News
Telegram Saga
Ok there is a lot here. Telegram CEO got arrested and the whole Internet blew up into attack vs. defend Telegram camps.
I donāt have a lot of opinions on his arrest itself. But boy howdy do people have a misguided view of what Telegram is. A LOT of people in my comments saying this is because Telegram is so secure that the government canāt get access to data. I canāt state clearly enough that Telegram is not to be viewed as an encrypted messenger. It has encrypted chat capabilities that are not on by default and the protocol under the hood is not open source like Signal.
Also, the most popular feature of Telegram is the group chats a la Discord and those can never be encrypted so cops can just join them and see everything.
BREAKING: #Telegram CEO Pavel Durov charged.
6 charges related to:
āļøComplicity in CSAM, trafficking & money laundering, organized crime..
āļøUnresponsiveness to lawful requests
āļøFailures to declare & register cryptography services.ā¬5m bail, forbidden from leaving FR. x.com/i/web/status/1ā¦
ā John Scott-Railton (@jsrailton)
8:34 PM ā¢ Aug 28, 2024
Lot to read here if youāre into it:
WSJ - Telegram Founder Was Wooed and Targeted by Governments
NYTimes - Telegram Founder Charged With Wide Range of Crimes in France
Rob Graham - Some thoughts on the arrest of Pavel Durov (Telegram CEO)
NYTimes - How Telegramās Founder Went From Russiaās Mark Zuckerberg to Wanted Man
404 Media - How Telegram's Founder Pavel Durov Became a Culture War Martyr
Matthew Green - Is Telegram really an encrypted messaging app?
Remember when I told you about this 0-click IPv6 vuln that all Windows boxes were vulnerable to? And then remember I said as soon as a PoC was available it would be a way higher priority and more likely to be exploited. Well today is the day! Get to patching if you havenāt already! (read more)
Google uncovered evidence that Russian government hackers (APT29) are using exploits "identical or strikingly similar" to those developed by spyware companies Intellexa and NSO Group.
And we don't know how they got their hands on it...
Here's what we know: š§µ
ā Matt Johansen (@mattjay)
3:40 PM ā¢ Aug 29, 2024
You know what they say about not burning bridges when you leave a job? Well, Daniel Rhyne from Kansas City took that advice, crumpled it up, and set it on fire. This 57-year-old core infrastructure engineer decided to go out with a bang, locking Windows admins out of 254 servers and demanding ā¬700,000 in Bitcoin. Taking a severance package into your own hands.
Our wannabe hacker extraordinaire thought he was being clever, using a hidden VM for his dirty work and scheduling tasks to change passwords to "TheFr0zenCrew!" But pro tip: if you're planning cybercrime, maybe don't use your work laptop to Google "how to delete domain accounts" and "command line to change local administrator password."
The FBI wasn't amused, and now Rhyne's facing up to 35 years in prison and a $750,000 fine. Looks like he'll have plenty of time to brush up on his cybersecurity skills. (read more)
Angler Exploit Kitā¦ Now there is a name I havenāt heard in a long time. If you were in infosec around 10 years ago, this thing was everywhere. It was an absolute bane of our existence. You think ransomware is bad now? People were getting popped via ads on normal news websites. I can say one good thing about it though: I think it was part of what finally killed Flash. Angler would have a new Flash RCE every freaking week. Jeremiah Grossman once called it death by slow roll 0day. Adobe published stats on how much it cost them to fix a bug that would be publicly disclosed first and it was ā¦not cheap.
Anyway. The couple of guys behind Angler are getting arrested. One is already locked up and theyāre putting a bounty on the other.
āKadariya was identified as one of Maksim Silnikau's co-conspirators, who participated in global-scale malware distribution operations with Andrei Tarasov.
Silnikau (aka "J.P. Morgan"), the creator and operator of Ransom Cartel, Reveton ransomware, and Angler Exploit Kit, was arrested in Spain and later extradited to the United States, where he faces multiple charges incurring sentences of up to 100 years in prison.ā (read more)
This story isnāt getting enough attention IMO. There are reports coming out that China has compromised Versa Director which is used by some major ISPs.
āAfter gaining access to the victims' networks via the exposed Versa management port, the attackers deployed the VersaMem web shell, which steals credentials and then allows Volt Typhoon to access the service providers' customers' networks as authenticated users.ā
Also kind of wild, in the vulnerability advisory Versa then blames their customers for leaving the management portal open on the Internet. I mean theyāre not wrong, butā¦
The scary part for me: āVolt Typhoonās choice of targets and pattern of behavior is not consistent with traditional cyber espionage or intelligence gathering operations, and the U.S. authoring agencies assess with high confidence that Volt Typhoon actors are pre-positioning themselves on IT networks to enable lateral movement to OT [operational technology] assets to disrupt functions,ā (read more)
Ukrainian hackers have struck again, this time hitting Russian TV channels right where it hurts - prime time. According to a source in Ukraine's military intelligence (HUR), they managed to break into several Russian TV servers and broadcast "objective videos about the war in Ukraine."
The hack reportedly affected nine channels, including some owned by Russian oligarch Andrey Komarov. Most had to suspend broadcasting, with only a couple partially resuming operations as of Aug 22. One TV company even issued an apology on VKontakte, blaming "attackers" for airing content that "contradicts the TV channel's policy."
This isn't HUR's first rodeo - they've previously claimed responsibility for cyberattacks on Russian websites and financial institutions. (read more)
Microsoft's throwing a cybersecurity shindig next month, and it's all thanks to that little CrowdStrike incident that had Windows blue-screening left and right in July. They're inviting the who's who of the security world to their Redmond campus on September 10th to brainstorm how to avoid another dumpster fire.
Seems like theyāre proposing shifting more security operations from kernel mode to user mode. It's not a silver bullet, but it could help prevent small hiccups from turning into system-wide meltdowns.
They're also talking about eBPF tech and memory-safe languages like Rust. It's a delicate dance though - these security tools need deep access to do their job, but that same access can cause chaos when things go sideways. (read more)
Clint is the man. He went through and found every talk from summer camp that had anything to do with AI and compiled them all together. With summaries and his thoughts on it to boot. Epic work Clint! (read more)
Log4j?! Insert What Year Is It?! Meme. Anyway, great report from the security team at Datadog who dug in after scratching their head over seeing a new wave of log4j hit some honeypots. Seems threat actors are still modifying some post exploitation techniques using this bug. Report full of techniques and IOCs for your reading pleasure (read more)
Miscellaneous mattjay
This meme got me really good. My friends were eye rolling at me for laughing so hard.
fulfill the oath
ā memeslich š dnd memes (@memeslich)
10:26 PM ā¢ Aug 24, 2024
How'd I do this edition?It's hard doing this in a vacuum. Screaming into a void. Feedback is incredibly valuable to make sure I'm making a newsletter you love getting every week. |
Parting Thoughts:
Community was foundational in launching and propelling my career. Community is the only reason I can stand being in Texas during the summer months. Community is the point. Today, I invite you to embrace discomfort on the road to a more vulnerable you.
Stay safe, Matt Johansen
@mattjay