Has your threat feed made you lazy
There has been a lot of conversation around threat feeds and how to automate the ingestion of ip’s and domains. A lot of work can go into taking these indicators, wrapping automation around it and...
View ArticleTechnical analysis of the SandWorm Vulnerability (CVE-2014-4114)
iSight Partners recently announced that they had discovered some new malware that was being used in a Russian cyber-espionage campaign. The vulnerability used in the campaign was CVE-2014-4114, which...
View ArticleOrcaRAT - A whale of a tale
It’s every malware analyst’s dream to be handed a sample which is, so far, unnamed by the AV community - especially when the malware in question may have links to a well-known APT group.In my line of...
View ArticleMetasploit: Joomla Akeeba Kickstart Unserialize Remote Code Execution
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require 'rex/zip'require 'json'class Metasploit3...
View ArticleMetasploit: HP Data Protector EXEC_INTEGUTIL Remote Code Execution
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 < Msf::Exploit::Remote Rank =...
View ArticleCVE-2014-0569 (Flash Player) integrating Exploit Kit
My goal was to grab CVE-2014-0556 when i landed yesterday on Fiesta but according to @TimoHirvonen it's CVE-2014-0569 fixed only 1 week ago that has been fired here.I don't know if it appeared...
View ArticleChina collecting Apple iCloud data; attack coincides with launch of new iPhone
After previous attacks on Github, Google, Yahoo and Microsoft, the Chinese authorities are now staging a man-in-the-middle (MITM) attack on Apple’s iCloud.more...
View ArticleFileBug v1.5.1 iOS - Path Traversal Web Vulnerability
Document Title:===============FileBug v1.5.1 iOS - Path Traversal Web VulnerabilityReferences (Source):====================http://www.vulnerability-lab.com/get_content.php?id=1342Release...
View ArticleFiles Document & PDF 2.0.2 iOS - Multiple Vulnerabilities
Document Title:===============Files Document & PDF 2.0.2 iOS - Multiple VulnerabilitiesReferences (Source):====================http://www.vulnerability-lab.com/get_content.php?id=1341Release...
View ArticleMalvertising Payload Targets Home Routers
A few weeks ago we wrote about compromised websites being used to attack your web routers at home by changing DNS settings. In that scenario the attackers embedded iFrames to do the heavy lifting, the...
View ArticleStrengthening 2-Step Verification with Security Key
2-Step Verification offers a strong extra layer of protection for Google Accounts. Once enabled, you’re asked for a verification code from your phone in addition to your password, to prove that it’s...
View ArticleReverse Engineering a Web Application For fun, behavior & WAF Detection
Screening HTTP traffic can be something really tricky and attacks to applications are becoming increasingly complex day by day. By analyzing thousands upon thousands of infections, we noticed that...
View ArticleR7-2014-17: NAT-PMP Implementation and Configuration Vulnerabilities
In the summer of 2014, Rapid7 Labs started scanning the public Internet for NAT-PMP as part of Project Sonar. NAT-PMP is a protocol implemented by many SOHO-class routers and networking devices that...
View ArticleUpdate on the Torrentlocker ransomware
Payments for the ransom have to be done in Bitcoins. We have identified 7 Bitcoin addresses that received ransom payments. The total income as of the 21th of October is 862,79539531 BTC which comes...
View ArticleHostile Subdomain Takeover using Heroku/Github/Desk + more
Hackers can claim subdomains with the help of external services. This attack is practically non-traceable, and affects at least 17 large service providers and multiple domains are affected. Find out if...
View ArticleNew Exploit of Sandworm Zero-Day Could Bypass Official Patch
During the last few days researchers at McAfee Labs have been actively investigating Sandworm, the Windows packager zero-day attack (CVE-2014-4114). McAfee has already released various updates through...
View ArticleCrypto- Advanced crypto library for the Go language
This package provides a toolbox of advanced cryptographic primitives for Go, targeting applications like Dissent that need more than straightforward signing and encryption.more...
View ArticleVulnerability in Microsoft OLE Could Allow Remote Code Execution
Microsoft is aware of a vulnerability affecting all supported releases of Microsoft Windows, excluding Windows Server 2003. The vulnerability could allow remote code execution if a user opens a...
View ArticleRogue Android Apps Hosting Web Site Exposes Malicious Infrastructure
With cybercriminals continuing to populate the cybercrime ecosystem with automatically generated and monetized mobile malware variants, we continue to observe a logical shift towards convergence of...
View ArticleECMAScript 6 for Penetration Testers “Notes on how the new JavaScript changes...
ECMAScript 6 will bring many changes to how JavaScript code works and what languagefeatures developers can benefit from. While the specifiers are still actively discussing somefeatures on their mailing...
View Article