the grugq's newsletter

Subscribe
Archives
August 17, 2022

August 17, 2022

Twitter avatar for @DAlperovitch
Dmitri Alperovitch @DAlperovitch
Fascinating story from @washingtonpost on the prewar intel. Might be one of the greatest intel coups ever “US intel community had penetrated multiple points of RU political leadership, spying apparatus and military, from senior levels to the front lines”
washingtonpost.comRoad to war: U.S. struggled to convince allies, and Zelensky, of risk of invasionA Washington Post examination of the road to war in Ukraine, and Western efforts to unite to thwart the Kremlin’s plans, draws on extensive interviews with more than three dozen senior U.S., Ukrainian, European and NATO officials.
12:56 PM ∙ Aug 16, 2022
1,441Likes471Retweets

-

The Info Op is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

Twitter avatar for @Offensive_Cyber
Offensive Cyber Working Group @Offensive_Cyber
"We observed cyber-warfare incorrectly; we have over-promised on what is likely & under-promised on what is possible." @ILDannyMoore discusses what we can realistically expect from cyber-warfare as offensive cyber capabilities evolve. Check out #TheAlert
offensivecyber.orgCyber-Warfare: Stop Asking About the RevolutionBy Daniel Moore We have been expecting cyberwar for decades. Researchers and commentators alike have awaited a revolution in military affairs delivered by non-violent digital coercion. In thei…
1:14 PM ∙ Aug 16, 2022
38Likes26Retweets

-

Twitter avatar for @gknauss
Greg Knauss @gknauss
I’m kind of surprised how often, in a professional context, I say, “So fix your fuckin’ shit.”
2:34 PM ∙ Aug 16, 2022
45Likes13Retweets

-

A post that goes into the details of some cyber criminal infrastructure.

https://medium.com/csis-techblog/inside-view-of-brazzzersff-infrastructure-89b9188fd145

-

Twitter avatar for @S1r1u5_
s1r1us @S1r1u5_
Watch, Proof of Concept: Remote Code Execution on Element Desktop Application.
blog.electrovolt.io/posts/element-… This involves usage of v8 n-day exploit to bypass certain Electron Framework restrictions.
3:21 PM ∙ Aug 16, 2022
231Likes71Retweets

-

VPNs on iOS are a scam, apparently.

https://www.michaelhorowitz.com/VPNs.on.iOS.are.scam.php

-

Twitter avatar for @UlicBelouve
𝕭𝖊𝖑𝖔𝖚𝖛𝖊 @UlicBelouve
This was one of the best shirts I saw at @defcon . I’m pretty sure they’ll get an awesome prize package in 15 years. Let me be one of the first (timeline wise) to congratulate you on your contest win!
Image
3:49 PM ∙ Aug 16, 2022
1,150Likes133Retweets

-

Twitter avatar for @QuinnyPig
Corey Quinn @QuinnyPig
♪ ♫ ♬ YOUNG DEV! There's a format you know
I said, YOUNG DEV! ♪ ♫ ♬ With Python, Ruby, or Go You can WRITE IT! And I'm sure you will face  So many. Ways. To. Fuck. Up. Whitespace... ♪ ♫ ♬ It's fun to write config in Y.A.M.L! ♪ ♫ ♬
5:35 PM ∙ Aug 11, 2022
1,319Likes315Retweets

-

Twitter avatar for @CAFinUS
Canadian Forces in 🇺🇸 @CAFinUS
“You lose 100% of the credit for the NOFORN op orders you write. – Martyn” – Americans https://t.co/HxPQ8jwvAk
Twitter avatar for @OleSuperSub
Martyn @OleSuperSub
@CAFinUS I was once asked to write an Op Order for the US when I was working for them. Did the whole thing, sent to the Ops Staff who then NOFORN it. The Admiral wanted me to brief it but I couldn’t because, even tho no changes, it was now NOFORN. Couldn’t even get in the room.
3:22 AM ∙ Aug 16, 2022
72Likes4Retweets

-

Twitter avatar for @Cannibal
Cannibal ➡️ Defcon @Cannibal
Defcon 30 photos I shot are up! Consent was received for every photo but if you wish to rescind let me know. I wanted to thank the Goon Photo Corps for all their hard work. @astcell @InfoSystir @AlexChaveriat @gregory_price and @AJ7o2. You're awesome <3
flic.krDefcon 30August 2022
12:08 AM ∙ Aug 17, 2022
99Likes28Retweets

-

As @dinodaizovi said, “breaches are primitives” chained to gain access to the actual target.

I know that more advanced groups have been doing this for years, decades really, but it is nice to see it entering the public sphere. As some people will be aware, one of my quotes on security is is “trust is the root of all compromise.” These ‘supply chain’ attacks are exploitation of trust relationships. Trust relationships are more powerful than memory corruption. Once you gain access you are a legitimate user as far as the system is concerned. And they’re everywhere (see Halvar’s comment below)

Twitter avatar for @0xdabbad00
Scott Piper @0xdabbad00
Mailchimp compromised -> Used to compromise the password resets for DigitalOcean accounts -> Used to compromise crypto companies.
Twitter avatar for @campuscodi
Catalin Cimpanu @campuscodi
Mailchimp discloses security breach: https://t.co/7sZXGsehcY Digital Ocean was also impacted as a result: https://t.co/0i9CEnft8x
2:39 PM ∙ Aug 16, 2022
98Likes61Retweets

Here is the original post from Digital Ocean, the thing to read if you’re more curious about the details.

https://www.digitalocean.com/blog/digitalocean-response-to-mailchimp-security-incident

And @HalvarFlake’s take on the incident.

Twitter avatar for @halvarflake
Halvar Flake @halvarflake
Image
Twitter avatar for @WeldPond
Chris Wysopal @WeldPond
We are seeing more transvendor multistage attacks. Supply chain attacks are getting more complex. https://t.co/BivrizZNEN
10:28 AM ∙ Aug 17, 2022
25Likes7Retweets
Twitter avatar for @CIA
CIA @CIA
#TuesdayTrivia Can you tell us what type of animal #CIA employs? Post your response in the comment section and check back tomorrow for the answer. Join the fun! #CIA75
Image
4:00 PM ∙ Aug 16, 2022
1,333Likes272Retweets

-

Twitter avatar for @Viss
D̒͂̕ᵈăᵃn̕ᶰ Ť̾̾̓͐͒͠ᵗe͗̑́̋̂́͡ᵉn̅ᶰtᵗl̀̓͘ᶫe̓̒̂̚ᵉrʳ @Viss
ICYMI: @d0tslash got on the front page of vice today for his dog-robot killswitch w/ flipperzero trick :D
vice.comHacker Finds Kill Switch for Submachine Gun–Wielding Robot DogThe submachine gun–firing robot dog can be remotely shut down with an AI dolphin branded hacker’s tool.
5:37 PM ∙ Aug 8, 2022
291Likes78Retweets

-

Twitter avatar for @psywarorg
PsyWar.Org @psywarorg
German prisoner of war's view on Russian propaganda. Plus ça change
Image
11:00 AM ∙ Aug 17, 2022
7Likes5Retweets

-

Twitter avatar for @CIA
CIA @CIA
#TuesdayTrivia Can you tell us what type of animal #CIA employs? Post your response in the comment section and check back tomorrow for the answer. Join the fun! #CIA75
Image
4:00 PM ∙ Aug 16, 2022
1,333Likes272Retweets
Twitter avatar for @NSAGov
NSA/CSS @NSAGov
@CIA Dogs
5:53 PM ∙ Aug 16, 2022
669Likes79Retweets

-

Twitter avatar for @gentilkiwi
🥝 Benjamin Delpy @gentilkiwi
Not only Windows Defender related, but always pleasure to see same bypass working after few years
Image
Image
11:51 PM ∙ Aug 14, 2022
309Likes62Retweets

-

Twitter avatar for @cor_ctf
Crusaders of Rust @cor_ctf
Check out corCTF kernel writeups!
FizzBuzz101's challenge shows a novel leakless + data-only technique to pwn Linux with a 6 byte overflow: willsroot.io/2022/08/revivi… D3v17's CoRJail shows a novel technique used on kctf to achieve arb free with poll_list :
syst3mfailure.io[corCTF 2022] CoRJail: From Null Byte Overflow To Docker Escape Exploiting poll_list Objects In The Linux KernelCoRJail is a kernel exploitation / Docker escape challenge designed for corCTF 2022. Players were asked to escape from a hardened Docker container with custom seccomp filters exploiting a Off-By-Null vulnerability in a Linux Kernel Module accessible via procfs. With this article, I present a novel k…
7:05 AM ∙ Aug 17, 2022
71Likes20Retweets

Don't miss what's next. Subscribe to the grugq's newsletter:
X