the grugq's newsletter

Subscribe
Archives
August 25, 2022

August 25, 2022

Twitter avatar for @invisig0th
visi @invisig0th
The "Mobile Advertising IDs" in this disclosure are used by most mobile telemetry providers to geolocate phones. Combined with a mobtel API you can buy access to, this lets you track the GPS self-reported locations of phones anywhere on Earth. Not just a threat to CN citizens.
Twitter avatar for @thezedwards
Zach Edwards @thezedwards
"After Chinese entities paid money to Twitter, there were concerns within Twitter that the information the Chinese entities could receive would allow them to identify and learn sensitive information about Chinese users who successfully circumvented the block..." View Through DOX https://t.co/mF2GOOYQv4
12:44 PM ∙ Aug 24, 2022
23Likes18Retweets

-

The Info Op is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

Twitter avatar for @dodemergingtech
DoD Emerging Technologies @dodemergingtech
The Cybersecurity and Infrastructure Security Agency (#CISA), Stakeholder Engagement Division, Department of Homeland Security is seeking multiple GS-12 to GS-13 DoD civilian employees to support the Cyber Safety Review Board’s (CSRB) review efforts.
8:04 PM ∙ Aug 23, 2022
15Likes7Retweets

-

Twitter avatar for @noUpside
Renee DiResta @noUpside
📢1/ Today Stanford Internet Observatory & @Graphika_NYC are releasing a report analyzing what we believe is the first major covert pro-US/Western influence operation suspended by Twitter and Meta. Each has just released a data set of accounts involved. cyber.fsi.stanford.edu/io/news/sio-au…
Image
1:02 PM ∙ Aug 24, 2022
350Likes189Retweets

-

Twitter avatar for @PaulSonne
Paul Sonne @PaulSonne
NEW: While much has been made about the lack of Russian electronic warfare, extensive Russian jamming on a battlefield level hugely hindered Ukrainian forces in the initial weeks.
washingtonpost.comBattle for Kyiv: Ukrainian valor, Russian blunders combined to save the capitalThis account is based on interviews with more than 100 people, including President Volodymyr Zelensky and his advisers, Ukrainian military commanders, and volunteer militiamen.
1:26 PM ∙ Aug 24, 2022
145Likes32Retweets

-

Twitter avatar for @sam4k1
sam4k @sam4k1
slides for my talk "E’rybody Gettin’ TIPC: Demystifying Remote Linux Kernel Exploitation" are up here: conference.hitb.org/hitbsecconf202…
Image
10:44 AM ∙ Aug 25, 2022
26Likes6Retweets

-

Document archive for the Twitter whistleblower brouhaha

https://archive.org/download/whistleblower_disclosure

-

Twitter avatar for @laurenscerulus
Laurens Cerulus @laurenscerulus
"Kyiv has borrowed heavily from online tactics first pioneered by the Kremlin to attack its opponents, promote itself on the global stage and fight back against its larger opponent in the increasingly entrenched war in Eastern Europe."
politico.euHow Ukraine used Russia’s digital playbook against the KremlinFrom hacktivists to info wars, Kyiv is mastering digital warfare in ways previously associated with the Kremlin.
1:48 PM ∙ Aug 24, 2022
8Likes5Retweets

-

Twitter avatar for @kevinroose
Kevin Roose @kevinroose
I spent the past few weeks playing around with DALL-E 2, the AI image generator.
It's incredible, and it inspired this column about a wave of AI progress that I think we should all be paying much closer attention to.
nytimes.comWe Need to Talk About How Good A.I. Is GettingWe’re in a golden age of progress in artificial intelligence. It’s time to start taking its potential and risks seriously.
1:32 PM ∙ Aug 24, 2022
421Likes117Retweets

-

Twitter avatar for @DFRLab
DFRLab @DFRLab
NEW REPORT: Chinese Discourse Power: Ambitions and Reality in the Digital Domain From @DFRLab's @kentonthibaut, this report traces #China's CCP’s concerted strategy to center itself at the heart of a new alternative international order. 🧵👇atlanticcouncil.org/in-depth-resea…
atlanticcouncil.orgChinese discourse power: Ambitions and reality in the digital domainThe CCP has embarked on a concerted strategy to gain control over the global digital and information environment. Its goal: create an alternative global order with China at its heart.
1:06 PM ∙ Aug 24, 2022
42Likes34Retweets

-

Twitter avatar for @MsftSecIntel
Microsoft Security Intelligence @MsftSecIntel
Microsoft has discovered a post-compromise capability we’re calling MagicWeb, which the threat actor tracked as NOBELIUM is using to maintain persistent access to environments they have compromised. In-depth technical analysis and hunting guidance here:
msft.itMagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone - Microsoft Security BlogMicrosoft security researchers have discovered a post-compromise capability we’re calling MagicWeb, which is used by a threat actor we track as NOBELIUM to maintain persistent access to compromised environments.
5:05 PM ∙ Aug 24, 2022
497Likes309Retweets

-

Nice collection of tools to sanitise files, stripping metadata or modifying PDFs

https://darknetlive.com/post/former-nsa-director-will-kill-you-via-metadata/

-

Twitter avatar for @Osinttechnical
OSINTtechnical @Osinttechnical
The Vehicle-Agnostic Modular Palletized ISR Rocket Equipment (VAMPIRE) system is "a portable kit that can be installed on most vehicles for launching of the advanced precision kill weapons system (APKWS) or other laser-guided munitions."
Basically a laser-guided rocket technical
Image
Twitter avatar for @Osinttechnical
OSINTtechnical @Osinttechnical
Up to 24 counter-artillery radars Puma Unmanned Aerial Systems (UAS) and support equipment for Scan Eagle UAS systems VAMPIRE Counter-Unmanned Aerial Systems Laser-guided rocket systems Funding for training, maintenance, and sustainment
3:23 AM ∙ Aug 25, 2022
1,883Likes196Retweets

-

Twitter avatar for @zachxbt
ZachXBT @zachxbt
1/ Cameron Redman is the alleged person responsible for the hacked NFT Twitter accounts over the past few months Does the name ring any bells? Well it should bc in February 2020 he SIM swapped a single person for $37 million worth of Bitcoin & Bitcoin Cash Time for a thread
Image
Image
Image
4:15 PM ∙ Aug 24, 2022
3,817Likes1,150Retweets

-

Twitter avatar for @RoryCormac
Rory Cormac @RoryCormac
Another sharp piece from @joshuachuminski No easy answers, though recognising how Russian failures can end up being successes depending on our response forms a good starting point
mwi.usma.eduThe Next Variant of Russia’s Political Warfare Virus - Modern War InstituteRussia’s invasion of Ukraine has provoked a belated immune response to Moscow’s political warfare campaign to subvert democracy and exploit systemic weaknesses in Europe and the United States. To be sure, there were attempts to halt or roll back the Kremlin’s efforts before the invasion, particularl…
4:27 PM ∙ Aug 24, 2022
9Likes5Retweets

-

Twitter avatar for @theori_io
Theori @theori_io
Our intern @_qwerty_po was destined to analyze a recent Linux kernel LPE vuln (CVE-2022-32250), a bug found and reported by @FidgetingBits. Here's a brief write-up on the analysis of the bug and the exploit development. Check it out! blog.theori.io/research/CVE-2… (exploit included)
blog.theori.ioLinux Kernel Exploit (CVE-2022-32250) with mqueueBackground Netfilter is a framework in the Linux kernel for implementing various networking-related tasks with user-defined handlers. Netfilter provides various functions for packet filtering, network address translation and port translation, and packet logging. Netfilter represents a set of hooks t…
4:26 AM ∙ Aug 25, 2022
153Likes74Retweets

-

Twitter avatar for @vxunderground
vx-underground @vxunderground
Leaked documents online show the purchase (and documentation of) an $8,000,000 iOS Remote Code Execution 0day exploit
Image
Image
Image
9:20 PM ∙ Aug 24, 2022
2,944Likes768Retweets
Twitter avatar for @DrWhax
🏴 Jurre van Bergen @DrWhax
A thread on the infamous forum of xss.is featured a proposal contract from Intellexa for (one of?) their mobile spyware platform that's able to target recent versions of both Android and iOS. I break it down in this 🧵👇
Image
10:32 AM ∙ Aug 25, 2022
20Likes9Retweets

Documents here:

https://anonfiles.com/k095pb56y3/Intellexa_7z

-

Twitter avatar for @riley_fox
Dumb Idiot Riley Fox @riley_fox
There is a new fighting game on Steam called WRITE N’ FIGHT in which all of the characters are classic writers. Here is a 100% real screenshot from the game of Ernest Hemingway punching HP Lovecraft in the nuts.
Image
3:45 PM ∙ Aug 23, 2022
14,037Likes2,796Retweets

The Info Op is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

Don't miss what's next. Subscribe to the grugq's newsletter:

Start the conversation:

Be the first to share your thoughts

X