the grugq's newsletter

Subscribe
Archives
December 21, 2022

December 21, 2022

Asymmetric Cyber Vulnerability

A unique property of cyber power is that it is available without significant upfront capital expenditure. Here is an interesting case study of poor rural people executing cyber enabled extortion against much more affluent victims. Cyber provides a vast array of mechanisms to exercise power.

Here we have cyber creating the ability for subsistence farmers with internet access on cheap smartphones to attack people with far more resources. The lesson of asymmetric cyber vulnerability is clearly demonstrated by this case.


The sextortion scammers of rural India - Rest of World

Authorities say scammers use burner phones and fake profiles to blackmail victims across the country.

The Info Op is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

-

Twitter avatar for @runasand
Runa Sandvik @runasand
Sam Jaffe covered the UN for CBS; opened ABC's first Moscow bureau; covered the trial of the U-2 pilot; and reported to the FBI on his Soviet contacts. The FBI and CIA later accused him of being a Soviet agent, though he was never formally charged.
journalistandspy.substack.comSam JaffeSam A. Jaffe was a journalist who covered the United Nations for CBS News and reported from Moscow, Hong Kong and Vietnam for ABC News. He opened ABC’s first bureau in Moscow and covered the trial of Francis Gary Powers, the pilot of the U-2 spy plane that was shot down over the Soviet Union. The Ov…
3:50 PM ∙ Dec 20, 2022
11Likes5Retweets

-

Twitter avatar for @JustineTunney
Justine Tunney @JustineTunney
Blink is now outperforming Qemu by 13% when emulating GCC. There's still so many optimizations I haven't even written yet! github.com/jart/blink
Image
9:42 AM ∙ Dec 17, 2022
1,153Likes103Retweets

-

Numbers Stations and Enigma Stations

Signals Identification wiki

https://www.sigidwiki.com/wiki/Category:Numbers_Stations

-

Twitter avatar for @cyb3rops
Florian Roth ⚡ @cyb3rops
Image
8:10 PM ∙ Dec 20, 2022
312Likes29Retweets

-

My mom, falsely suspecting I am a serious cybersecurity professional


Mike Sexton: "My mom, falsely suspecting I am a serious cyberse…" - Infosec Exchange

Attached: 1 image My mom, falsely suspecting I am a serious cybersecurity professional

-

So I gave a talk last week at SecTalks on predicting Pump & Dump #scams in #Crypto (you know, other than simply saying "they all are" which would be pretty damn accurate). You know, the ones that run on Telegram groups, where the other group members are the actual suckers.

Process is simple. I took a real world example and analysed the history. Then built an API reading script to crawl for the same signs, across all 2200 tokens in Binance. Basically, you just look for a gradual increase in buy pressure that is close - but not close enough - to baseline. We're not looking for spikes or major changes. We want to see people trying to be subtle.

We do this by comparing the month ave to the day ave and watching for those with a ratio near to 1 but not too near.

Then we look at the purchases when this happens and measure the randomness of them - and look for non-random purchasing. You can see in the Excel based graph the data all has a clear upper and lower bound, this buying was anything but random and was clearly done by a bot.

Then the purchasing tails off and goes quiet.

And that's how we know there's a pump about to happen.


Chloe Fletcher: "So I gave a talk last week at SecTalks on predict…" - Infosec Exchange

Attached: 4 images So I gave a talk last week at SecTalks on predicting Pump & Dump #scams in #Crypto (you know, other than simply saying "they all are" which would be pretty damn accurate). You know, the ones that run on Telegram groups, where the other group members are the actual suckers. Process is simple. I took a real world example and analysed the history. Then built an API reading script to crawl for the same signs, across all 2200 tokens in Binance. Basically, you just look for a gradual increase in buy pressure that is close - but not close enough - to baseline. We're not looking for spikes or major changes. We want to see people trying to be subtle. We do this by comparing the month ave to the day ave and watching for those with a ratio near to 1 but not too near. Then we look at the purchases when this happens and measure the randomness of them - and look for non-random purchasing. You can see in the Excel based graph the data all has a clear upper and lower bound, this buying was anything but random and was clearly done by a bot. Then the purchasing tails off and goes quiet. And that's how we know there's a pump about to happen.

-

Twitter avatar for @Michael1979
Sir Michael @Michael1979
Here's my explanation of the film Armageddon, which I believe to be a very misunderstood film
8:44 PM ∙ Dec 20, 2022
731Likes130Retweets

-

Twitter avatar for @hoangnx99
Nguyen Xuan Hoang @hoangnx99
This was really a cool 2-bug chain which lead to RCE on Microsoft Exchange Server: - msrc.microsoft.com/update-guide/v… - msrc.microsoft.com/update-guide/e… We also rced Exchange Online. Great work from @rskvp93 <3 Follow him for upcoming blogs #tabshell
Image
Twitter avatar for @rskvp93
Rskvp93 @rskvp93
MSRC released the patch for our "TabShell" vulnerability (https://t.co/5vlDHIlX02). This is a nice bug chain to RCE Exchange on-premises, Exchange Online, Skype for Business Server (may be SFB Online+Teams too but can't find its powershell remote endpoint) with @_q5ca @hoangnx99
6:46 AM ∙ Dec 14, 2022
148Likes46Retweets

-

Twitter avatar for @moyix
Brendan Dolan-Gavitt @moyix
In case you missed it at NDSS BAR this past February, @iman2_718 and my paper on training a retargetable decompiler using transformers is up on arXiv now: arxiv.org/abs/2212.08950
11:10 PM ∙ Dec 20, 2022
12Likes4Retweets

-

🔖 Introducing PEACH, a tenant isolation framework for cloud applications

A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation by reducing your cloud applications’ attack surface. From @wiz_io@twitter.com


Introducing PEACH, a tenant isolation framework for cloud applications | Wiz Blog

A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation by reducing your cloud applications’ attack surface

Marco Lancini: "🔖 Introducing PEACH, a tenant isolation framework…" - Infosec Exchange

🔖 Introducing PEACH, a tenant isolation framework for cloud applications A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation by reducing your cloud applications’ attack surface. From @wiz_io@twitter.com https://www.wiz.io/blog/introducing-peach-a-tenant-isolation-framework-for-cloud-applications

-

The Info Op is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

Don't miss what's next. Subscribe to the grugq's newsletter:
X