the grugq's newsletter

Subscribe
Archives
December 5, 2024

December 5, 2024

December 5, 2024

Me reverse engineering: Haha fuck yeah!!! Yes!!

Me engineering: Well this fucking sucks. What the fuck.

— Battle Programmer Yuu (@netspooky) December 3, 2024


NEW: An independent review board will launch its investigation of an unprecedented Chinese hack of global telecom systems later this week, @CISAJen said Wednesday.

The 1st meeting of the Cyber Safety Review Board on Salt Typhoon happens Friday.https://t.co/agTV2XmFcb

— Martin Matishak (@martinmatishak) December 4, 2024


For anyone interested in detection and prevention methods against Salt Typhoon intrusions targeting communication providers, here is a comprehensive guide:https://t.co/SSPd5YbIax pic.twitter.com/jiuMexTwMl

— Rob Joyce (@RGB_Lights) December 4, 2024

Rob Joyce was one of the leading proponents to create more backdoors, which could have jeopardized millions of Americans’ privacy. Thankfully, @JoshuaSteinman stopped him. https://t.co/Plu1wzHRYM

— Ezra A. Cohen (@EzraACohen) December 4, 2024

You are confusing me with someone else Ezra. https://t.co/Rw727FOr1A

— Rob Joyce (@RGB_Lights) December 4, 2024


Based on our findings and those reported by governments and other security vendors, Microsoft Threat Intelligence assesses the Russian nation-state actor we track as Secret Blizzard has used the tools and infrastructure of at least 6 other threat actors during the past 7 years.

— Microsoft Threat Intelligence (@MsftSecIntel) December 4, 2024

Good for them. Hack smarter, not harder


great, now I am really stuck in vim https://t.co/zSCZdep0Lz

— ThePrimeagen (@ThePrimeagen) December 4, 2024


Once inside, it’s almost impossible to remove intruders without some downtime. They probably know the networks better than legit sysadmins and no one wants to break anything. They’re inside and here to stay. https://t.co/52RKIw65KR

— x0rz (@x0rz) December 4, 2024


Update: Fuzzing 5G with with SignalSDR Pro. Video soon. pic.twitter.com/TAdyW9qjwS

— signalens (@signalensradio) December 5, 2024


https://bsky.app/profile/eliothiggins.bsky.social/post/3lchzioecc22l


In breaking news, water is wet, the sky is blue, and owning/pwning telco infrastructure is valuable for intelligence gathering.

It's been a strategic mistake to keep our society vulnerable by fighting e2e encryption rather than embracing it and promoting democratized use of it.

— Dino A. Dai Zovi (@dinodaizovi) December 5, 2024


This is funny. But I can’t believe this is still used? Binary replacement root kits must be dead, no?

In this video I demonstrate a backdoor technique seen in the wild where attackers replace /sbin/nologin with a valid shell on Linux. This gives persistent access to what you think are disabled accounts. Watch how it works and how to look for it below. https://t.co/PRCqGk4vPB

— Craig Rowland - Agentless Linux Security (@CraigHRowland) December 4, 2024


Don't miss what's next. Subscribe to the grugq's newsletter:
X