the grugq's newsletter

Subscribe
Archives
February 10, 2025

February 10, 2025

February 10, 2025


A lot of people don’t know this, but any platform Chrome runs on *except iOS* has a fully featured Bluetooth scanner that allows viewing, connecting, and read/writing GATT attributes.
Go have some fun. You already have the tools
chrome://bluetooth-internals pic.twitter.com/fF6sLzTD8D

— remy🐀 (@_mattata) February 8, 2025


https://static.rusi.org/wagners-business-model-in-syria-and-africa_0.pdf


.@0xBoku recent unhooking bof reminded of this fun trick on how to unhook any windows DLL without opening a handle to an on disk file - just download it from the MS symbol server and replace in memory :3 pic.twitter.com/YNXrLer1Sh

— eversinc33 🤍🔪⋆。˚ ⋆ (@eversinc33) February 9, 2025


🔍 #ThreatHunting ideas for detecting command-line obfuscation techniques from https://t.co/141yv0gznq with Splunk !
(examples with EID 4688)

Mixed Case Randomization Detection
This query counts uppercase/lowercase letters and return command lines with a near-equal ratio pic.twitter.com/V72RV5oYLL

— mthcht (@mthcht) February 9, 2025


Running Doom On An Apple Lightning To HDMI Adapter | Hackaday

As a general rule of thumb, anything that has some kind of display output and a processor more beefy than an early 90s budget PC can run Doom just fine. As [John] AKA [Nyan Satan] demonstrates in a…



JAPAN goes PEW PEW pic.twitter.com/deabTKUxso

— mRr3b00t (@UK_Daniel_Card) February 10, 2025

Link:

https://www.theregister.com/2025/02/09/asia_tech_news_in_brief/


The Plonk It Guide to GeoGuessr

link:

Guide to GeoGuessr — Plonk It

The comprehensive, step-by-step guide teaching you how to identify every country and region on GeoGuessr. Stay up-to-date with the most effective metas, tips and tricks.

Incredible referencing guide for Google StreetView, and therefore for geolocation in general: license plates, sign posts, types of bollards, roof tiles, etc. Thanks @AricToler for sharing. https://t.co/fb69gDWBrP pic.twitter.com/JUlqvNzwQ8

— Christiaan Triebert (@trbrtc) February 9, 2025


This blog post cleared up a bunch of ARM64 caching confusion I had, well worth a read: https://t.co/o72cKP8tpo

— Cow Fault (@cowfault) February 8, 2025


Software Side-Channel Attacks on Kernel Data Structureshttps://t.co/hVWMgXW8G7#Linux #cybersecurity pic.twitter.com/jieDYfgVVE

— 0xor0ne (@0xor0ne) February 9, 2025


A clever technique to fool detection analysts: path masquerading to disguising malware as legit system files in SIEM logs. Unicode tricks make C:\Program Files\Windows Defender look real, hiding payloads in plain sight. https://t.co/9RJl5q8pDW #siem #soc #monitoring pic.twitter.com/k5bVwY3ZLb

— Koen Van Impe ☕ (@cudeso) February 10, 2025


INTRODUCTION


V8 Sandbox Bypass: with Shared Function Info by @__suto and @lanleft_https://t.co/EI1CI5ZP1q pic.twitter.com/PCZALbHHME

— Alex Plaskett (@alexjplaskett) February 8, 2025


The group deployed Phobos ransomware against 17 Swiss companies between April 30, 2023, and October 26, 2024. Their operation involved unauthorized access to victims’ networks, data theft, and encryption of files. The hackers demanded cryptocurrency payments for decryption keys and threatened to publish stolen data if ransoms weren’t paid.  They also used cryptocurrency mixing services to obscure transaction trails.

https://www.khaosodenglish.com/news/2025/02/10/thai-swiss-us-operation-nets-hackers-behind-1000-cyber-attacks/


After ~300,000 messages and an estimated ~3,700 collective hours, someone broke through all 8 levels.

However, a universal jailbreak has yet to be found... https://t.co/xpj2hfGC6W

— Jan Leike (@janleike) February 9, 2025
Don't miss what's next. Subscribe to the grugq's newsletter:
X