the grugq's newsletter

Subscribe
Archives
June 15, 2022

June 15, 2022

In theory, and in the lab at least, this is a cool little attack. Intel is super skeptical it’s a big deal for many ppl. Who knows? It’s a bit early to make an accurate assessment.

https://www.hertzbleed.com

Twitter avatar for @arekfurt
Brian in Pittsburgh @arekfurt
This is fairly comprehensible analysis from Intel of the so-called Hertzbleed side-channel cryptographic attack. The long and short of it is that there are likely to be very, very few organizations/people who should actually be worried about this.
intel.comFrequency Throttling Side Channel GuidanceCPU frequency throttling is triggered when CPU power limits are reached. This article provides software guidance for mitigating timing side channels due to CPU frequency behavior.
8:01 PM ∙ Jun 14, 2022
14Likes9Retweets

And another opinion.

Twitter avatar for @matthew_d_green
Matthew Green @matthew_d_green
I haven’t read the Hertzbleed paper yet, but I’m simply going to observe that the most powerful side-channel attacks are those where (1) operations are done very slowly, and (2) each operation depends on very few bits of the key.
7:52 PM ∙ Jun 14, 2022
51Likes5Retweets

-

Twitter avatar for @kennwhite
Kenn White @kennwhite
@aluandalee @IanColdwater @krisnova highly recommended talk to blow your mind: your CPU runs a web server, has a USB stack & a mouse driver, and even Google didn't discover that until 5 yrs ago (at which point they started dumping Intel boards en mass and building & rolling out their own across their global fleet).
Twitter avatar for @kennwhite
Kenn White @kennwhite
On the "Minix runs on a billion computers & no one noticed" story – great talk on Intel CPUs' hidden OS's https://t.co/4mUC9J8Vne https://t.co/l4mewTboJP
12:27 PM ∙ Jun 15, 2022
47Likes20Retweets

-

Twitter avatar for @orange_8361
Orange Tsai 🍊 @orange_8361
Cool chain!
blog.sonarsource.comZimbra Email - Stealing Clear-Text Credentials via Memcache injectionWe discovered flaws in Zimbra, an enterprise email solution, that allow attackers to steal credentials of users and gain access to their email accounts.
3:56 PM ∙ Jun 14, 2022
311Likes96Retweets

-

Twitter avatar for @maddiestone
Maddie Stone @maddiestone
2013: Bug is fixed 2016: Fix is regressed 2022: Exploited in-the-wild and fixed again #itw0days Here's the story of CVE-2022-22620, including zombies 🧟‍♀️ googleprojectzero.blogspot.com/2022/06/an-aut…
googleprojectzero.blogspot.comAn Autopsy on a Zombie In-the-Wild 0-dayPosted by Maddie Stone, Google Project Zero Whenever there’s a new in-the-wild 0-day disclosed, I’m very interested in understanding t...
4:00 PM ∙ Jun 14, 2022
334Likes103Retweets

-

Have a look at what China thinks about Russian APTs.

https://www.socinvestigation.com/apt-c-53-aka-gamaredon-launches-new-ddos-attacks-using-loic/

-

Twitter avatar for @funnycats22
squp!!! @funnycats22
generating greentexts with gpt3 and holy fuck
Image
Image
Image
Image
9:36 AM ∙ Jun 14, 2022
63,209Likes11,686Retweets

-

https://krebsonsecurity.com/2022/06/ransomware-group-debuts-searchable-victim-data/

-

Twitter avatar for @adschina
Adam Segal @adschina
More attribution of US cyber ops from the Global Times and a Chinese cyber security company, Anzer
Exclusive: Report reveals how US spy agencies stole 97b global internet data, 124b phone records in just 30 days
globaltimes.cnExclusive: Report reveals how US spy agencies stole 97b global internet data, 124b phone records in just 30 daysThe US military and government cyber agencies have remotely stolen more than 97 billion pieces of global internet data and 124 billion phone records in the last 30 days, which are becoming a major source of intelligence for the US and other
9:47 PM ∙ Jun 14, 2022

-

Twitter avatar for @c_cadar
Cristian Cadar @c_cadar
Anastasios @a_andronidis and I are delighted to announce SnapFuzz, our fuzzing framework for network applications:
srg.doc.ic.ac.ukSnapFuzz: High-Throughput Fuzzing of Network ApplicationsIn recent years, fuzz testing has benefited from increased computational power and important algorithmic advances, leading to systems that have discovered many critical bugs and vulnerabilities in...
9:23 PM ∙ Jun 14, 2022
32Likes13Retweets

-

Twitter avatar for @Vahn16
Nathan Grayson @Vahn16
Image
Twitter avatar for @THR
The Hollywood Reporter @THR
Netflix is staging a real-life #SquidGame series that’s billed as “the biggest reality competition ever." #SquidGame: The Challenge will include 456 players in real competition in a series of games for a record-setting $4.56 million cash prize: https://t.co/AEwfG5f0xv https://t.co/lPzg61NVw4
6:01 PM ∙ Jun 14, 2022
10,057Likes1,933Retweets

-

Twitter avatar for @TzahPahima
Tzah Pahima @TzahPahima
I was able to access thousands of companies’ passwords on #Azure and run code on their VMs. This includes access to Microsoft’s own credentials… 💣 Here’s HOW I did it. This is the story of #SynLapse. (1/11)
1:39 PM ∙ Jun 14, 2022
3,261Likes937Retweets

-

Twitter avatar for @thezdi
Zero Day Initiative @thezdi
The latest blog from the Trend Micro Research Team looks at CVE-2022-26937: a Microsoft Windows NFS NLM Portmap stack buffer overflow that could lead to RCE. They provide root cause, source code walkthrough, and detection guidance. zerodayinitiative.com/blog/2022/6/7/…
2:27 PM ∙ Jun 8, 2022
122Likes62Retweets

-

Twitter avatar for @maddiestone
Maddie Stone @maddiestone
*whispers* It's only the Internet Explorer desktop application that's going out of support. The browser engine, MSHTML, will be supported on Windows machines until 2029...
1:42 PM ∙ Jun 15, 2022
34Likes12Retweets

-

Twitter avatar for @Margin_Research
Margin Research @Margin_Research
Missed our @reconmtl talk? This blogpost by @__comedian and @hgarrereyn provides an in-depth walk through of the slides, released tools, and previously undocumented workings of Mikrotik internals. margin.re/blog/pulling-m…
Image
12:30 PM ∙ Jun 14, 2022
49Likes20Retweets

-

Twitter avatar for @ollieatnccgroup
Ollie Whitehouse @ollieatnccgroup
Great work by the team here. Free knowledge and education empowers all to know how to attack and defend. Web developers, site reliability engineers, security consultants or bug bounty Ronin. It doesn't matter..
Twitter avatar for @WebSecAcademy
Web Security Academy @WebSecAcademy
We've launched a brand new topic with eight new labs for you to get stuck into! The topic will look at how design issues, and flawed handling of JSON web tokens (JWTs), can leave websites vulnerable to a variety of high-severity attacks. https://t.co/QiuBjqQQ3E https://t.co/7Hdkch9h4n
7:45 AM ∙ Jun 15, 2022
5Likes3Retweets

-

Twitter avatar for @hering_david
David Hering @hering_david
It will never not be funny to me that there were two enemy philosophers who lived at almost the exact same time called Hegel and Schlegel
1:25 PM ∙ Jun 14, 2022
2,350Likes199Retweets

-

Twitter avatar for @jsrailton
John Scott-Railton @jsrailton
WHOA: White House just weighed in on possible acquisition of NSO by @L3HarrisTech. Doesn't sound pleased. Parses as a thinly veiled warning that a *lot of scrutiny is on the table.* I wonder if $LHX shareholders have an appetite for it? By @skirchy theguardian.com/world/2022/jun…
Image
8:51 PM ∙ Jun 14, 2022
133Likes67Retweets

-

Cyber partisans get a glowing review.

https://www.bloomberg.com/news/features/2022-06-15/ukraine-war-attracts-belarusian-hackers-in-fight-vs-putin
Don't miss what's next. Subscribe to the grugq's newsletter:

Start the conversation:

Be the first to share your thoughts

X