Avast researchers released a free BianLian ransomware decryptor for some variants of the malware

Antivirus firm Avast released a free decryptor for the BianLian ransomware family that allows victims to recover locked files. Security firm Avast has released a free decryptor for the BianLian ransomware to allow victims of the malware to recover locked files. The BianLian ransomware emerged in August 2022, the malware was employed in attacks against organizations in […]

The post Avast researchers released a free BianLian ransomware decryptor for some variants of the malware appeared first on Security Affairs.

Experts spotted a backdoor that borrows code from CIA’s Hive malware

Netlab 360 observed unidentified threat actors using a new backdoor based on the US CIA’s Project Hive malware suite. Researchers from Qihoo Netlab 360 reported that unidentified threat actors using a new backdoor based on the US CIA’s Project Hive malware suite. “Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated […]

The post Experts spotted a backdoor that borrows code from CIA’s Hive malware appeared first on Security Affairs.

Over 6000 Norton LifeLock affected by a data breach

Thousands of customers of Norton LifeLock have been affected by a data breach that compromised their accounts. The attacks enabled the threat actors to access customer password managers according to the details revealed by Gen Digital, the parent compa…

See the details of CVE?

I’ve been experimenting with a few systems on my home network to learn more about OS design. I’m a software engineer by classical training, and lately I’ve been thinking about trying to contribute to some Linux distros / GNU applications. I thought understanding vulnerabilities would be a good way to understand what NOT to do (vulnerabilities on all platforms btw. Understanding what not to do for windows systems or ios or Android is also applicable to Linux, imo).

However, while it’s really easy to look up CVEs in databases, I’ve had a lot of trouble actually finding the details of how to recreate the exploit at home. Where can I see this info?

submitted by /u/Zephos65
[link] [comments]

Cybercheft HEX XOR

I want to XOR a HEX input, with a HEX XOR key, but it seems to always take ASCII as input. For instance, I want to XOR 0C with 0C. This should lead to 0, but I end up with <0. Is there a way to have Cyberchef take the input the same as the key type?…

Has anyone here attempted to build the mechanical switch Silentbridge rogue device?

Hello!

I’m trying to build a RPI rogue device for bypassing 802.1x during Red Teaming engagement, that is based on Silentbridge. We have had some success with the basic version, but we have been caught and blocked several times due to a newer 802.1x in place, which should also be bypassable with an addition of passive network tap and AB switching.

However, my experience with electrical engineering isn’t really great, and when I finally set out to build the thing (described as Device Configuration B here) I’ve realized that it’s something I don’t really know how to do. I understand the concept and the idea behind the device – you wire up the AB switches to selenoids, so you can switch them remotely, and then tap the cable between them so you can eavesdrop on the communication without introducing another network card into the network. But since the Wiki is missing a wiring diagram, I’m at loss how to actually connect it all together.

I feel like it should be pretty elementary, but there is a lot of things in the parts list I can’t figure out how to actually use or how to google for instructions and as I’ve said – this will be my first el. engineering project, so I’ll need all the help I can get.

Which is why I wanted to ask for help here – is there anyone who has tried to build this device (or has more experience and can figure it out from the short description) who could give me some pointers? Or at least send me in the right direction, even if it’s a tutorial for a different device with similar concepts, so I have a starting point from which I can figure out the rest.

And if anyone here has some experience with using the completed device during engagements, I would also love to hear you experience or opinion – it’s the best setup we’ve came up with for remotely controlled rogue devices, but I’m sure there are better ways how to set them up, so if anyone has some recommendations I’ll gladly learn something new. (I know that HAK Packet Squirell does something similar, but IIRC it doesn’t have LTE upstream which is a major requirement for us, since we need a guaranteed way how to control it remotely)

Thank you!

submitted by /u/Mikina
[link] [comments]