How Command and Control Servers Are Used In Cyberattacks https://www.securityblue.team/blog/posts/command-and-control-servers-cyberattacks
Cybersecurity Engineer
How Command and Control Servers Are Used In Cyberattacks https://www.securityblue.team/blog/posts/command-and-control-servers-cyberattacks
All the #deals for #InfoSec #CyberSecurity related software/tools this #BlackFriday
https://github.com/0x90n/InfoSec-Black-Friday
đš #Vulnerability in #Okta AD/LDAP Delegated Authentication: Passwordless Authentication (under certain conditions) between July 23 and October 30, 2024 đš
đ DESCRIPTION OF THE VULNERABILITY
The vulnerability results from the use of the Bcrypt key derivation function, which allows a cache key to be generated by combining: user ID + username + password.
Under certain conditions, a user could authenticate by providing only the username, relying on the cache key stored during a previous successful authentication.
â ïž EXPLOITATION CONDITIONS
The username must be 52 characters or more, thus triggering the generation of the cache key.
Authentication service must be offline (agent disconnected) OR experiencing high traffic. This will result in the DelAuth (Delegated Authentication) hitting the cache first.
â
RESOLUTION
Introduced on July 23, 2024 as a standard release, this vulnerability was discovered and patched by Okta on October 30, 2024 by replacing Bcrypt with PBKDF2.
đ RECOMMENDATIONS
Organizations using Okta AD/LDAP DelAuth are advised to:
- Analyze system logs between July 23 and October 30, 2024 to identify any access attempts that may be related to this vulnerability.
- Contact Okta Support for further assistance.
đ TIMELINE
July 23, 2024: Vulnerability introduced as part of a standard Okta release.
October 30, 2024: Vulnerability discovered internally.
October 30, 2024: Vulnerability fixed by changing Bcrypt key derivation function to PBKDF2.
đ OKTA SECURITY ADVISORY: https://trust.okta.com/security-advisories/okta-ad-ldap-delegated-authentication-username/
đš #VulnĂ©rabilitĂ© dans l'authentification dĂ©lĂ©guĂ©e AD/LDAP #Okta : authentification sans mot de passe (sous certaines conditions) entre le 23 juillet et le 30 octobre 2024 đš
đ DESCRIPTION DE LA VULNĂRABILITĂ
La vulnĂ©rabilitĂ© rĂ©sulte de l'utilisation de la fonction de dĂ©rivation de clĂ© Bcrypt, qui permet de gĂ©nĂ©rer une clĂ© de cache en combinant : ID utilisateur + nom dâutilisateur + mot de passe.
Sous certaines conditions, un utilisateur pourrait s'authentifier en fournissant uniquement le nom d'utilisateur, en s'appuyant sur la clé de cache stockée lors d'une précédente authentification réussie.
â ïž CONDITIONS DâEXPLOITATION
Le nom dâutilisateur doit contenir 52 caractĂšres ou plus, dĂ©clenchant ainsi la gĂ©nĂ©ration de la clĂ© de cache.
Le service dâauthentification doit ĂȘtre hors ligne (agent dĂ©connectĂ©) OU soumis Ă un trafic Ă©levĂ©. Cela entraĂźnera l'accĂšs de DelAuth (Delegated Authentication) au cache en premier.
â
RĂSOLUTION
Introduite le 23 juillet 2024 par une mise à jour, cette vulnérabilité a été découverte et corrigée par Okta le 30 octobre 2024 en remplaçant Bcrypt par PBKDF2.
đ RECOMMANDATIONS
Pour les organisations qui utilisent Okta AD/LDAP DelAuth, il est conseillé de :
- Analyser les journaux systĂšme entre le 23 juillet et le 30 octobre 2024 pour identifier toute tentative dâaccĂšs potentiellement liĂ©e Ă cette vulnĂ©rabilitĂ©.
- Contacter le support Okta pour toute assistance complémentaire.
đ CHRONOLOGIE
23 juillet 2024 : Vulnérabilité introduite dans le cadre d'une mise à jour standard d'Okta.
30 octobre 2024 : Vulnérabilité découverte en interne.
30 octobre 2024 : Vulnérabilité corrigée en changeant la fonction de dérivation de clé Bcrypt par PBKDF2.
đ AVIS DE SĂCURITĂ OKTA : https://trust.okta.com/security-advisories/okta-ad-ldap-delegated-authentication-username/
Fortinet : la faille de sécurité FortiJump CVE-2024-47575 est exploitée par les pirates depuis juin 2024 !
https://www.it-connect.fr/fortinet-faille-fortijump-exploitee-depuis-juin-2024/
CrowdStrike announced a strategic partnership with Fortinet to unify best-in-class endpoint and firewall protection
https://www.fortinet.com/corporate/about-us/newsroom/press-releases/2024/crowdstrike-and-fortinet-deliver-industry-leading-protection-from-endpoint-to-firewall
@AnyRun #webinar on threat investigations
đïž Wed, Oct 23rd 2024, 2 PM GMT
Registration link: https://event.webinarjam.com/register/14/0ogqxi7
đ Learn how to discover in-depth threat context, enrich your investigations with #IOCs, and search through #TI database with 40+ parameters
MITRE ATT&CKCON5 is going live tomorrow! We're at capacity in person but virtual registration is still live and IT'S FREE. Check it out: https://www.mitre.org/events/attackcon-5
#EDR Telemetry website: https://www.edr-telemetry.com/
EDRSilencer red team tool used in attacks to bypass security
https://www.bleepingcomputer.com/news/security/edrsilencer-red-team-tool-used-in-attacks-to-bypass-security/
Hahahahaha
âWe werenât hacked we were just convinced to hand over the personal data of 23.4 millions by someone who pretended to be in a legitimate authorityâ
#Teamwork makes the dream work!
- John C. Maxwell
Les panneaux publicitaires de Clear Channel vont tracer les passants
Clear Channel va dĂ©sormais mesurer qui passe devant ses panneaux publicitaires. Lâentreprise promet cependant de respecter les lois europĂ©ennes en matiĂšre de respect de la vie privĂ©e.
Sous lâappellation Radar, Clear Channel applique cette technologie depuis quatre ans dĂ©jĂ aux Etats-Unis. Elle trace numĂ©riquement non seulement combien de personnes passent (...)
https://etraces.constantvzw.org/informations/18214
Trump Says Heâll Look Into a Pardon for Edward Snowden - The New York Times
https://www.nytimes.com/2020/08/15/us/politics/trump-snowden-esper.html
#RGPD : 101 entitĂ©s europĂ©ennes attaquĂ©es pour transfert illĂ©gal de donnĂ©es vers les Ătats-Unis.
Noyb.eu dĂ©pose 101 recours auprĂšs des autoritĂ©s de contrĂŽle. Ils visent autant dâentreprises et organismes installĂ©s en UE et dans lâEspace Ă©conomique europĂ©en. En cause ? La transmission de donnĂ©es Ă Google et Facebook aux Ătats-Unis, en contrariĂ©tĂ© avec le RGPD et une dĂ©cision rĂ©cente de la Cour de justice europĂ©enne.
https://www.nextinpact.com/article/43380/rgpd-101-entites-europeennes-attaquees-pour-transfert-illegal-donnees-vers-etats-unis
Ukraine authorities have arrested a three-man criminal gang who ran 20 crypto-exchanges and laundered money for #ransomware and other criminal gangs.
Via: https://twitter.com/campuscodi/status/1295716938610544650?s=19
Article: https://www.zdnet.com/google-amp/article/ukraine-arrests-gang-who-ran-20-crypto-exchanges-and-laundered-money-for-ransomware-gangs/
#infosec #cybersecurity
YouTube video of the webcast: #Telegram & how the social media app can be used to gather open-source intelligence (#OSINT)?
#infosec #cybersecurity
https://youtu.be/e_aXQYq2l6U
#SANS Data Incident 2020 - Technical Details #Webcast: how it happened, investigation details, current IOC indicators of compromises, and finally overall lessons learned and security awareness recommendations to prevent these
#infosec #cybersecurity
https://www.sans.org/webcasts/116375
Ok, supaaair ! Huwaei / Honor ne diffusera à priori plus de mise à jour de sécurité sur leurs "anciens" ordiphones Android.
https://www.phonandroid.com/huawei-perdu-licence-android-temporaire-adieu-mises-jour.html
Mon Honor 10 a deux ans, sous Android 10, va se retrouver à poil sans la possibilité de changer de ROM.
Bordel.