#codeinjection

2025-12-03

Operation DupeHike: Targeting Russian employees with DUPERUNNER and AdaptixC2

A campaign targeting Russian corporate entities, particularly HR, payroll, and administrative departments, has been uncovered. The attack uses realistic decoy documents themed around employee bonuses and financial policies. The malware ecosystem involves a malicious LNK file leading to an implant dubbed DUPERUNNER, which then loads the AdaptixC2 Beacon to connect to the threat actor's infrastructure. The infection chain begins with a spear-phishing ZIP archive containing PDF-themed LNK files. The DUPERUNNER implant, programmed in C++, performs various functions including downloading and opening decoy PDFs, process enumeration, and shellcode injection. The final stage involves the AdaptixC2 Beacon, which communicates with the command-and-control server. The campaign, tracked as UNG0902, uses multiple malicious infrastructures and is believed to be targeting employees of various organizations.

Pulse ID: 69304959476d2ade5f1c7ff2
Pulse Link: otx.alienvault.com/pulse/69304
Pulse Author: AlienVault
Created: 2025-12-03 14:29:45

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CodeInjection #CyberSecurity #InfoSec #LNK #Malware #OTX #OpenThreatExchange #PDF #Phishing #RAT #Russia #ShellCode #SpearPhishing #ZIP #bot #AlienVault

2025-08-08

W jaki sposób exploit typu Content Injection może zniszczyć społeczność kultowej gry RTS?

StarCraft: Brood War i jego następca StarCraft 2 to ikony gatunku RTS (strategii czasu rzeczywistego) oraz jedne z najważniejszych gier komputerowych w historii, które od dekad cieszą się aktywną społecznością i profesjonalną sceną e-sportową. Jednak StarCraft 2 stoi obecnie przed poważnymi problemami, które zagrażają jego dalszemu rozwojowi i funkcjonowaniu gry....

#WBiegu #Blizzard #CodeInjection #Haktywizm #Starcraft

sekurak.pl/w-jaki-sposob-explo

N-gated Hacker Newsngate
2025-06-06

🚨 ALERT 🚨: Someone figured out that your precious can be manipulated like a sneaky teenager with an unlimited credit card! 🤦‍♂️ Congratulations, now bots can help hackers throw a party in your codebase complete with command injection fireworks. 🎉 Keep pretending your is secure, it'll be fun!
boostsecurity.io/blog/weaponiz

2025-06-04

Developers and gamers, listen up! Hackers are now using trusted tools and platforms to sneak in malicious code and clever scams. How are your projects staying secure in this evolving threat landscape?

thedefendopsdiaries.com/the-ev

#cybersecurity
#infosectrends
#codeinjection
#socialengineering
#gamerssecurity

Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:youranonriots@kolektiva.social
2025-02-06

Microsoft warns that attackers are deploying malware in ViewState code injection attacks using static ASP. NET machine keys found online. #codeinjection #CyberAlerts bleepingcomputer.com/news/secu

2024-07-15

A recent cybersecurity study revealed a sophisticated malware campaign targeting NuGet, a package manager for .NET applications. Attackers used homoglyphs, characters that look similar but have different codes (for example, the number '0' and the letter 'O', or the lowercase 'l' and the uppercase 'I'), to create fake packages that seemed legitimate but contained malicious code. They also employed IL weaving, a method that alters .NET binaries to insert harmful modules disguised as legitimate ones. This campaign involved around 60 packages and 290 versions, highlighting the need for increased vigilance in software supply chains.

thecyberexpress.com/homoglyphs

#cybersecurity #NuGet #malware #homoglyphs #ILWeawing #malwarecampaign #DotNet #CodeInjection #SecurityResearch

2024-06-25

💉 #commandinjection is a type of #cyberattack that involves injecting malicious commands into a system through vulnerable input fields.

🔒🛡️ Protecting against it is crucial to prevent unauthorized access, #databreaches, and potential system compromise.

To learn more: bit.ly/45VGBah

#commandinjectionattack #codeinjection #injectionattacks #owasp #applicationsecurity #vulnerabilities #waap #waf #apptrana #indusface

🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2024-01-31

"🔓 #HCLDomino Vulnerability Alert: CVE-2023-37518 - A Critical Code Injection Risk! 🎯"

🚨 Attention InfoSec community! HCL Domino's BigFix ServiceNow module has a critical vulnerability - CVE-2023-37518. This flaw allows arbitrary code injection by an authorized attacker, posing a substantial risk to system integrity and data confidentiality. 🛡️💻

The vulnerability has a medium severity rating (CVSS v3: 6.4). Attack vector involves network access, with low complexity and low privilege requirements, making it a concerning security loophole. No user interaction is needed, amplifying the risk. 🌐🔐

Stay vigilant and ensure systems are updated to mitigate this threat. For detailed insights, check Tenable and OpenCVE.

Tags: #CyberSecurity #Vulnerability #CodeInjection #CVE202337518 #BigFix #ServiceNow #InfoSec #PatchManagement 🛠️🔒

🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2024-01-29

"🚨 Vulnerability in Postman up until 10.22 for macOS - CVE-2024-23738 🚨"

A severe code injection vulnerability, CVE-2024-23738, affects Postman versions up to 10.22 on macOS, posing a significant threat. This flaw allows remote attackers to execute arbitrary code through specific settings (RunAsNode and enableNodeClilnspectArguments). Rated at a high CVSS v3 score of 9.8, it requires immediate attention. Postman is an API platform for building and using APIs. No current exploits or known active exploitation. Stay vigilant! 🛡️💻

Source: PRIOn and V3x0r's Github

Tags: #CVE202423738 #CyberSecurity #CodeInjection #Postman #macOS #Vulnerability #InfoSec #PatchManagement 🚀🔐

2023-12-21

The malware strategically injects a specialized script tag into the victim’s browser, leading to an external script, enhancing the attack’s stealth by avoiding detection as simple loader scripts often are.

#Cybersecurity #Trojan #CodeInjection #IBM #JavaScript #Banking

cybersec84.wordpress.com/2023/

2023-10-10

The tagDiv plugin and the Newspaper theme are popular among WordPress users for their rich features and user-friendly design.

#WordPress #Cybersecurity #CodeInjection #Vulnerabilities #tagDiv #Plugins

cybersec84.wordpress.com/2023/

Ciourte Piailleciourte@piaille.fr
2022-11-24

Interesting "Stealing passwords from infosec Mastodon - without bypassing CSP" by @gaz.
portswigger.net/research/steal

It says at the end that the vulnerability was only exploitable in the #Glitch fork (used by that instance), not #Mastodon itself.
Still, despite the slightly misleading title, that's some good research, and an interesting well-written article. 😄

#infosec #cybersecurity #codeInjection #WebSecurity

Hey #infosec/#appsec peeps...

Ever wanted to work on #videogames? :) Cheat devs are using #hypervisor mods to do hard-to-detect #codeinjection and in-memory modification.

#Bungie needs a low-level security engineer to help develop strategies that can be implemented in game clients running on compromised hardware to detect, mitigate, and run psyops on cheaters and cheat devs.

If you like adversarial work, it's pretty awesome. Come talk to me :)

#security #gamedev #ReverseEngineering #RE

heise online (inoffiziell)heiseonline@squeet.me
2022-08-19
Nachdem das Problem bereits bei Facebook und Instagram aufgedeckt worden war, hat sich ein Sicherheitsforscher nun auch den chinesischen Videodienst angesehen.
Auch TikTok-App soll mit internem iPhone-Browser spionieren können
heise online (inoffiziell)heiseonline@squeet.me
2021-05-28
Eine Schwachstelle der Luca-App hätte ganze Gesundheitsämter lahmlegen können. Nun kommt auch Kritik vom Bundesamt für Sicherheit in der Informationstechnik. BSI kritisiert ebenfalls Luca-App: "Angriffs-Szenario plausibel"
heise online (inoffiziell)heiseonline@squeet.me
2021-05-26
Eine dem Anbieter bereits bekannte Sicherheitslücke der Luca-App kann ausgenutzt werden, um Schadcode einzuschleusen – und so Gesundheitsämter lahmzulegen. Gefahr für Gesundheitsämter: Luca-App ermöglicht Code Injection
2020-11-09

WordPress Sites Open to Code Injection Attacks via Welcart e-Commerce Bug - The shopping cart application contains a PHP object-injection bug. threatpost.com/wordpress_open_ #informationdisclosure #securityvulnerability #phpobjectinjection #vulnerabilities #denialofservice #codeinjection #websecurity #e-commerce #wordfence #wordpress #welcart #plugin #patch #bug

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst