Cybersecurity & cyberwarfare ha ricondiviso questo.

Gemini sul Dark Web: strumento di difesa o nuova frontiera del controllo?


@Informatica (Italy e non Italy)
Google ha integrato Gemini in Google Threat Intelligence per monitorare automaticamente il Dark Web: fino a 10 milioni di post al giorno analizzati con una precisione dichiarata del 98%. Un salto tecnologico reale che pone domande scomode su cosa significhi

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Fine del ChatControl: il Parlamento UE ferma la sorveglianza di massa delle chat con una maggioranza risicatissima di un solo voto

Dopo che il Parlamento Europeo aveva già respinto il #chatcontrol indiscriminato e generalizzato da parte delle aziende tecnologiche statunitensi il 13 marzo, ieri le forze conservatrici hanno tentato una manovra per imporre comunque una nuova votazione e prorogare la legge.

marcosbox.com/2026/03/26/fine-…

@privacypride

Cybersecurity & cyberwarfare ha ricondiviso questo.

Elastic's security team has come across "a data dump containing source code, compiled binaries, and deployment scripts for the kernel rootkit components of VoidLink, a cloud-native Linux malware framework first documented by Check Point Research in January 2026."

elastic.co/security-labs/illum…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Got a cool ActivityPub or ATProtocol project that can be demo'd? We are always looking to showcase what the Open Social Web can do when smart people create great software, in our speed demo track at FediForum. A few projects have been recommended for the end of April event by our community already.

If you think you have such a cool open social web demo, get in touch!

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Hybris e dura realtà

@politica - Il risultato del referendum ha semplicemente scoperchiato la pentola che bolliva già da parecchio.

wp.me/p6hcSh-9uB

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: We spoke to a few iPhone security experts about what the discovery of DarkSword means to the long-held assumption that iPhones are very hard to hack.

The answer is nuanced, and not simple. Apple has made significant strides in making iPhones more secure, but DarkSword may change how we think.

techcrunch.com/2026/03/26/appl…

Questa voce è stata modificata (18 minuti fa)
Cybersecurity & cyberwarfare ha ricondiviso questo.

Last year, my position was that we still had time to design PQ authentication mechanisms.

Now, based on the pace of progress and on statements like Google's, I believe:

1. we need to finish rolling out PQ key exchange yesterday
2. we need to start rolling out PQ auth now
3. it's too late to ship any new non-PQ design or system

blog.google/innovation-and-ai/…

reshared this

in reply to Filippo Valsorda

Interesting, I just cam across infosec.exchange/@mttaggart/11… the other day, basically saying that it won't be feasible any time soon.


As of 2026-03-02, the state of the art in quantum decryption has cracked a:
  • 22-bit RSA key
  • 6-bit elliptic curve key

forklog.com/en/quantum-compute…

The IBM QC that cracked the 6-bit key uses 133 qubits.

Some new research suggests that RSA-2048 could be cracked with as "few" as 100,000 qubits.

newscientist.com/article/25164…

(Paywall-free)

Such a machine...is not feasible to build any time soon.

So when your CISO or a vendor starts going off about "post-quantum" security, feel free to use this to remind them that we still have SMB1 in some places and Telnet in others. Plenty of work to do around the house.


in reply to Filippo Valsorda

You got me interested to know what it would look like in authorized_keys, and can it be this short! Looks neat.

ssh-mldsa44-ed25519 434f4d505349472d4d4c44534134342d456432353531392d534841353132

datatracker.ietf.org/doc/draft…

Cybersecurity & cyberwarfare ha ricondiviso questo.

That hack of the National Super Computer Center of China (NSCC) is becoming more real by the day

"the overall details we received so far seem like that this operation is more in the realm of "real” than “fake"."

netaskari.substack.com/p/nscc-…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Dopo aver sentito in radio l’ennesima difesa delle piattaforme social da parte di irriducibili liberali (“la colpa è dei genitori”), vale la pena ricordare che sì, i genitori devono vigilare.
Ma se i social mainstream sono progettati per creare dipendenza, come riconosciuto da un tribunale USA, la responsabilità non può ricadere solo sulle famiglie.
Come per alcol e sigarette, serve anche l’intervento della UE e dichiarare apertamente: i social algoritmici nuociono gravemente alla psiche.
Cybersecurity & cyberwarfare ha ricondiviso questo.

Cisco now has semiannual security updates for IOS and IOS XE

"In direct response to customer feedback, Cisco releases bundles of Cisco IOS and IOS XE Software Security Advisories on the fourth Wednesday of the month in March and September of each calendar year."

sec.cloudapps.cisco.com/securi…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Kaspersky has linked Coruna with Operation Triangulation. This somes a few weeks after we reported that L3Harris Trenchant was the company behind some components of Coruna.

And we also reported that it was possible Coruna was used in Operation Triangulation.

securelist.com/coruna-framewor…

in reply to Lorenzo Franceschi-Bicchierai

The media in this post is not displayed to visitors. To view it, please go to the original post.

A former Trenchant employee told us that when Triangulation was first revealed, other employees at the company believed that at least one of the zero-days caught by Kaspersky “were from us."

Also both Kaspersky and Trenchant seemed to wink at the fact that they both knew.

techcrunch.com/2026/03/10/us-m…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Russian intelligence managed to install a wire-taping device as part of a thermostat at a Ukrainian drone factory

en.interfax.com.ua/news/genera…

reshared this

3D Print Becomes Cast Iron Wrench Via Microwave


The media in this post is not displayed to visitors. To view it, please log in.

Consumer-grade 3D printing is good for prototyping and making relatively soft plastic stuff. If you wanna make tough things, though, it’s really hard to beat the strength of metal. [Shake the Future] has produced a guide on using 3D printing in a process to produce solid parts out of actual cast iron.

The concept is simple. [Shake the Future] uses silicon carbide crucibles, which can heat up by absorbing microwave energy. Put one in an insulated container, dump some metal in, and throw it in a microwave, and soon enough you have a pot of molten metal you can use to cast stuff.

Let’s say you want to make an adjustable wrench, which is how [Shake the Future] demonstrates this technique. The first step is to print the wrench parts in plastic, such as PLA. These parts are then packed into fine sand to create casting molds. The PLA is burned out of the mold, leaving a negative imprint of the geometry. Molten cast iron can then be poured into the mold to create the part in solid metal.

It’s a messy technique that requires a lot of manual labor, but it does work quite well. There are some tricks to learn, though, particularly when it comes to successfully casting parts with holes or fine geometric features.

And before you think that you’re going to put the hardware store out of business, it should also be noted that it failed on first encounter with a real-world nut. The thinnest part by the screw just wasn’t strong enough.

Still, it’s a great demo, and if you’ve ever wanted to make a bespoke cast iron part of your own, this work may be very relevant to you. Alternatively, consider learning about DIY aluminium castingjust consider the pitfalls involved.

youtube.com/embed/FyhaeVi05io?…


hackaday.com/2026/03/26/3d-pri…

Cybersecurity & cyberwarfare ha ricondiviso questo.

NEW: Here's everything you need to know about the new iPhone hacking tool DarkSword.

What is DarkSword? How does it work? Where did it come from? How did it leak online? What can you do about it?

We break it all down in this explainer.

techcrunch.com/2026/03/26/a-ma…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

OpenAI chiude Sora: il futuro dell’AI non è più Video! Scopriamo cosa sta accadendo

📌 Link all'articolo : redhotcyber.com/post/openai-ch…

#redhotcyber #news #openai #intelligenzaartificiale #soraplatform #generazionevideoai #monetizzazione #riskichilegali #copyright #robotica #agentiautonomi #probleminormativi #reputazioneonline #tecnologia

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Hungarian opposition leader Peter Magyar has accused the ruling government of using the Candiru spyware against his TISZA party

x.com/magyarpeterMP/status/203…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Il Ransomware è ora Democratico! TeamPCP e BreachForums assieme per elevare il RaaS

📌 Link all'articolo : redhotcyber.com/post/il-ransom…

#redhotcyber #news #cybercrime #ransomware #sicurezzainformatica #hacking #malware #attacchinformatici #vulnerabilita #supplychain

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Attacco informatico all’ospedale Papardo di Messina. Urzì: La Sicilia sempre più esposta

📌 Link all'articolo : redhotcyber.com/post/attacco-i…

Succede tutto in fretta. I #sistemi si fermano e, nel giro di poco, l’intera macchina sanitaria inizia a rallentare fino a bloccarsi.

All’ospedale Papardo di Messina è andata così, come riportato da Messina Today. Un #attacco #informatico ha mandato fuori uso terminali, #database e #piattaforme interne, creando problemi immediati: prenotazioni più lente, difficoltà operative e una #gestione dei pazienti decisamente più complicata.

A cura di Chiara Nardini

#redhotcyber #news #attacchinformatico #cybersecurity #hacking #malware #ransomware #ospedalipapardo #messina #problemidisicurezza #gestionepazienti #prenotazionionline #sicurezzainformatica #attacchihacker

Cybersecurity & cyberwarfare ha ricondiviso questo.

LibreOffice e l'arte di reagire in modo eccessivo. Un banner di donazione non è un attacco agli utenti. Il post di Italo Vignoli

Troppo misurato il buon @italovignoli

Per noi, invece gli utenti che si lamentano delle richieste di donazione da parte di chi produce applicazioni in software libero sono un significativo distillato di stupidità, sapientemente barriccato in anni e anni di stronzaggine. Un elisir per le BigTech!

blog.documentfoundation.org/bl…

@eticadigitale

in reply to informapirata ⁂

@max Il bello è che c'è gente (verificato personalmente) che si fa un PC da +2000€ e poi non vuole spendere 5€ per un software.
Ma te lo immagini? Uno compra la Ferrari e poi pretende il carburante a gratis 😂
...e se gli chiedi i soldi della benzina si incazza pure! 🤣
Cybersecurity & cyberwarfare ha ricondiviso questo.

Researchers uncover #WebRTC #skimmer bypassing traditional defenses
securityaffairs.com/190002/mal…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Typosquatting: la trappola invisibile che svuota i conti con un refuso

📌 Link all'articolo : redhotcyber.com/post/typosquat…

#redhotcyber #news #typosquatting #ciberpirateria #sicurezzainformatica #hacking #malware #phishing #brandhijacking #dominiomografi

Modern Smartphone vs. 80s Supercomputer


The media in this post is not displayed to visitors. To view it, please log in.

One of the most common ways of comparing the processing power of some microcontroller or older smartphone in a fantastical way was to say that they had more processing power than the Apollo Guidance Computer. While this sounds impressive on the surface, the AGC was the first integrated circuit computer ever built and is predictably under-powered by almost all modern standards. A more apt comparison would be to compare a smartphone to a supercomputer from some bygone era, and someone has recently done just that.
Cray 2
The linked article looks at a modern iPhone 17 compared to the Cray 2 supercomputer. When the Cray 2 was first built in the mid 80s, it was the fastest computer in the world at 1.9 GFLOPS using four vector processors. A modern iPhone is estimated to have slightly more than that, so in some ways the iPhone comes out on top.

However, the Cray 2 was built with vector processors, a specialized type of processor meant to perform rapid calculations on specific types of data sets. So the Cray 2 may have been faster at these types of tasks than the more general-purpose A19 processor, and the A19 may have the edge in other tasks.

The other major difference the article doesn’t discuss is what software runs on these computers. The Cray 2 supercomputer ran a modified version of UNIX System V, which at the time was owned by AT&T (and which ran on plenty of other computers as well). Although proprietary in some sense, it was much more open than Apple’s iOS operating system, allowing users to run whatever software they wanted to run on the supercomputers that they bought and paid for, and to modify many parts of the operating system itself. In that sense, the Cray will always maintain the edge over Apple and their walled garden.


hackaday.com/2026/03/26/modern…

An AI gateway designed to steal your data


The media in this post is not displayed to visitors. To view it, please log in.

A significant proportion of cyber incidents are linked to supply chain attacks, and this proportion is constantly growing. Over the past year, we have seen a wide variety of methods used in such attacks, ranging from creation of malicious but seemingly legitimate open-source libraries or delayed attacks in such seemingly legitimate libraries, to the simplest yet most effective method – compromising the accounts of popular library owners to subsequently release malicious versions of their libraries. Such libraries are used by developers everywhere and are included in many solutions and services. The consequences of an attack can vary widely, ranging from delivering malware to a developer’s device to compromising an entire infrastructure if the malicious library has made its way into the code of a service or product.

This is exactly what happened in March 2026, when attackers injected malicious code into the popular Python library LiteLLM, which serves as a multifunctional gateway for a large set of AI agents. The attackers released two trojanized versions of LiteLLM that delivered malicious scripts to the victim’s system. Both versions made their way into the PyPI repository for Python. A technical analysis revealed that the attackers’ primary targets were servers storing confidential data related to AWS, Kubernetes, NPM, etc., as well as various databases (MySQL, PostgreSQL, MongoDB, etc.). In the latter case, the attackers were primarily interested in database configurations. In addition, the malware’s logic included functionality for stealing confidential data from crypto wallets and techniques for establishing a foothold in the Kubernetes cluster.

Repository compromise


The compromise affected the package distribution channel via PyPI: on March 24, 2026, malicious LiteLLM versions litellm==1.82.7 and litellm==1.82.8 were uploaded to the registry. It was specifically the package’s distribution contents that were compromised: in the version 1.82.7, the malicious code was embedded in proxy_server.py, and in 1.82.8, the file litellm_init.pth was added.

Technical analysis


Both versions of the library contained the same malicious code, but its execution was implemented differently. In the version 1.82.7, it was executed only when the proxy functionality was imported, while in 1.82.8, a .pth file was added that was able to execute the code every time the interpreter started.

Example of the malicious code in proxy_server.py
Example of the malicious code in proxy_server.py

The malicious code in the proxy_server.py and litellm_init.pth files contained Python code encoded in Base64. After execution, the infected script saved this code alongside itself as a p.py file and immediately executed it.

The p.py script launched the main payload – another script, also encoded in Base64 – without saving it to disk. At the same time, it wrote the output of this payload to a file in the directory from which it was launched. Before being written, the output was encrypted using the AES-256-CBC algorithm with a random key generated in the code, which was saved to the session.key file. The key file was also encrypted – using a pre-initialized public RSA key.

The encrypted key and the output were combined into a tpcp.tar.gz archive and sent to the attackers’ remote server.

What exactly happened within the malicious payload, whose output was sent to the C2 server? After it was launched, a recursive scan of the working directories on the victim’s system (/root, /app/, /var/www, etc.) began. In each directory, the script scanned the contents of files, which it output to the stdout buffer, from where it was then saved to the aforementioned file as the result. Next, the script collected system information and also saved it to a file. After that, it proceeded to search for sensitive data. It was interested in the following data located on servers and within the infrastructures of various services:

  • SSH keys
  • GIT accounts
  • .env files
  • AWS, Kubernetes, email service, database, and WireGuard configurations
  • files related to Helm, Terraform, and CI
  • TLS keys and certificates


A notable feature of this malware is that it does not limit itself to stealing files and configurations from the disk, but also attempts to extract runtime secrets from the cloud infrastructure.

The code above uses the addresses 169.254.169.254 and 169.254.170.2. The first corresponds to the AWS Instance Metadata Service (IMDS), through which an EC2 instance (a virtual server in AWS, a machine running in the cloud) can retrieve metadata and temporary IAM role credentials (an AWS account with a set of permissions that a service or application can use to obtain temporary credentials for calls to the AWS API). The second is used in Amazon ECS to issue temporary credentials to a container during execution. Thus, the malicious script targets not only static secrets but also those issued by the cloud that can grant direct access to AWS resources at the moment of infection.

Additionally, the script searches for crypto wallet configurations, as well as webhooks associated with Slack and Discord messengers. The latter indicate that attackers are interested not only in infrastructure secrets and accounts, but also in communication channels within the development team.

In the next stage, the malware moves from data collection to establishing a foothold in the Kubernetes cluster infrastructure: if it has enough access, it configures a privileged pod (the smallest execution unit in Kubernetes, containing one or more containers) by enabling the securityContext.privileged=true option and mounts the node’s root filesystem via hostPath. This allows it to escape the container and perform actions at the node level.

Next, the malware executes another stage of infection – it saves a base64-encoded script disguised as a legitimate system component to the Kubernetes node’s disk at the path /root/.config/sysmon/sysmon.py, and registers it via systemd. After launching, the script waits for an initial delay of 300 seconds, then begins periodically contacting the C2 node checkmarx[.]zone/raw, retrieving a link to the next payload from there. If the received value differs from the state previously saved in /tmp/.pg_state, the script downloads a new file to /tmp/pglog, makes it executable, and runs it in the background. At this stage, the attackers gain a foothold in the system and is capable of regularly delivering updated payloads without the need for re-injection. Since the malicious payload is written not to the container’s temporary file directory but directly to the Kubernetes cluster node, the attackers will retain access to the infrastructure even after the container has terminated.

A similar scenario is used for local persistence: in the absence of Kubernetes, the sysmon.py script is deployed in the user’s directory at ~/.config/sysmon/sysmon.py and is also registered as a service via systemd.

OpenVSX version of the malware


While analyzing files communicating with the C2 server, we discovered malicious versions of two common Checkmarx software extensions: ast-results 2.53.0 and cx-dev-assist 1.7.0. Checkmarx is used for application security assessment. These trojanized extensions contained malicious code that delivered the NodeJS version of the malware described above.

This version is downloaded from checkmarx[.]zone/static/checkmarx-util-1.0.4.tgz using NodeJS package installation utilities and is named checkmarx-util. Its key difference from the Python version is that it does not attempt to elevate privileges to the Kubernetes node level and does not create a privileged pod for persistence. Instead, it implements local persistence within the current environment. This means that the NodeJS variant persists only where it is already running.

Additionally, the list of folders to search for and steal secrets from is significantly smaller in this version than in the Python variant.

Checkmarx extensions are used to scan code and infrastructure configurations, so their compromise is quite dangerous: an attacker gains access not only to project files but also to a significant portion of the development environment, tokens, and local configurations.

Victimology


While assessing the attack’s impact, we saw victims all over the world. Most infection attempts occurred in Russia, China, Brazil, Netherlands and UAE.

Conclusion


As the technical analysis shows, the malicious scripts found in the LiteLLM versions are dangerous not only because they steal files containing sensitive data, but also because they target multiple critical infrastructure components simultaneously: the local system, cloud runtime secrets, the Kubernetes cluster, and even cryptographic keys. Such a broad scope of data collection allows an attacker to quickly move from compromising a single system and Python environment to seizing service accounts, secrets, and entire infrastructures.

Prevention and protection


To protect against infections of this kind, we recommend using a specialized solution for monitoring open-source components. Kaspersky provides real-time data feeds on compromised packages and libraries, which can be used to secure the supply chain and protect development projects from such threats.

Home security solutions, such as Kaspersky Premium, help ensure the security of personal devices by providing multi-layered protection that prevents and neutralizes infection threats. Additionally, our solution can restore a device’s functionality in the event of a malware infection.

To protect corporate devices, we recommend using a complex solution such as Kaspersky NEXT, which allows you to build a flexible and effective security system. The products in this line provide threat visibility and real-time protection, as well as EDR and XDR capabilities for threat investigation and response.

At the time of writing, the compromised versions of LiteLLM have already been removed from PyPI and OpenVSX. If you have used them, and as a proactive response to the threat, we recommend taking the following measures on your systems and infrastructure:

  • Perform a full system scan using a reliable security solution.
  • Rotate all potentially compromised credentials – API keys, environment variables, SSH keys, Kubernetes service account tokens, and other secrets.
  • Check hosts and clusters for signs of compromise – the presence of ~/.config/sysmon/sysmon.py files, suspicious pods in Kubernetes.
  • Clear the cache and conduct an inventory of PyPI modules: check for malicious ones and roll back to clean versions.
  • Check for indicators of compromise (files on the system or network signs).


Indicators of Compromise:


URLs
models[.]litellm[.]cloud
checkmarx[.]zone

Infected packages
85ED77A21B88CAE721F369FA6B7BBBA3
2E3A4412A7A487B32C5715167C755D08
0FCCC8E3A03896F45726203074AE225D

Scripts
F5560871F6002982A6A2CC0B3EE739F7
CDE4951BEE7E28AC8A29D33D34A41AE5
05BACBE163EF0393C2416CBD05E45E74


securelist.com/litellm-supply-…

Cybersecurity & cyberwarfare ha ricondiviso questo.

Attacco alla sanità: ecco perché una cartella clinica vale fino a mille euro nel dark web


@Informatica (Italy e non Italy)
I dati sanitari non sono solo dati sottratti, ma una chiave capace di aprire molte porte. Ed è proprio questa versatilità criminale a determinarne il valore di una cartella clinica che, in seguito ad un cyber attacco, finisce nel

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

Anche oggi è giovedì, e, come sempre, c'è il mio #SocialDebug 🦄

C'è qualcosa che non funziona in tutto il meccanismo: un rimbalzo di responsabilità, una sentenza e un classico agnello sacrificale.

Guardate anche il video di Matteo Flora su questa faccenda (sempre nei commenti) perché c'è davvero di più.

Intanto, se non sapete come fare un bonifico e siete il CEO dell'azienda, il Pongo è in offerta al Carrefour 😶

Qui il mio contenuto: signorina37.substack.com/p/soc…

E qui il video di Matteo: youtube.com/watch?v=OhCOPjG73G…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Deregolamentazione accelerata oggi: l' Omnibus sull'IA sarà sottoposto al voto plenario del Parlamento europeo, con i negoziati tra le istituzioni dell'UE che inizieranno entro poche ore

Questo approccio "muoviti in fretta, rompi le cose" dimostra ancora una volta che la procedura AI Omnibus è profondamente imperfetta.

eupolicy.social/@edri/11629498…

@pirati


1/5 🚨 🏃🏽‍➡️Deregulation speedrun today: #AI Omnibus to undergo European Parliament plenary vote, with negotiations between EU institutions starting within hours 🚨

🙅🏽‍♀️ This ‘move fast, break things’ approach shows once again that the AI Omnibus procedure is deeply flawed.

We have been urging EU lawmakers to reject the re-opening of core #HumanRights and safety protects. Yet, the Parliament's position continues to weaken crucial parts of the #AIAct and fundamentally changes the structure of the law.


Cybersecurity & cyberwarfare ha ricondiviso questo.

I tuoi dati sono ovunque. E il governo USA li sta acquistando senza mandato.

Un intero settore di intermediari di dati acquista enormi quantità di informazioni elettroniche da app per cellulari e browser web e le rivende ai dipartimenti di polizia e alle agenzie governative federali, in modi che possono rivelare dettagli intimi sui cittadini americani senza un mandato.

npr.org/2026/03/25/nx-s1-57523…

@privacypride

Cybersecurity & cyberwarfare ha ricondiviso questo.

Kaspersky ties Operation Triangulation to Coruna exploit kit

securelist.com/coruna-framewor…

reshared this

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Una vulnerabilità Critica in Dell RecoverPoint Semina il Caos. Il malware GRIMBOLT in azione

📌 Link all'articolo : redhotcyber.com/post/una-vulne…

#redhotcyber #news #cybersecurity #hacking #malware #ransomware #vulnerabilita #zeroday #dellrecoverpoint #macchinevirtuali #accessoRoot

Cybersecurity & cyberwarfare ha ricondiviso questo.

Russian authorities arrest alleged #LeakBase admin behind stolen data marketplace
securityaffairs.com/189994/cyb…
#securityaffairs #hacking
Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

265 – Eventi gratuiti sul mondo digitale? Se i relatori non sono pagati, il prodotto sei tu camisanicalzolari.it/265-event…

Coruna: the framework used in Operation Triangulation


The media in this post is not displayed to visitors. To view it, please log in.


Introduction


On March 4, 2026, Google and iVerify published reports about a highly sophisticated exploit kit targeting Apple iPhone devices. According to Google, the exploit kit was first discovered in targeted attacks conducted by a customer of an unnamed surveillance vendor. It was later used by other attackers in watering-hole attacks in Ukraine and in financially motivated attacks in China. Additionally, researchers discovered an instance with the debug version of the exploit kit, which revealed the internal names of the exploits and the framework name used by its developers — Coruna. Analysis of the kit showed that it relies on the exploitation of many previously patched vulnerabilities and also includes exploits for CVE-2023-32434 and CVE-2023-38606. These two vulnerabilities particularly caught our attention because they had been first discovered as zero-days used in Operation Triangulation.

Operation Triangulation is a complex mobile APT campaign targeting iOS devices. We discovered it while monitoring the network traffic of our own corporate Wi-Fi network. We noticed suspicious activity that originated from several iOS-based phones. Following the investigation, we learned that this campaign employed a sophisticated spyware implant and multiple zero-day exploits. The investigation lasted for over six months, during which we disclosed our findings in connection to the attack. Kaspersky GReAT experts also presented these findings at the 37th Chaos Communication Congress (37C3).

Although all the details of both CVE-2023-32434 and CVE-2023-38606 have long been publicly available, and other researchers have developed their own exploits without ever seeing the Triangulation code, we decided to closely investigate the exploits used in Coruna. Some of the exploit kit distribution links provided by Google remained active at the time the report was published, which allowed us to collect, decrypt, and analyze all components of Coruna.

During our analysis, we discovered that the kernel exploit for CVE-2023-32434 and CVE-2023-38606 vulnerabilities used in Coruna, in fact, is an updated version of the same exploit that had been used in Operation Triangulation. The images below illustrate a high-level overview of the two attack chains. The exploit in question is highlighted with a red rectangle.

Attack chain of Operation Triangulation (simplified)
Attack chain of Operation Triangulation (simplified)

Attack chain of Coruna (simplified)
Attack chain of Coruna (simplified)

Moreover, we discovered that Coruna includes four additional kernel exploits that we had not seen used in Operation Triangulation, two of which were developed after the discovery of Operation Triangulation. All of these exploits are built on the same kernel exploitation framework and share common code. Code similarities from kernel exploits can also be found in other components of Coruna. These findings led us to conclude that this exploit kit was not patchworked but rather designed with a unified approach. We assume that it’s an updated version of the same exploitation framework that was used — at least to some extent — in Operation Triangulation.

Technical details


While we continue to investigate all exploits and vulnerabilities used by Coruna, this post provides a high-level overview of the exploit kit and attack chain.

Safari


Exploitation begins with a stager that fingerprints the browser and selects and executes appropriate remote code execution (RCE) and pointer authentication code (PAC) exploits depending on the browser version. It also contains a URL to an encrypted file with information about all available packages containing exploits and other components. The stager also includes a 256-bit key used to decrypt it. The URL and decryption key are passed to a payload embedded in PAC exploits.

Payload


The payload is responsible for initiating the exploitation of the kernel. After initialization, the payload first downloads a file with information about other available components. To extract it, the payload performs several steps processing multiple file formats.

First, the downloaded file is decrypted using the ChaCha20 stream cipher. Decryption yields a container with the magic number 0xBEDF00D, which stores LZMA-compressed data.

The file format used by the exploit kit to store compressed data

OffsetField
0x00Magic number (0xBEDF00D)
0x04Decompressed data size
0x08LZMA-compressed data

The decompressed data presents another container with the magic number 0xF00DBEEF. This file format is used in the exploit kit to store and retrieve files by their IDs.

The file format used by the exploit kit to store files

OffsetField
0x00Magic number (0xF00DBEEF)
0x04Number of entries
0x08Entry[0].File ID
0x0CEntry[0].Status
0x10Entry[0].File offset
0x14Entry[0].File size

We provide a description of all possible File ID values below. At this stage, when the payload gathers information about all available file packages, this container holds only one file, and its File ID is 0x70000.

Finally, we get to the file with information about all available file packages. It starts with the magic value 0x12345678. The exploit kit uses this file format to obtain URLs and decryption keys for additional components that need to be downloaded.

The file format used by the exploit kit to store information about file packages

OffsetField
0x00Magic number (0x12345678)
0x04Flags
0x08Directory path
0x108Number of entries
0x10CEntry[0].Package ID
0x110Entry[0].ChaCha20 key
0x130Entry[0].File name

The components required for exploiting a targeted device are selected using the Package ID. Its high byte specifies the package type and required hardware. We’ve seen the following package types:

  • 0xF2 – exploit for ARM64,
  • 0xF3 – exploit for ARM64E,
  • 0xA2 – Mach-O loader for ARM64,
  • 0xA3 – Mach-O loader for ARM64E,
  • 2 – implant for ARM64,
  • 0xE2 – implant for ARM64E.

The payload code also supports additional package types, such as 0xF1, an exploit for older ARM devices that do not support 64-bit architecture. Interestingly, however, the files for such exploits are missing.

Other bytes of the Package ID define the supported firmware version and CPU generation.

Some of the observed Package IDs (those with unique content)

Package IDDescription
0xF3300000Kernel exploit (iOS < 14.0 beta 7) and other components
0xF3400000Kernel exploit (iOS < 14.7) and other components
0xF3700000Kernel exploit (iOS < 16.5 beta 4) and other components
0xF3800000Kernel exploit (iOS < 16.6 beta 5) and other components
0xF3900000Kernel exploit (iOS < 17.2) and other components
0xA3030000Mach-O loader (iOS 16.X) (A13 – A16)
0xA3050000Mach-O loader (iOS 16.0 – 16.4)

The files inside these packages are also stored in encrypted and compressed 0xF00DBEEF containers, but this time compression is optional and is determined by the second bit in the Flags field. Different packages contain different sets of files. A description of all possible File IDs is given in the table below.

Observed File IDs

File IDDescription
0x10000Implant
0x50000Mach-O loader (default)
0x70000List of additional components
0x70005Launcher config
0x80000Launcher in 0xF2/0xF3 packages, or Mach-O loader in 0xA2/0xA3
0x90000Kernel exploit
0x90001Kernel exploit (for Mach-O loader)
0xA0000Logs cleaner
0xA0001Mach-O loader component
0xA0002Mach-O loader component
0xF0000RPC stager

After downloading the necessary components, the payload begins executing kernel exploits, Mach-O loaders, and the malware launcher. The payload selects an appropriate Mach-O loader based on the firmware version, CPU, and presence of the iokit-open-service permission.

Kernel exploits


We analyzed all five kernel exploits from the kit and discovered that one of them is an updated version of the same exploit we discovered in Operation Triangulation. There are many small changes, but the most noticeable are as follows:

  • The code takes into account more values ​​from XNU version strings, allowing for more accurate version checking.
  • Added a check for iOS 17.2. We assume that this was the latest version of iOS at the time of development (released in December 2023).
  • Added checks for newer Apple processors: A17, M3, M3 Pro, M3 Max (released in fall 2023).
  • Added a check for iOS version 16.5 beta 4. This version patched the exploit after our report to Apple.

Why does the exploit need to check for iOS 17.2 and newer CPUs if the targeted vulnerabilities were fixed in iOS 16.5 beta 4? The answer can be found by examining other exploits: they are all based on the same source code. The only difference is in the vulnerabilities they exploit, so these checks were added to support the newer exploits and appeared in the older version after recompilation.

Launcher


The launcher is responsible for orchestrating the post-exploitation activities. It also uses the kernel exploit and the interface it provides. However, since the exploit creates special kernel objects during its execution that provide the ability to read and write to kernel memory, the launcher simply reuses these objects without the need to trigger vulnerabilities and go through the entire exploitation path again. The launcher cleans up exploitation artifacts, retrieves the process name for injection from a config with the 0xDEADD00F magic number, injects a stager into the target process, uses it to execute itself, and launches the implant.

Conclusions


This case demonstrates once again the dangers associated with such malicious tools that lie in their potential wide usage. Originally developed for cyber-espionage purposes, this framework is now being used by cybercriminals of a broader kind, placing millions of users with unpatched devices at risk. Given its modular design and ease of reuse, we expect that other threat actors will begin incorporating it into their attacks. We strongly recommend that users install the latest security updates as soon as possible, if they have not already done so.


securelist.com/coruna-framewor…

3D Printed Wire Stripper Uses PLA Blades


The media in this post is not displayed to visitors. To view it, please log in.

One might think that [Da_Rius]’s mostly 3D printed wire stripper would count its insulation-shearing blades among the small number of metal parts required, but that turns out to not be the case. The blades are actually printed in PLA, seem to work just fine for this purpose. (We imagine they need somewhat frequent replacement, but still.)

Proper wire strippers are one of the most useful tools for a budding electronics enthusiast, because stripping hookup wire is a common task and purpose-built strippers make for quick and consistent results.

As far as tools go they are neither particularly expensive nor difficult to source, but making one’s own has a certain appeal to it. The process of assembling the tool is doubtless a rewarding one, and it looks like it results in a pretty good conversation starter if nothing else.

As mentioned, the tool is mostly 3D printed and does require some metal parts: fasteners, heat-set inserts, and a couple springs. Metal nuts and heat-set inserts are easy enough to obtain, but springs of particular size and shape are a bit trickier.

It is perfectly possible to make custom springs, and as it happens [Da_Rius] already has that covered with a separate project for using a hex key and printed jig to make exactly the right shapes and sizes from pre-tempered spring wire.


hackaday.com/2026/03/26/3d-pri…

Cybersecurity & cyberwarfare ha ricondiviso questo.

The media in this post is not displayed to visitors. To view it, please go to the original post.

Node.js rischia il crash remoto: aggiornamento urgente già disponibile

📌 Link all'articolo : redhotcyber.com/post/node-js-r…

#redhotcyber #news #nodejs #sicurezzainformatica #tls #http2 #webcrypto #vulnerabilita #cybersecurity #hacking #malware #sicurezzadelsistema