CrowdStrike attempts takedown of parody site: https://clownstrike.lol/crowdmad/
(cue references to https://en.wikipedia.org/wiki/Streisand_effect)
CrowdStrike attempts takedown of parody site: https://clownstrike.lol/crowdmad/
(cue references to https://en.wikipedia.org/wiki/Streisand_effect)
2024 has been a trip. Microsoft shipped an infostealer as a feature, on by default (Recall), then took down a chunk of Azure one evening, and was still overshadowed by CrowdStrike accidentally causing more harm than any malware campaign ever ($5b+ ?USD in losses). Also, OpenSSH remote exploits! See some of yall in Vegas soon!
EDIT: Also, the whole multi-year con to backdoor xz and sshd on systemd distros (thanks @AlesandroOrtiz )
Secure Boot is completely broken on 200+ models from 5 big device makers:
Great work by the Binarly team and an excellent write-up by @dangoodin!
runZero Discovers all IP-Addressable Assets and Proves Active Scanning is Safe for Operational Technology in NREL/CECA Testing:
https://www.runzero.com/newsroom/runzero-discovers-all-ip-addressable-assets-and-proves-active-scanning-is-safe-for-operational-technology-in-nrel-ceca-testing/
A more coherent[1] explanation of Blue Friday:
https://www.youtube.com/watch?v=y8OnoxKotPQ
1.The less clear version is at https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/
I'm stoked to announce that @rk and I are speaking at @defcon DEF CON 32 on Friday at 1:00pm. Our talk, `sshamble: Unexpected Exposures in the Secure Shell` covers lesser-known tricks for making remote secure shells into your shells.
https://defcon.org/html/defcon-32/dc-32-speakers.html#54452
Also, DEF CON's deadline for materials is midnight and our servers are working as hard as they can to pull the necessary data.
my favorite quasi-backdoor SSH capability (today) is ""Russia URAL Special Auth Feature""
alias ffssh="ssh -oStrictHostKeyChecking=no -oKexAlgorithms=+diffie-hellman-group1-sha1 -oHostKeyAlgorithms=+ssh-rsa -oCiphers=+3des-cbc"
Today is a big day for OpenSSH patching: https://www.runzero.com/blog/openssh-servers/
Amazing work as always by the Qualys security research team, you can find the full advisory on "regreSSHion" at https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
The OpenSSH release notes are a fantastic read as well, especially the bits about timing analysis: https://www.openssh.com/txt/release-9.8
Lastly, if anyone else planning to drop SSH zero-day before summer camp, please give me a heads up, it's tough keeping a list of all of the cool research that our talk won't cover 😆
Is This the Blind Spot in K-12 Cybersecurity and Student Privacy? https://www.linkedin.com/pulse/blind-spot-k-12-cybersecurity-student-privacy-ray-zeisz-obrdc/
Copyright 1998-2024 HD Moore