FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Register - Security

Kaspersky hits back at claims its AI helped Russia develop military drone systems

β€” May 3rd 2024 at 21:30

Ready, set, sanctions?

AI built by Russian infosec firm Kaspersky was used in Russian drones for its war on Ukraine, volunteer intelligence gatherers claim.…

☐ β˜† βœ‡ ZDNet | security RSS

Code faster with generative AI, but beware the risks when you do

β€” May 3rd 2024 at 18:49
Software developers can achieve significant productivity gains with GenAI-powered coding help, but these may come with baggage.
☐ β˜† βœ‡ The Register - Security

It may take decade to shore up software supply chain security, says infosec CEO

β€” May 3rd 2024 at 17:30

Sure, we're waking to the risk, but we gotta get outta bed, warns Endor Labs founder Varun Badhwar

interview The more cybersecurity news you read, the more often you seem to see a familiar phrase: Software supply chain (SSC) vulnerabilities. Varun Badhwar, founder and CEO at security firm Endor Labs, doesn't believe that's by coincidence. …

☐ β˜† βœ‡ Full Disclosure

Live2D Cubism refusing to fix validation issue leading to heap corruption.

β€” May 3rd 2024 at 16:36

Posted by PT via Fulldisclosure on May 03

Live2D Cubism is the dominant "vtuber" software suite for 2D avatars for use in livestreaming and integrating them in
other software.
They publish various SDKs and a frameworks for integrating their libraries with your own program. You're supposed to
use those to deserialize and render/animate the models created with their main software - often untrusted files from
random people on the internet.
While their main java-based...
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6757-2

β€” May 3rd 2024 at 14:34
Ubuntu Security Notice 6757-2 - USN-6757-1 fixed vulnerabilities in PHP. Unfortunately these fixes were incomplete for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.10. This update fixes the problem. It was discovered that PHP incorrectly handled PHP_CLI_SERVER_WORKERS variable. An attacker could possibly use this issue to cause a crash or execute arbitrary code. This issue only affected Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6762-1

β€” May 3rd 2024 at 14:33
Ubuntu Security Notice 6762-1 - It was discovered that GNU C Library incorrectly handled netgroup requests. An attacker could possibly use this issue to cause a crash or execute arbitrary code. This issue only affected Ubuntu 14.04 LTS. It was discovered that GNU C Library might allow context-dependent attackers to cause a denial of service. This issue only affected Ubuntu 14.04 LTS. It was discovered that GNU C Library when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution. This issue only affected Ubuntu 14.04 LTS.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-2679-03

β€” May 3rd 2024 at 14:25
Red Hat Security Advisory 2024-2679-03 - An update for libxml2 is now available for Red Hat Enterprise Linux 9. Issues addressed include a use-after-free vulnerability.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-2674-03

β€” May 3rd 2024 at 14:24
Red Hat Security Advisory 2024-2674-03 - An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-2071-03

β€” May 3rd 2024 at 14:24
Red Hat Security Advisory 2024-2071-03 - Red Hat OpenShift Container Platform release 4.15.11 is now available with updates to packages and images that fix several bugs and add enhancements.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-2068-03

β€” May 3rd 2024 at 14:24
Red Hat Security Advisory 2024-2068-03 - Red Hat OpenShift Container Platform release 4.15.11 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include a denial of service vulnerability.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-2054-03

β€” May 3rd 2024 at 14:24
Red Hat Security Advisory 2024-2054-03 - Red Hat OpenShift Container Platform release 4.14.23 is now available with updates to packages and images that fix several bugs and add enhancements.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-2049-03

β€” May 3rd 2024 at 14:24
Red Hat Security Advisory 2024-2049-03 - Red Hat OpenShift Container Platform release 4.13.41 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include a denial of service vulnerability.
☐ β˜† βœ‡ The Hacker News

Expert-Led Webinar - Uncovering Latest DDoS Tactics and Learn How to Fight Back

By: The Hacker News β€” May 3rd 2024 at 12:53
In today's rapidly evolving digital landscape, the threat of Distributed Denial of Service (DDoS) attacks looms more significant than ever. As these cyber threats grow in sophistication, understanding and countering them becomes crucial for any business seeking to protect its online presence. To address this urgent need, we are thrilled to announce our upcoming webinar, "Uncovering Contemporary
☐ β˜† βœ‡ The Hacker News

Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications

By: Newsroom β€” May 3rd 2024 at 12:35
Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection. This is done to "facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services," the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News.
☐ β˜† βœ‡ KitPloit - PenTest Tools!

MasterParser - Powerful DFIR Tool Designed For Analyzing And Parsing Linux Logs

By: Zion3R β€” May 3rd 2024 at 12:30


What is MasterParser ?

MasterParser stands as a robust Digital Forensics and Incident Response tool meticulously crafted for the analysis of Linux logs within the var/log directory. Specifically designed to expedite the investigative process for security incidents on Linux systems, MasterParser adeptly scans supported logs, such as auth.log for example, extract critical details including SSH logins, user creations, event names, IP addresses and much more. The tool's generated summary presents this information in a clear and concise format, enhancing efficiency and accessibility for Incident Responders. Beyond its immediate utility for DFIR teams, MasterParser proves invaluable to the broader InfoSec and IT community, contributing significantly to the swift and comprehensive assessment of security events on Linux platforms.


MasterParser Wallpapers

Love MasterParser as much as we do? Dive into the fun and jazz up your screen with our exclusive MasterParser wallpaper! Click the link below and get ready to add a splash of excitement to your device! Download Wallpaper

Supported Logs Format

This is the list of supported log formats within the var/log directory that MasterParser can analyze. In future updates, MasterParser will support additional log formats for analysis. |Supported Log Formats List| | --- | | auth.log |

Feature & Log Format Requests:

If you wish to propose the addition of a new feature \ log format, kindly submit your request by creating an issue Click here to create a request

How To Use ?

How To Use - Text Guide

  1. From this GitHub repository press on "<> Code" and then press on "Download ZIP".
  2. From "MasterParser-main.zip" export the folder "MasterParser-main" to you Desktop.
  3. Open a PowerSehll terminal and navigate to the "MasterParser-main" folder.
# How to navigate to "MasterParser-main" folder from the PS terminal
PS C:\> cd "C:\Users\user\Desktop\MasterParser-main\"
  1. Now you can execute the tool, for example see the tool command menu, do this:
# How to show MasterParser menu
PS C:\Users\user\Desktop\MasterParser-main> .\MasterParser.ps1 -O Menu
  1. To run the tool, put all your /var/log/* logs in to the 01-Logs folder, and execute the tool like this:
# How to run MasterParser
PS C:\Users\user\Desktop\MasterParser-main> .\MasterParser.ps1 -O Start
  1. That's it, enjoy the tool!

How To Use - Video Guide

https://github.com/YosfanEilay/MasterParser/assets/132997318/d26b4b3f-7816-42c3-be7f-7ee3946a2c70

MasterParser Social Media Publications

Social Media Posts
1. First Tool Post
2. First Tool Story Publication By Help Net Security
3. Second Tool Story Publication By Forensic Focus
4. MasterParser featured in Help Net Security: 20 Essential Open-Source Cybersecurity Tools That Save You Time


☐ β˜† βœ‡ The Hacker News

New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data

By: The Hacker News β€” May 3rd 2024 at 10:42
SaaS applications are dominating the corporate landscape. Their increased use enables organizations to push the boundaries of technology and business.&nbsp;At the same time, these applications also pose a new security risk that security leaders need to&nbsp;address,&nbsp;since the existing security stack&nbsp;does not&nbsp;enable complete control or comprehensive monitoring of their usage.
☐ β˜† βœ‡ The Hacker News

NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources

By: Newsroom β€” May 3rd 2024 at 09:37
The U.S. government on Thursday published a new cybersecurity advisory warning of North Korean threat actors' attempts to send emails&nbsp;in a manner that makes them appear like they are&nbsp;from legitimate and trusted parties. The&nbsp;joint bulletin&nbsp;was published&nbsp;by the National Security Agency (NSA), the&nbsp;Federal Bureau of Investigation (FBI), and the Department of State. "The
☐ β˜† βœ‡ WIRED

These Dangerous Scammers Don’t Even Bother to Hide Their Crimes

By: Matt Burgess β€” May 3rd 2024 at 09:00
β€œYahoo Boy” cybercriminals are openly running dozens of scams across Facebook, WhatsApp, Telegram, TikTok, YouTube, and more.
☐ β˜† βœ‡ The Hacker News

Google Announces Passkeys Adopted by Over 400 Million Accounts

By: Newsroom β€” May 3rd 2024 at 06:40
Google on Thursday announced that&nbsp;passkeys are being used by&nbsp;over 400 million Google accounts, authenticating users more than 1 billion times&nbsp;over the past two years. "Passkeys are easy to use and phishing resistant, only relying on a fingerprint, face scan or a pin making them 50% faster than passwords," Heather Adkins, vice president of security engineering at Google,&nbsp;said.
☐ β˜† βœ‡ The Register - Security

Europol op shutters 12 scam call centers and cuffs 21 suspected fraudsters

β€” May 3rd 2024 at 05:34

Cops prevented crims from bilking victims out of more than €10m - but couldn't stop crime against art

A Europol-led operation dubbed β€œPandora” has shut down a dozen phone scam centers, and arrested 21 suspects. The cops reckon the action prevented criminals from bilking victims out of more than €10 million (Β£8.6 million, $11 million).…

☐ β˜† βœ‡ The Hacker News

Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks

By: Newsroom β€” May 3rd 2024 at 04:50
HPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws impacting ArubaOS that could result in remote code execution (RCE) on affected systems. Of the&nbsp;10&nbsp;security defects, four are rated critical in severity - CVE-2024-26304&nbsp;(CVSS score: 9.8) - Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via
☐ β˜† βœ‡ The Register - Security

Indonesia sneakily buys spyware, claims Amnesty International

β€” May 3rd 2024 at 04:33

A 'murky' web sees many purchases run through Singapore in a way that hides potential users

Indonesia has acquired spyware and surveillance technologies through a "murky network" that extends into Israel, Greece, Singapore and Malaysia for equipment sourcing, according to Amnesty International.…

☐ β˜† βœ‡ The Register - Security

Chinese government website security is often worryingly bad, say Chinese researchers

β€” May 3rd 2024 at 02:34

Bad configurations, insecure versions of jQuery, and crummy cookies are some of myriad problems

Exclusive Five Chinese researchers examined the configurations of nearly 14,000 government websites across the country and found worrying lapses that could lead to malicious attacks, according to a not-yet-peer-reviewed study released last week.…

☐ β˜† βœ‡ WeLiveSecurity

Adding insult to injury: crypto recovery scams

β€” May 2nd 2024 at 09:30
Once your crypto has been stolen, it is extremely difficult to get back – be wary of fake promises to retrieve your funds and learn how to avoid becoming a victim twice over
☐ β˜† βœ‡ Troy Hunt

Weekly Update 398

By: Troy Hunt β€” May 3rd 2024 at 00:57
Weekly Update 398

How many different angles can you have on one data breach? Facial recognition (which probably isn't actual biometrics), gambling, offshore developers, unpaid bills, extortion, sloppy password practices and now, an arrest. On pondering it more after today's livestream, it's the unfathomable stupidity of publishing this data publicly that really strikes me. By all means, have contractual disputes, get lawyers involved and showdown in the courts if you need to, but take data in this fashion and chuck it up online and you're well into criminal territory. It's just nuts, and I suspect there's a lot more yet to play out in this saga.

Weekly Update 398
Weekly Update 398
Weekly Update 398
Weekly Update 398

References

  1. Sponsored by:Β Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite
  2. Outabox - where do I even begin with this one?! (that's a link to the tweet thread, stay tuned for more there)
  3. Qantas wasn't breached in any sort of malicious fashion, but they've still had a breach (looks like a classic cache key cock-up to me)
  4. Did Bandcamp really email people with their passwords mail-merged into where their name should be? (no, but someone accidentally put their password in the username field and it then appeared in the mail merge... which is also funny 🀣)

☐ β˜† βœ‡ McAfee Blogs

McAfee Dominates AV-Comparatives PC Performance Test

By: Jasdev Dhaliwal β€” May 3rd 2024 at 00:36

In our digital age, a computer is not just a tool; it’s a gateway to a world of possibilities, entertainment, and creativity. The speed of everyday tasks from gaming, and streaming TV shows to editing images and videos can make us more productive but also make our computers more fun to use. When exploring our software choices, it’s vital to choose apps and services, such as online protection tools that have a minimal impact on your computer, allowing you to live your best life online, without the concerns of your PC slowing down.Β 

McAfee has once again proven its excellence by securing the #1 spot in the AV-Comparatives PC Performance Test. With an impressive overall impact score of only 2.8, McAfee Total Protection outperformed all other security vendors, showcasing its lightweight design and exceptional performance. Download the full report from AV-Comparatives here.

The AV-Comparatives Performance TestΒ 

AV-Comparatives, an Austria-based test-lab renowned for its comprehensive evaluations, conducted an extensive Performance Test to measure the impact of consumer security software on system performance. In this test, 16 security products, including McAfee Total Protection, were rigorously evaluated on a low-end PC with an Intel Core i3 CPU, 4GB of RAM, and SSD system drives. The tests were conducted on a clean Windows 10, 64-Bit system with the security software installed using default settings.Β 

Β 

With an overall impact score of 2.8, McAfee Total Protection emerged as the lightest product in the test, surpassing the industry average of 12.3. This outstanding performance has earned McAfee Total Protection the highest possible ranking: ADVANCED+ 3 Stars. This achievement reaffirms McAfee’s commitment to delivering top-notch security solutions that prioritize both protection and performance.Β McAfee has consistently received the highest ADVANCED+ ratings for performance in all AV-Comparatives Performance Tests since October 2016. This track record of excellence demonstrates McAfee’s dedication to continuous improvement and delivering exceptional products.Β 

How a Faster Computer Can Help You Achieve MoreΒ 

To ensure the accuracy of the results, AV-Comparatives examined various activities such as file copying, application installation and launching, file downloading, and web browsing. All tests were conducted with an active internet connection, allowing for the evaluation of the real-world impact of cloud services and features. McAfee Total Protection excelled in all these areas, showcasing its ability to provide robust security without compromising system performance. Whether you’re a gamer, a movie buff, a budding photographer, or a video editor, the enhanced performance can significantly refine how you engage with your hobbies and passions. Learn how your computer can also be more fun!Β 

Gaming: A Seamless Escape into Virtual WorldsΒ 

For gamers, the benefits of a faster computer are immediately noticeable. Modern games require substantial system resources, including fast processors and powerful graphics cards, to run smoothly. Online protection with a minimal impact on your computer’s performance, lets you enjoy games as the developers intended, with minimal lag and stunning visuals.Β 

Streaming: Enjoying Your Favorite Shows in High DefinitionΒ 

Streaming TV shows and movies has become a staple of home entertainment. Platforms like Netflix and Disney Plus offer 4K streaming for many titles and an optimized computer can mean enjoying the best streaming content without buffering. Β 

Image Editing: Unleashing Creative PotentialΒ 

Photography enthusiasts and graphic designers know that image editing can be resource-intensive, especially with high-resolution images and complex effects. A more efficient computer speeds up the performance of software like Adobe Photoshop, allowing for quicker loading of images, smoother application of effects, and more responsive overall editing. This not only saves time but also makes the creative process more enjoyable.Β Β 

Video Editing: Crafting Stories with PrecisionΒ 

Video editing is perhaps the most demanding task that regular consumers undertake on their computers. Editing software such as Adobe Premiere Pro or Final Cut Pro can leverage the additional power of a faster computer to render video faster, apply effects more smoothly, and improve the playback of high-resolution footage in real time. This means less time waiting and more time creating.Β Β 

Protection with World-Class Performance

Investing in robust, tried, and tested online security solutions offers peace of mind, without compromises to your system performance. If you find your current computer lagging in your digital aspirations, it might be time to consider stepping up to more capable online protection. Stay protected with McAfee and experience the perfect balance of security and efficiency.Β 

Β 

Β 

The post McAfee Dominates AV-Comparatives PC Performance Test appeared first on McAfee Blog.

☐ β˜† βœ‡ The Register - Security

Microsoft, Google do a victory lap around passkeys

β€” May 2nd 2024 at 23:03

Windows giant extends passwordless tech to everyone else

Microsoft today said it will now let us common folk β€” not just commercial subscribers β€” signΒ into their Microsoft accounts and apps using passkeys with their face, fingerprint, or device PIN.…

☐ β˜† βœ‡ The Register - Security

Florida man gets 6 years behind bars for flogging fake Cisco kit to US military

β€” May 2nd 2024 at 20:58

Operation busted after dodgy devices ended up at Air Force

Miami resident Onur Aksoy has been sentenced to six and a half years in prison for running a multi-million-dollar operation selling fake Cisco equipment that ended up in the US military.…

☐ β˜† βœ‡ The Register - Security

Patch up – 4 critical bugs in ArubaOS lead to remote code execution

β€” May 2nd 2024 at 20:30

Ten vulnerabilities in total for admins to apply

Network admins are being urged to patch a bundle of critical vulnerabilities in ArubaOS that lead to remote code execution as a privileged user.…

☐ β˜† βœ‡ ZDNet | security RSS

Two years in, Google says passkeys now protect more than 400 million accounts

β€” May 2nd 2024 at 16:21
Google Account users have authenticated themselves using passkeys more than 1 billion times, but passwords are likely to be around for years.
☐ β˜† βœ‡ WIRED

The Breach of a Face Recognition Firm Reveals a Hidden Danger of Biometrics

By: Jordan Pearson β€” May 2nd 2024 at 15:24
Outabox, an Australian firm that scanned faces for bars and clubs, suffered a breach that shows the problems with giving companies your biometric data.
☐ β˜† βœ‡ The Hacker News

Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw

By: Newsroom β€” May 2nd 2024 at 14:22
Several popular Android applications available in&nbsp;Google&nbsp;Play Store are susceptible to a path traversal-affiliated vulnerability codenamed the Dirty Stream attack that could be exploited by a malicious app to overwrite arbitrary files in the vulnerable&nbsp;app's&nbsp;home directory. "The implications of this vulnerability pattern include arbitrary code execution and token theft,
☐ β˜† βœ‡ The Register - Security

Federal frenzy to patch gaping GitLab account takeover hole

β€” May 2nd 2024 at 14:15

Warning comes exactly a year after the vulnerability was introduced

The US Cybersecurity and Infrastructure Security Agency (CISA) is forcing all federal agencies to patch a critical vulnerability in GitLab's Community and Enterprise editions, confirming it is very much under "active exploit."…

☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Debian Security Advisory 5676-1

β€” May 2nd 2024 at 13:56
Debian Linux Security Advisory 5676-1 - Security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Ubuntu Security Notice USN-6747-2

β€” May 2nd 2024 at 13:56
Ubuntu Security Notice 6747-2 - USN-6747-1 fixed vulnerabilities in Firefox. The update introduced several minor regressions. This update fixes the problem. Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. Bartek Nowotarski discovered that Firefox did not properly limit HTTP/2 CONTINUATION frames. An attacker could potentially exploit this issue to cause a denial of service. Gary Kwong discovered that Firefox did not properly manage memory when running garbage collection during realm initialization. An attacker could potentially exploit this issue to cause a denial of service, or execute arbitrary code. Lukas Bernhard discovered that Firefox did not properly manage memory during JIT optimizations, leading to an out-of-bounds read vulnerability. An attacker could possibly use this issue to cause a denial of service or expose sensitive information. Nan Wang discovered that Firefox did not properly manage memory during WASM garbage collection. An attacker could potentially exploit this issue to cause a denial of service, or execute arbitrary code. Various other issues were also addressed.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-2651-03

β€” May 2nd 2024 at 13:48
Red Hat Security Advisory 2024-2651-03 - An update for the nodejs:16 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include a denial of service vulnerability.
☐ β˜† βœ‡ Advisory Files β‰ˆ Packet Storm

Red Hat Security Advisory 2024-2645-03

β€” May 2nd 2024 at 13:48
Red Hat Security Advisory 2024-2645-03 - An update for podman is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.
☐ β˜† βœ‡ KitPloit - PenTest Tools!

C2-Cloud - The C2 Cloud Is A Robust Web-Based C2 Framework, Designed To Simplify The Life Of Penetration Testers

By: Zion3R β€” May 2nd 2024 at 12:30


The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.

C2 Cloud is open source. Security analysts can confidently perform simulations, gaining valuable experience and contributing to the proactive defense posture of their organizations.

Reverse shells support:

  1. Reverse TCP
  2. Reverse HTTP
  3. Reverse HTTPS (configure it behind an LB)
  4. Telegram C2

Demo

C2 Cloud walkthrough: https://youtu.be/hrHT_RDcGj8
Ransomware simulation using C2 Cloud: https://youtu.be/LKaCDmLAyvM
Telegram C2: https://youtu.be/WLQtF4hbCKk

Key Features

πŸ”’ Anywhere Access: Reach the C2 Cloud from any location.
πŸ”„ Multiple Backdoor Sessions: Manage and support multiple sessions effortlessly.
πŸ–±οΈ One-Click Backdoor Access: Seamlessly navigate to backdoors with a simple click.
πŸ“œ Session History Maintenance: Track and retain complete command and response history for comprehensive analysis.

Tech Stack

πŸ› οΈ Flask: Serving web and API traffic, facilitating reverse HTTP(s) requests.
πŸ”— TCP Socket: Serving reverse TCP requests for enhanced functionality.
🌐 Nginx: Effortlessly routing traffic between web and backend systems.
πŸ“¨ Redis PubSub: Serving as a robust message broker for seamless communication.
πŸš€ Websockets: Delivering real-time updates to browser clients for enhanced user experience.
πŸ’Ύ Postgres DB: Ensuring persistent storage for seamless continuity.

Architecture

Application setup

  • Management port: 9000
  • Reversse HTTP port: 8000
  • Reverse TCP port: 8888

  • Clone the repo

  • Optional: Update chait_id, bot_token in c2-telegram/config.yml
  • Execute docker-compose up -d to start the containers Note: The c2-api service will not start up until the database is initialized. If you receive 500 errors, please try after some time.

Credits

Inspired by Villain, a CLI-based C2 developed by Panagiotis Chartas.

License

Distributed under the MIT License. See LICENSE for more information.

Contact



☐ β˜† βœ‡ The Hacker News

Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million

By: Newsroom β€” May 2nd 2024 at 12:26
A Ukrainian national has been sentenced to more than 13 years in prison and ordered to pay $16 million in restitution for carrying out thousands of ransomware attacks and extorting victims. Yaroslav Vasinskyi (aka Rabotnik), 24, along with his co-conspirators&nbsp;part&nbsp;of the&nbsp;REvil ransomware group&nbsp;orchestrated more than 2,500 ransomware attacks and demanded ransom payments in
☐ β˜† βœ‡ The Hacker News

When is One Vulnerability Scanner Not Enough?

By: The Hacker News β€” May 2nd 2024 at 10:25
Like antivirus software, vulnerability scans rely on a database of known weaknesses. That’s why websites like VirusTotal exist, to give cyber practitioners a chance to see whether a malware sample&nbsp;is detected&nbsp;by multiple virus scanning engines, but this&nbsp;concept hasn’t existed in the vulnerability management space. The benefits of using multiple scanning engines Generally speaking
☐ β˜† βœ‡ The Hacker News

Dropbox Discloses Breach of Digital Signature Service Affecting All Users

By: Newsroom β€” May 2nd 2024 at 10:19
Cloud storage services provider Dropbox&nbsp;on Wednesday disclosed&nbsp;that Dropbox Sign (formerly HelloSign) was breached by unidentified threat actors, who&nbsp;accessed emails, usernames, and general account settings associated with all users of the digital signature product. The company, in&nbsp;a filing with the U.S. Securities and Exchange Commission (SEC), said it became aware of the "
☐ β˜† βœ‡ The Hacker News

New "Goldoon" Botnet Targets D-Link Routers With Decade-Old Flaw

By: Newsroom β€” May 2nd 2024 at 10:10
A never-before-seen botnet called&nbsp;Goldoon&nbsp;has&nbsp;been observed&nbsp;targeting D-Link routers with a nearly decade-old critical security flaw&nbsp;with the goal of using&nbsp;the compromised devices for further attacks. The vulnerability in question is&nbsp;CVE-2015-2051&nbsp;(CVSS score: 9.8), which affects D-Link DIR-645 routers and allows remote attackers to&nbsp;execute arbitrary
☐ β˜† βœ‡ The Register - Security

Think tank: China's tech giants refine and define Beijing's propaganda push

β€” May 2nd 2024 at 06:57

Taking down TikTok won't stop the CCP's attempt to control global narratives

Chinese tech companies that serve as important links in the world's digital supply chains are helping Beijing to execute and refine its propaganda strategy, according to an Australian think tank.…

☐ β˜† βœ‡ The Register - Security

REvil ransomware scum sentenced to almost 14 years inside, ordered to pay $16 million

β€” May 2nd 2024 at 06:31

After extorting $700 million from thousands of victims

A Ukrainian man has been sentenced to almost 14 years in prison and ordered to pay more than $16 million in restitution for his role in infecting thousands of victims with REvil ransomware.…

☐ β˜† βœ‡ The Hacker News

CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability

By: Newsroom β€” May 2nd 2024 at 06:15
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has&nbsp;added&nbsp;a critical flaw impacting GitLab to its Known Exploited Vulnerabilities (KEV) catalog, owing to active exploitation in the wild. Tracked as&nbsp;CVE-2023-7028&nbsp;(CVSS score: 10.0), the maximum severity vulnerability could facilitate account takeover by sending password reset emails to an unverified email
❌