Skip to content

Dive into the Latest Security updates: DNS Slip-ups, New Command-and-Control mechanisms, and the Emergence of Authentic Scams

Notable internet event from May overshadowed until September 3rd: Researcher Youfu Zhang brings security matter to Mozilla's attention via email list.

Weekly Security Update: DNS Mistakes, New Command and Control Methods, and the Emergence of...
Weekly Security Update: DNS Mistakes, New Command and Control Methods, and the Emergence of Authentic Deceptions

Dive into the Latest Security updates: DNS Slip-ups, New Command-and-Control mechanisms, and the Emergence of Authentic Scams

In the ever-evolving world of technology, cybersecurity remains a critical concern. Here's a roundup of some recent findings that shed light on various aspects of digital security.

TLS Certificates and IP Addresses

TLS certificates, a crucial component of secure web communication, can now be issued for IP addresses, not just domain names. This development opens up new possibilities, but also potential vulnerabilities.

The Compromised Certificate

A notable incident occurred when a certificate was issued by Fina for the IP address 1.1.1.1, compromising the TLS certificate system. It's important to note that Cloudflare, the operator of 1.1.1.1, did not request or authorise this certificate.

Malware and Command Execution

Malware continues to pose a significant threat. One type of malware instructs users to copy and paste a base64 encoded string into a terminal, which executes a script from the internet and looks for interesting files to upload.

The Role of AI in Persuasion

Preliminary research suggests that artificial intelligence (AI) can be influenced by persuasion techniques. This finding underscores the need for careful consideration when designing AI systems.

Application Integrity Issues

Researchers at Trail of Bits are investigating application integrity problems when running applications inside Electron and Chrome. They are specifically focusing on heap snapshots, a potential weak point in these systems.

Poisoning Heap Snapshots

Silent Signal researchers have demonstrated a method to poison the internal state of applications running inside Electron using heap snapshots. This could potentially lead to significant security risks.

C2 Tools and Google Calendar

MeshC2, a C2 tool developed by Eric Escobar, a researcher at Sophos, uses Meshtastic to run commands on remote hosts. Interestingly, a demonstration called MeetC2 has shown how Google Calendar can be used for Command and Control (C2) purposes.

Potential Data Theft through CSS

CSS, a style sheet language used for web design, can perform background downloads from remote sites. While this can be useful, it also raises concerns about potential data theft. However, to steal information strictly using CSS, one needs to know what they're looking for ahead of time due to limitations in its string handling capabilities.

IBM i Mainframe Vulnerability

The IBM i mainframe system has a vulnerability due to a replay attack and command injection. This is a reminder that even established systems are not immune to security threats.

Open Source Malware and Webcams

An open-source malware has been discovered that attempts to take control of webcams, similar to classic spam threats. This underscores the importance of keeping software up-to-date and vigilant against potential threats.

Jailbreaking AI

A novel approach to jailbreak an AI was demonstrated by asking it to return an insult or the recipe for lidocaine. This raises questions about the boundaries and potential risks of AI manipulation.

As always, staying informed about these developments is key to maintaining a secure digital environment.

Read also: