The #MADWeb '25 program is live!
We've got 9 full papers, 3 work-in-progress papers, and 2 exciting keynotes lined up. Huge thanks to all the authors and the program committee!
Check out the details and get ready for a great event! π₯
π https://madweb.work/#program
See you in San Diego!
Thanks @bagder for providing the Firefox ca bundle publicly in an accessible way here: https://curl.se/docs/caextract.html
Extra kudos for the appropriate curl command-line to automatically download the latest version!
Just released #ghidriff v0.8.0 - Ghidra 11.3 Support + PyGhidra π₯π
This release uses the latest PyGhidra now officially supported by Ghidra π€πͺ
https://github.com/clearbluejar/ghidriff/releases/tag/v0.8.0
π included!
Recon 2025 Have been Annonced! 20th year Anniversary https://recon.cx June 23-29.
Picard management tip: It's okay not to know things. Practice saying "I don't know." Go ahead. Say it.
Kennt ihr #wuppiefuzz ?
Ist ein coverage-guided REST-Fuzzer und Open-Source.
Bin heute darΓΌber gestolpert und dacht das ist teilenswert.
Our blog site is having a moment, and @TheDustinChilds is stuck on a plane in DFW, but nothing stops Patch Tuesday. There's 2 Microsoft bugs being exploited in the wild and some things we've never seen before. Read all the details at https://www.zerodayinitiative.com/blog/2025/2/11/the-february-2025-security-update-review
A demonstration of writing a simple Windows driver in Rust
https://scorpiosoftware.net/2025/02/08/writing-a-simple-driver-in-rust/
Discussions: https://discu.eu/q/https://scorpiosoftware.net/2025/02/08/writing-a-simple-driver-in-rust/
Good tools are made of bugs: How to monitor your Steam Deck with one byte.
Finding and exploiting two vulnerabilities in AMD's UEFI firmware for fun and gaming.
A Christmas gift in February, brought to you by the incredible @pwissenlit π«Ά
https://blog.quarkslab.com/being-overlord-on-the-steam-deck-with-1-byte.html
ElecticIQ: Sandworm APT Targets Ukrainian Users with Trojanized Microsoft KMS Activation Tools in Cyber Espionage Campaigns
EclecticIQ analysts assess with high confidence that Sandworm (APT44), a threat actor supporting Russia's Main Intelligence Directorate (GRU), is actively conducting a cyber espionage campaign against Ukrainian Windows users. Likely ongoing since late 2023, following Russia's invasion of Ukraine, Sandworm leverages pirated Microsoft Key Management Service (KMS) activators and fake Windows updates to deliver a new version of BACKORDER, a loader previously associated with the group. BACKORDER ultimately deploys Dark Crystal RAT (DcRAT), enabling attackers to exfiltrate sensitive data and conduct cyber espionage.
Multiple pieces of evidence strongly link this campaign to Sandworm, also tracked by CERT-UA as UAC-0145, based on recurring use of ProtonMail accounts in WHOIS records, overlapping infrastructure, and consistent Tactics, Techniques and Procedures (TTPs). Additionally, the reuse of BACKORDER, DcRAT, and TOR network mechanisms, along with debug symbols referencing a Russian-language build environment, further reinforce confidence in Sandworm's involvement. Yara and Sigma rules, and Indicators of Compromise are listed.
#russia #sandworm #apt44 #gru #threatintel #IOC #yara #sigma #malwareanalysis #infosec #cybersecurity #cti #cyberthreatintelligence
Project: mpengine-x64-pdb 1.1.24090.11
File: mpengine.dll
Address: 75a785720
getBasicDataType
SVG:
dark https://tmr232.github.io/function-graph-overview/render/?graph=https%3A%2F%2Fraw.githubusercontent.com%2Fv-p-b%2Fghidra-function-graph-datasets%2Frefs%2Fheads%2Fmain%2F%2Fmpengine-x64-pdb%2F75a785720.json&colors=dark
light https://tmr232.github.io/function-graph-overview/render/?graph=https%3A%2F%2Fraw.githubusercontent.com%2Fv-p-b%2Fghidra-function-graph-datasets%2Frefs%2Fheads%2Fmain%2F%2Fmpengine-x64-pdb%2F75a785720.json&colors=light
Apparently Google is just shitty.
No duress signal or anything here. Just trying to fit in by being shitty. π€¦ββοΈ