Étiquette : vulnerability (Page 1 of 28)

“We’ve enhanced Android’s auto-rotate feature with face detection, using the front-facing camera to more accurately recognize when to rotate the screen. This is especially helpful for people who are using their devices while lying down on a couch or in bed, for example. For developers, this means that the auto-rotation behavior will provide a better user experience for users who have opted in through Settings. The enhanced auto-rotate feature lives within our recently announced Private Compute Core, so images are never stored or sent off the device. In Beta 3 this feature is available on Pixel 4 and later Pixel devices.To make screen rotation as speedy as possible on all devices, we’ve also optimized the animation and redrawing and added an ML-driven gesture-detection algorithm. As a result, the latency for the base auto-rotate feature has been reduced by 25%, and the benefits of the face detection enhancement build on top of those improvements. Give the auto-rotate improvements a try and let us know what yo”

Source : Android Developers Blog: Android 12 Beta 3 and final APIs

Reverse engineering generative models from a single deepfake image

“Deepfakes have become more believable in recent years. In some cases, humans can no longer easily tell some of them apart from genuine images. Although detecting deepfakes remains a compelling challenge, their increasing sophistication opens up more potential lines of inquiry, such as: What happens when deepfakes are produced not just for amusement and awe, but for malicious intent on a grand scale? Today, we — in partnership with Michigan State University (MSU) — are presenting a research method of detecting and attributing deepfakes that relies on reverse engineering from a single AI-generated image to the generative model used to produce it. Our method will facilitate deepfake detection and tracing in real-world settings, where the deepfake image itself is often the only information detectors have to work with.”

Source : Reverse engineering generative models from a single deepfake image

A Colonial Pipeline facility in Baltimore. Its pipelines feed large storage tanks up and down the East Coast.

« We are apolitical, we do not participate in geopolitics, do not need to tie us with a defined government and look for our motives, » it said in a statement posted on its website. « Our goal is to make money and not creating problems for society. »
The group seemed somewhat surprised that its actions resulted in closing a major pipeline and suggested that perhaps it would avoid such targets in the future.

Source : FBI Confirms DarkSide as Colonial Pipeline Hacker – The New York Times

Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app’s perspective

FFmpeg vulnerabiltiies by year

“Given the number of opportunities present, we found that it’s possible to execute arbitrary code on a Cellebrite machine simply by including a specially formatted but otherwise innocuous file in any app on a device that is subsequently plugged into Cellebrite and scanned. There are virtually no limits on the code that can be executed. For example, by including a specially formatted but otherwise innocuous file in an app on a device that is then scanned by Cellebrite, it’s possible to execute code that modifies not just the Cellebrite report being created in that scan, but also all previous and future generated Cellebrite reports from all previously scanned devices and all future scanned devices in any arbitrary way (inserting or removing text, email, photos, contacts, files, or any other data), with no detectable timestamp changes or checksum failures. This could even be done at random, and would seriously call the data integrity of Cellebrite’s reports into question.”

Source : Signal >> Blog >> Exploiting vulnerabilities in Cellebrite UFED and Physical Analyzer from an app’s perspective

Troy Hunt: Data From The Emotet Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI and NHTCU

“Earlier this year, the FBI in partnership with the Dutch National High Technical Crimes Unit (NHTCU), German Federal Criminal Police Office (BKA) and other international law enforcement agencies brought down what Europol rereferred to as the world’s most dangerous malware: Emotet. This strain of malware dates back as far as 2014 and it became a gateway into infected machines for other strains of malware ranging from banking trojans to credential stealers to ransomware. Emotet was extremely destructive and wreaked havoc across the globe before eventually being brought to a halt in February.
Following the takedown, the FBI reached out and asked if Have I Been Pwned (HIBP) might be a viable means of alerting impacted individuals and companies that their accounts had been affected by Emotet. This isn’t the first time HIBP has been used by law enforcement in the wake of criminal activity with the Estonian Central Police using it for similar purposes a few years earlier. ”

Source : Troy Hunt: Data From The Emotet Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI and NHTCU

“Lorsque la victime va copier une adresse, le malware va la remplacer dans le presse-papier par l’adresse d’un portefeuille contrôlé par les malfaiteurs — les chercheurs en ont compté plus d’une centaine. Résultat : quand la victime va « coller » l’adresse du destinataire de la transaction dans le champ prévu à cet effet, elle va en réalité coller celle du malfrat. Et si elle valide la transaction, elle lui enverra involontairement l’argent.Oui, si la victime est suffisamment attentive, elle remarquera que l’adresse qu’elle a copiée et celle qu’il a collée ne sont pas similaires, et elle ne validera pas la transaction. Mais ce manque de finesse du subterfuge ne l’empêche pas de fonctionner. D’après Avast, Hack Boss aurait récolté plus de 8,4 Bitcoin, 6,9 Ethereum ou encore 2 300 Dogecoin depuis la mise en place de son arnaque en novembre 2018.”

Source : Ce malware manipule les copier/coller pour détourner des cryptomonnaies – Cyberguerre

533 million Facebook users’ phone numbers leaked on hacker forum

http://www.beaude.net/no-flux/wp-content/uploads/2021/04/phone-numbers.jpg

“The mobile phone numbers and other personal information for approximately 533 million Facebook users worldwide has been leaked on a popular hacker forum for free.The stolen data first surfaced on a hacking community in June 2020 when a member began selling the Facebook data to other members. What made this leak stand out was that it contained member information that can be scraped from public profiles and private mobile numbers associated with the accounts.”

Source : 533 million Facebook users’ phone numbers leaked on hacker forum

“Samedi 27 mars en fin de journée, l’équipe en charge de la sécurité de PHP a observé deux étranges modifications dans son code source, réalisées quelques heures auparavant. Ces commits (i.e. le terme consacré pour désigner les changements sur le code), déposés sous les noms de deux développeurs très actifs de PHP, Nikita Popov et Rasmus Lerdorf, servaient prétendument à régler une erreur de saisie dans le code. Sauf qu’en réalité, il s’agissait d’un ajout de code, réalisé par un hacker pour le moment inconnu. Son objectif : installer une backdoor, c’est-à-dire un accès frauduleux, sur tous les sites utilisateurs de PhP. Autant dire que l’équipe de sécurité a évité une gigantesque catastrophe : PHP est un langage de programmation utilisé par près de 80 % de la totalité des sites du web”

Source : Comment un hacker a failli compromettre 80% de l’intégralité des sites web – Cyberguerre

« Older posts

© 2021 no-Flux

Theme by Anders NorenUp ↑