RomCom RAT Attack Analysis: Fake It to Make It

The RomCom RAT has been making the rounds — first in Ukraine as it went after military installations, and now in certain English-speaking countries such as the United Kingdom. Initially a spear-phishing campaign, the RomCom attack has evolved to include domain and download spoofing of well-known and trusted products. In this piece, we’ll break down […]

The post RomCom RAT Attack Analysis: Fake It to Make It appeared first on Security Intelligence.

Continue reading RomCom RAT Attack Analysis: Fake It to Make It

Hackaday Links: December 4, 2022

Hackaday Links Column Banner

Well, this is embarrassing! Imagine sending a multibillion-dollar rover to an ancient lakebed on Mars only to discover after a year of poking around at the rocks that it might …read more Continue reading Hackaday Links: December 4, 2022

Can an SSH server in password mode be impersonated if I ignore the fingerprint warning?

Assume that I never check the server fingerprint when logging in to an SSH server. This means that certain configurations of SSH can be impersonated. For example, I can log into a server that only has my public key. Obviously this doesn’t … Continue reading Can an SSH server in password mode be impersonated if I ignore the fingerprint warning?

Successful Hack of Time-Triggered Ethernet

Time-triggered Ethernet (TTE) is used in spacecraft, basically to use the same hardware to process traffic with different timing and criticality. Researchers have defeated it:

On Tuesday, researchers published findings that, for the first time, break TTE’s isolation guarantees. The result is PCspooF, an attack that allows a single non-critical device connected to a single plane to disrupt synchronization and communication between TTE devices on all planes. The attack works by exploiting a vulnerability in the TTE protocol. The work was completed by researchers at the University of Michigan, the University of Pennsylvania, and NASA’s Johnson Space Center…

Continue reading Successful Hack of Time-Triggered Ethernet

reverse multipoint bluetooth earbuds with intentional spoofing [migrated]

Would it be possible to broadcast one audio source to a group of bluetooth headphones to make it work like old-fashioned radio broadcasting? Could this be done similarly to spoofing? How much of a problem would bluetooth error correcton be… Continue reading reverse multipoint bluetooth earbuds with intentional spoofing [migrated]