vulnerability

Stories From An IT Security Professional

Economics of “Sextortion” Mails

For the past few months (it started in July 2018), I have been collecting Bitcoin wallet addresses from so called “extortion” or “sextortion” emails. The addresses have been added to my MISP server and is shared with other researchers to investigate or detect additional mails. CIRCL now has used the data to generate an analysis […]

Continue Reading

From Russia with Love (and some help by Google)

Through some threat hunting on some OSINT platforms, I discovered a website hosting an image file named “image293.jpg” (6b872d1e949bd9d111168692301414bb685dc5c262ffae6f55f34c8041de0f5f VT | HA | ANY.RUN | Joe Sandbox). Trying to download the file shows that it is a redirect to Google’s short-url service goo.gl. From the link’s statistics page we can see that over 8500 redirects have been […]

Continue Reading

Links of the Week 2018-01-04 (Meltdown & Spectre Special)

Vulnerability Site, Logo & FAQ Meltdown and Spectre CVE Numbers CVE-2017-5753 and CVE-2017-5715 => Spectre CVE-2017-5754 => Meltdown http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5715 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5753 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5754 Microsoft Patch January 3, 2018—KB4056892 (OS Build 16299.192) Red Hat Article Kernel Side-Channel Attacks – CVE-2017-5754 CVE-2017-5753 CVE-2017-5715 Google Project Zero Blog Post Today’s CPU vulnerability: what you need to know US-CERT Meltdown and […]

Continue Reading