David Rushmer

103 posts

David Rushmer banner
David Rushmer

David Rushmer

@_DavidRushmer

Cybersecurity Researcher, Security Nut and Excessive Coffee Drinker #ThreatResearch

Katılım Mayıs 2012
83 Takip Edilen48 Takipçiler
David Rushmer
David Rushmer@_DavidRushmer·
My father died before just before Christmas and the Internet was in his name. @EE created an account for my mum and gave her 14 days to cancel her contract. She did within the 14 days and was told that there wouldn't be any further charges. So why @EE are you referring her to a debt collection company when she did everything you asked of her and is no longer a customer?
English
2
0
1
4K
David Rushmer retweetledi
RevEng.ai
RevEng.ai@RevEng_AI·
From nearly 1k applications, we are pleased to say that @RevEng_AI has been selected as one of 53 AI startups joining the first ever @GoogleStartups Gemini Founders Forum cohort; and we couldn't be more thrilled. Find out more by going here: blog.google/outreach-initi…
RevEng.ai tweet media
English
1
2
4
252
Greg Linares (Laughing Mantis)
Greg Linares (Laughing Mantis)@Laughing_Mantis·
x.com/Laughing_Manti… Several years back I encountered a threat actor that would mimic your local ISP including delivering targeted ads that would display your ISP + numbers to call for support that eventually would result in a physical hardware implant delivery campaign. The team i worked with identified a few campaigns: "Internet slowdown" issues (generic) "Internet lag" (gaming) "Faster Internet available now in your area" (fast campaign) These would lead to websites number would then redirect to a group that would social engineer the victim into gathering their information and then tell the victim they needed to have a technician come in and replace the device. The device would be a router of the same style as the targeted victim's ISP provided device (In a few cases an upgrade), and the team would physically install it while the victim was there. After this one of 3 actions would occur: Had the victim help assist on calling the ISP to approve the new device (1 cases) Clone the existing real ISP supplied one using hardware sticker on the replaced device (2 cases) Call using stolen info from the initial call to act as the victim and approve the new device (suspected 1 case). The devices had modified firmware to use attacker supplied DNS information for presumably AiTM content later. This included some spoofed values and details appearing as the ISP. The UI even displayed fake values at times to trick the victim if they logged in. We managed to track down one of the physical install teams and they said they were part time contract workers doing an ISP support role for a 3rd party company we later determined had no relations to the ISP. They got the job via online recruiter and received hardware essentially drop shipped to them spontaneously. They genuinely believed they were subcontractors working for the victim's ISP. I wanted to discuss this scenario as a talk but it's bound by an NDA that likely is too strict to help benefit anyone outside of the details of this post So why am I discussing this now? Some of the IPs, Domains, and ASN information we were able to extract and track down just happened to appeared in the DSLRoot investigation from @infrawatch_app here: infrawatch.app/blog/dslroot-u…
Greg Linares (Laughing Mantis)@Laughing_Mantis

As I mentioned last week Insider Threat at the ISP is a very real thing I can confirm that I have seen similar attacks at the mobile provider, ISP, data Center, and cloud provider levels in the last 3 years

English
17
100
556
72.6K
David Rushmer retweetledi
vx-underground
vx-underground@vxunderground·
August 14th we posted this and mocked, sayiny it was probably North Korea. Some people (for reasons I don't understand) said it was probably safe (it's not) Thankfully, @infrawatch_app went way out there way to investigate the company mentioned in the Reddit post (DSLRoot) and much more The tl;dr: - Guy in Belarus owns the company - Owner travels between Minsk and Moscow - He pays you $250/month to plug in devices - He connects to it with Remote Desktop Software - He sells network access to your home to other people - Advertises on BlackHatWorld - Random people use your residential IP for ???
vx-underground tweet media
English
68
216
2.3K
141.8K
David Rushmer retweetledi
RevEng.ai
RevEng.ai@RevEng_AI·
📣 We're hosting a CTF Event in Washington DC 📣 Join us on the 12th of May for the inaugural RevEng.AI CTF at the stunning Sands Capital building. Experience a sneak peek into RevEng.AI's cutting-edge AI platform. eventbrite.co.uk/e/revengai-inp…
English
0
2
4
1.2K
David Rushmer
David Rushmer@_DavidRushmer·
If you're using Ivanti Avalanche, now is the time to update because 𝟲.𝟰.𝟯 addressed quite a bit. 𝗖𝗩𝗘-𝟮𝟬𝟮𝟰-𝟮𝟳𝟵𝟴𝟰 a Path Traversal Vulnerability was added to the list this morning. Although personally I would be more concerned with 𝗖𝗩𝗘-𝟮𝟬𝟮𝟰-𝟮𝟰𝟵𝟵𝟲 published on the 18th - "A Heap overflow vulnerability in WLInfoRailService component of Ivanti Avalanche before 6.4.3 allows an unauthenticated remote attacker to execute arbitrary commands." There are more but it'll be faster if you just go 𝐏𝐀𝐓𝐂𝐇 :D
English
0
0
0
58
David Rushmer
David Rushmer@_DavidRushmer·
Trying to pay @O2 money for an account I never setup because they've decimated my credit score, and they keep hanging up. 8 hours on the phone and 3 trips to the store all for £45 that I had to find out about through Experian... great work @O2
English
0
0
0
47
David Rushmer retweetledi
N$🌟
N$🌟@nav1n0x·
Bypassing WAF by adding multiple slashes to gain SSI/ Path traversal. This is my 2nd successful shot in the dark attempt. Payload: GET /assets/css///////../../../../../../../../etc/passwd #BugBounty
N$🌟 tweet mediaN$🌟 tweet media
English
24
250
851
0
David Rushmer retweetledi
RedSense
RedSense@RedSenseIntel·
Today, RedSense can confirm that #ALPHV aka #BlackCat ransomware gang’s site has been taken down by law enforcement @4D435A
RedSense tweet media
English
6
21
75
22.9K
David Rushmer retweetledi
Adversary Pursuit Group
Adversary Pursuit Group@blackpoint_APG·
Cisco Talos exposes a critical flaw in WPS Office 11.2.0.11537, allowing remote code execution through a malformed Excel file (CVE-2023-31275). Use caution when opening unknown files, which could lead to potential system compromise. talosintelligence.com/vulnerability_…
English
0
1
1
104