pyn3rd

1K posts

pyn3rd banner
pyn3rd

pyn3rd

@pyn3rd

Security researcher with over 10 years of experience in cloud security. Speaker at BlackHat, HITB, and CanSecWest.

Melbourne, Victoria Katılım Şubat 2016
706 Takip Edilen14.9K Takipçiler
pyn3rd
pyn3rd@pyn3rd·
@steventseeley Before enlightenment: chop wood, carry water. After enlightenment: chop wood, carry water.
English
0
0
4
1.1K
pyn3rd
pyn3rd@pyn3rd·
@spendergrsec I definitely agree that this is not an appropriate approach.:-)
English
0
0
1
45
pyn3rd
pyn3rd@pyn3rd·
As a mitigation, the Linux command echo 3 > /proc/sys/vm/drop_caches can be used to forcibly flush the page cache in cases where the cache may have been contaminated by CopyFail-induced artifacts. However, this may introduce a sharp increase in I/O latency and CPU starvation due to cache-miss amplification. It is strongly recommended to assess the potential impact on production workloads before applying this approach in a k8s environment.
Weston Walker@westonlwalker

You can detect Copy Fail exploitation with the following auditd rules: -a always,exit -F arch=b64 -S bind -F a2=88 -F key=alg_bind -a always,exit -F arch=b64 -S setsockopt -F a1=279 -F key=alg_setsockopt The exploit binds to this saddr once for each 4 bytes of the shellcode. So, if you see like 30-40 of these, it's probably a bad guy. #DetectionEngineering

English
3
6
32
8.2K
pyn3rd
pyn3rd@pyn3rd·
This is somewhat controversial. From my perspective, the vendor recommends flushing the page cache as a temporary mitigation rather than a permanent fix—the proper solution is still to upgrade. However, in real-world incident response, this is not always straightforward. Some argue that even as a temporary measure, clearing the cache may compromise subsequent forensic analysis and attack traceability. Others believe that immediate containment to prevent further impact should take priority. I’m sharing this here to get the community’s perspective.
English
1
0
0
112
pyn3rd
pyn3rd@pyn3rd·
@spendergrsec To be honest, I’m referring to a vendor-provided temporary workaround, and love to discuss it in the community.:-)
English
1
0
0
89
pyn3rd
pyn3rd@pyn3rd·
@zer0pntr I’m referring to a vendor-provided temporary workaround. Please read the context carefully before commenting. In previous messages, we already discussed its side effects on system performance, attack traceability, and log auditing. I’ve also already emphasized my viewpoint.
English
0
0
0
25
O. P.
O. P.@zer0pntr·
@pyn3rd 😂 3 is a one shoot action, not a permanent one. Read before posting bullshit...
English
1
0
0
70
pyn3rd
pyn3rd@pyn3rd·
@spendergrsec I’m referring to a vendor-provided temporary workaround. It’s not a good solution and may introduce side effects, as mentioned earlier. Happy to share and discuss it.
English
1
0
0
163
pyn3rd
pyn3rd@pyn3rd·
@GrowlerEnjooyer In many cases, what matters more for the business is immediate mitigation and keeping the system stable. Incident response and “stopping the bleeding” usually take priority, while forensic analysis and root cause tracing are typically handled afterward.
English
1
0
0
25
EA-18G Growler Enjoyer
EA-18G Growler Enjoyer@GrowlerEnjooyer·
@pyn3rd But wouldn't module blacklisting (if possible) or installing SELinux policy be better? They are just as easy to implement (shell one-liner), more effective, and give you the opportunity to preserve the forensic trail (eg. dump page cache before reboot)
English
1
0
0
41
pyn3rd
pyn3rd@pyn3rd·
@GrowlerEnjooyer I fully agree with that recommendation, but in practice I see that many people tend to prioritize immediate mitigation (damage control) first, and only then move on to forensics and auditing.😄
English
1
0
1
24
EA-18G Growler Enjoyer
EA-18G Growler Enjoyer@GrowlerEnjooyer·
@pyn3rd So based on all that I think I'd explicitly recommend *not* performing the above steps 🥴
English
1
0
0
32
pyn3rd
pyn3rd@pyn3rd·
@GrowlerEnjooyer Undoubtedly, this also makes forensic analysis and attack traceability more difficult.
English
1
0
1
28
EA-18G Growler Enjoyer
EA-18G Growler Enjoyer@GrowlerEnjooyer·
@pyn3rd Also if your system has already behind pwned by CopyFail this just removes the evidence
English
1
0
1
63
pyn3rd
pyn3rd@pyn3rd·
@GrowlerEnjooyer Exactly. I saw this proposed in the customer solution, but it doesn’t look like a proper mitigation. I think it’s just a temporary workaround to prevent victims from actively loading corrupted page cache.
English
1
0
1
186
EA-18G Growler Enjoyer
EA-18G Growler Enjoyer@GrowlerEnjooyer·
@pyn3rd Is that really a mitigation? The system is still vulnerable to CopyFail after running that
English
2
0
0
262
pyn3rd
pyn3rd@pyn3rd·
There are two attack paths: Kubernetes-to-host escape and cross-container attacks. In practice, escaping from Kubernetes to the host is significantly harder to exploit, but the impact is much greater.
English
0
0
0
403
pyn3rd
pyn3rd@pyn3rd·
CopyFail is really an impressive research! If CopyFail achieves a k8s-to-host escape, it would still need to corrupt the host’s page cache. However, there is no guarantee that the corrupted page cache will be reliably used—especially since the runc execution path has already been patched. Are there other scenarios where this vulnerability could still be exploited?🤔@xint_official
English
3
2
24
6.1K
pyn3rd
pyn3rd@pyn3rd·
@skyworship2 Same here! I guess there’s probably a whole new way to explore things.
English
0
0
1
559
pyn3rd retweetledi
Nir Ohfeld
Nir Ohfeld@nirohfeld·
Tweetable one-line RCE on GitHub.com - the potential for AI-assisted closed source bug hunting is insane 💥
English
0
2
23
3K
pyn3rd
pyn3rd@pyn3rd·
#CVE-2026-40466 is a bypass of CVE-2026-34197 in Apache ActiveMQ, exploiting the vm:// protocol to achieve Remote Code Execution
English
0
62
278
20.5K