Author: James Ortega

Neat Tools from Darren and Hak5

Darren showcases a few red team tools in 7ms.


Russian Spyware Company Uses ChatGPT for Surveillance

A Russian spyware company is using the chatbot to spy on web users. Plus: WTF happened to Sam Altman?

Source: Russian Spyware Company Uses ChatGPT for Surveillance


How Some Governments Eliminate HTTPS/TLS Encryption!

Breaks TLS Encryption.


FACT SHEET: President Biden Issues Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence | The White House

Today, President Biden issued a landmark Executive Order to ensure that America leads the way in seizing the promise and managing the risks of artificial intelligence (AI). The Executive Order establishes new standards for AI safety and security, protects Americans’ privacy, advances equity and civil rights, stands up for consumers and workers, promotes innovation and…

Source: FACT SHEET: President Biden Issues Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence | The White House


Hackers earn over $1 million for 58 zero-days at Pwn2Own Toronto

The Pwn2Own Toronto 2023 hacking competition has ended with security researchers earning $1,038,500 for 58 zero-day exploits (and multiple bug collisions) targeting consumer products between October 24 and October 27. […]

Source: Hackers earn over $1 million for 58 zero-days at Pwn2Own Toronto


CIA exposed to potential intelligence interception due to X’s URL bug

An ethical hacker has exploited a bug in the way X truncates URLs to take over a CIA Telegram channel used to receive intelligence.

Kevin McSheehan, who uses the online handle “Pad,” spotted the issue after hovering over the link to the CIA’s Telegram channel displayed on its X social media profile.

After the CIA updated its profile at some point after September 27, the Telegram link shortened, cutting off part of the full username, allowing McSheehan to register the new, unregistered handle.

The correct Telegram URL should have been displayed as https://t.me/securelycontactingcia but X shortened it to https://t.me/securelycont – at the time an unregistered account name.

McSheehan told the BBC, which first reported the story, that he registered the account name upon realizing it was available to mitigate any potential interceptions of intelligence.

Instead of just shortening the URL in the X profile, X shortened it in a way that completely changed the link’s path, which could have left the CIA vulnerable to espionage campaigns.

Side-by-side images of the CIA's X profile. On the left is the current, fixed profile displaying the correctly shortened URL. On the right, the image shows how the URL appeared after it was erroneously truncated and directing to a different channel

Side-by-side images of the CIA’s X profile. On the left is the current, fixed profile displaying the correctly shortened URL. On the right, the image shows how the URL appeared after it was erroneously truncated and directing to a different channel

The fear was that a hostile nation could have spotted the same issue and exploited it to receive Western intelligence.

This could have made it possible to create a fake CIA account on X, using the same imagery and public-facing profile information, and paying for verification to increase the perceived legitimacy of the account.

The Telegram URL in the fake profile would also have appeared in the same way as it would on the genuine CIA X profile due to the way X truncates URLs.

“It was a perfect storm for something pretty bad to happen – and potentially in an undetected way for quite some time assuming a perfect replica of the CIA channel was produced,” McSheehan said in an X post.

“I think this could have been a sustained attack run by an opposition near peer for the purpose of intercepting sensitive information meant to land in the CIA’s inbox. The attack scenarios are dreadful.”

After registering the account name, McSheehan posted a single message to the Telegram channel explicitly discouraging those who arrived on it from sharing any sensitive information.

He also explained the full story behind how he was able to assume control of a channel advertised by the CIA’s official X account, the potential consequences if he hadn’t got to it first, and that he was ready to hand over the channel to the US government.

The CIA has since changed its profile to display the correct Telegram URL, which publishes messages in English and Russian, pointing individuals to information on how to securely contact the agency.

The agency did not respond to The Register‘s request for comment, and X’s press office auto-replied with “Busy now, please check back later.” It beats the poop emoji, we suppose. ®

Source: CIA exposed to potential intelligence interception due to X’s URL bug


The FBI Are Using Botnets To Fight Botnets

More goes on than you think.


The US Is Openly Stockpiling Dirt on All Its Citizens | WIRED

A newly declassified report from the Office of the Director of National Intelligence reveals that the federal government is buying troves of data about Americans.

Source: The US Is Openly Stockpiling Dirt on All Its Citizens | WIRED


Hard Coded Credentials

Yes, still a thing even with the government.


Are You Secure?

Chris brings up some valid points here.