Hacking  HOME  Reconnaissance(10)  Resource Development(8)  Initial Access(10)  Execution(14)  Persistence(20)  Privilege Escalation(14)  Defense Evasion(43)  Credential Access(17)  Discovery(32)  Lateral Movement(9)  Collection(17)  Command and Control(17)  Exfiltration(9)  Impact(14)

DATE

NAME

CATEGORY

SUBCATE

INFO

10.5.24

TunnelcrackHackingVPNTunnelCrack is a combination of two widespread security vulnerabilities in VPNs. An adversary can abuse these vulnerabilities to leak traffic outside the VPN tunnel.

10.5.24

TunnelVisionHackingVPNA local network VPN leaking technique that affects all routing-based VPNs

11.4.24

Trick Developers Detected in an Open Source Supply Chain Attack

Hacking

Hacking

In a recent attack campaign, cybercriminals were discovered cleverly manipulating GitHub's search functionality, and using meticulously crafted repositories to distribute malware.

22.3.24z0MinerHackingExploitz0Miner Exploits Korean Web Servers to Attack WebLogic Server
7.3.24QuishingHackingMobilQR codes have had a great run in the past few years, diffusing into almost every aspect of our lives, from looking at restaurant menus and paying for products or services online and offline to accessing websites with greater ease. While the positives of QR codes are clearly visible, both from a business and user perspective, their usage has some pitfalls.

18.1.24

iShutdown HackingiOSA lightweight method to detect potential iOS malware
3.1.24SMTP SmugglingHackingSPAMIn the course of a research project in collaboration with the SEC Consult Vulnerability Lab, Timo Longin (@timolongin) - known for his DNS protocol attacks

1.1.24

Hijack Execution Flow: DLL Search Order HijackingHackingDLLAdversaries may execute their own malicious payloads by hijacking the search order used to load DLLs. Windows systems use a common method to look for required DLLs to load into a program.Hijacking DLL loads may be for the purpose of establishing persistence as well as elevating privileges and/or evading restrictions on file execution.

26.12.23

RTF template injection HackingPhishingInjection is the New Black: Novel RTF Template Inject Technique Poised for Widespread Adoption Beyond APT Actors 

24.12.23

Insta-Phish-A-GramHackingPhishingFollowing Trustwave SpiderLabs’ blog on social media-themed phishing on Facebook, comes another flavor of ‘infringement’ phishing. In this case, the targets, still under the umbrella of Meta, are Instagram users

9.12.23

5GHOULHacking5G5Ghoul : Unleashing Chaos on 5G Edge Devices

8.12.23

Ongoing attacksHackingPhishingStar Blizzard increases sophistication and evasion in ongoing attacks

6.12.23

Fake Lockdown ModeHackingAppleFake Lockdown Mode: A post-exploitation tampering technique

28.11.23

PERFORM NTLM FORCED AUTHENTICATION ATTACKSHackingHackingABUSING MICROSOFT ACCESS “LINKED TABLE” FEATURE TO PERFORM NTLM FORCED AUTHENTICATION ATTACKS
6.11.23Agonizing SerpensHackingHackingThe attacks are characterized by attempts to steal sensitive data, such as personally identifiable information (PII) and intellectual property.
2.11.23KopeechkaHackingToolHow Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime

3.10.23

Authenticated Origin Pulls (mTLS)HackingHackingWhen visitors request content from your domain, Cloudflare first attempts to serve content from the cache. If this attempt fails, Cloudflare sends a request — or an origin pull — back to your origin web server to get the content.

3.10.23

Silent SkimmerHackingHackingSilent Skimmer: Online Payment Scraping Campaign Shifts Targets From APAC to NALA

1.10.23

ZeroFont phishing technique

Hacking

Phishing

ZeroFont phishing technique

14.9.23

Repo Jacking

Hacking

Hacking

Repo Jacking: Exploiting the Dependency Supply Chain

24.7.23

drIBANHackingHackingUncovering drIBAN fraud operations. Chapter 3: Exploring the drIBAN web inject kit
4.7.23HTML SmugglingHackingHackingHTML Smuggling: The Hidden Threat in Your Inbox

1.7.23

ProxyjackingHackingHackingProxyjacking: The Latest Cybercriminal Side Hustle
28.6.23Process MockingjayHackingHackingProcess Mockingjay: Echoing RWX In Userland To Achieve Code Execution