https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-05-13 10:08:122025-05-13 10:08:12Orca Snaps Up Opus in Cloud Security Automation Push
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-05-13 09:07:562025-05-13 09:07:56I wanted a privacy screen protector – until I put one on my Galaxy S25 Ultra
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-05-13 09:07:562025-05-13 09:07:56CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor
Moldovan law enforcement authorities have arrested a 45-year-old foreign man suspected of involvement in a series of ransomware attacks targeting Dutch companies in 2021.
“He is wanted internationally for committing several cybercrimes (ransomware attacks, blackmail, and money laundering) against companies based in the Netherlands,” officials said in a statement Monday.
In conjunction with the
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-05-13 08:07:032025-05-13 08:07:03Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
A Türkiye-affiliated threat actor exploited a zero-day security flaw in an Indian enterprise communication platform called Output Messenger as part of a cyber espionage attack campaign since April 2024.
“These exploits have resulted in a collection of related user data from targets in Iraq,” the Microsoft Threat Intelligence team said. “The targets of the attack are associated with the Kurdish
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-05-13 07:07:112025-05-13 07:07:11Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers
Depending on the customer’s preference, possible initial access vectors in our red teaming exercises typically include deployment of dropboxes, (device code) phishing or a stolen portable device. The latter is usually a Windows laptop protected by BitLocker for full disk encryption without pre-boot authentication i.e. without a configured PIN or an additional key file.
While hardware-based TPM sniffing attacks are well known and covered in public courses, they typically involve hunting down board schematics on Chinese websites and some prowess using a soldering iron. Physical craftsmanship is definitely not a strength of mine, which is why I was particularly interested when Thomas demonstrated a concrete software-only attack in his 38C3 talk: Windows BitLocker: Screwed without a Screwdriver.
Even compared to other software attacks such as the “push button decrypt”, the exploitation of the abused bitpixie vulnerability is non-invasive, does not require any permanent device modifications and no complete disk image, thereby allowing a fast (~5 minutes) compromise and more flexible integration in certain social engineering scenarios.
Bitpixie Linux Edition
While Thomas did release a detailed blog post, the concrete exploit code was not disclosed. To fully understand the attack, reproduce the original research, and demonstrate the concrete impact to our customers, I set out to develop a public proof of concept.
The Linux-based exploitation strategy roughly depicted on the above diagram (from Thomas’ presentation) is to:
Enter the Windows Recovery Environment by using Shift+Reboot from the power menu of the login screen
Downgrade to vulnerable Windows Boot Manager (bootmgfw.efi) via PXE boot
Specify broken default Boot Configuration Data (BCD) to force a pxesoftreboot fallback
PXE boot into signed Linux shim loader (shimx64.efi)
Load signed GRUB (grubx64.efi) boot loader
Load signed Linux kernel and initial ram filesystem
This video shows a full rundown of this technique:
Bitpixie WinPE Edition
As Thomas describes in his second blog post discussing possible remediation strategies, Microsoft uses different UEFI certificates to sign boot components based on their origin:
Microsoft 1st party certificate, signs all Windows bootloaders
Microsoft 3rd party certificate, signs everything else commonly understood to boot under Secure Boot, such as Linux shims
As a result, the above attack chain fails at step 4 because the third-party signing certificate used is not trusted. However, there is nothing conceptually stopping an attack flow where third-party signed components are replaced by their Windows native equivalents:
Boot into same Windows Boot Manager (bootmgfw.efi) a second time via PXE boot, but specify different BCD
Load a WinPE based boot image (boot.wim) and corresponding ram disk (boot.sdi)
Load signed Windows boot loader (winload.efi)
Load signed Windows Kernel (ntoskrnl.exe)
Scan physical memory for a VMK using a modified version of WinPmem which internally uses a signed driver (winpmem_x64.sys)
Use VMK to decrypt encrypted recovery password stored in BitLocker meta data
Use human-readable recovery password to unlock the encrypted volume
As presented, the WindowsPE-based attack flow uses only core components signed by Microsoft. At least in theory, it should therefore be applicable to all affected devices, as long as they trust the Microsoft Windows Production PCA 2011 certificate used to sign the vulnerable boot manager. In practice, it seems to be somewhat less reliable than its Linux-based counter part. Nonetheless, the provided automation scripts are hopefully useful in case you want to investigate whether your devices are affected.
Remediation
The Bitpixie vulnerability – and more generally both hardware and software-based attacks – can be mitigated by forcing pre-boot authentication, i.e., requiring an additional PIN and/or key file.
Optimizing your online productivity is more important than ever. Whether you’re a business owner, freelancer, or simply someone…
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-05-13 01:07:212025-05-13 01:07:21Practical Ways to Improve Your Digital Efficiency
Roblox hit with class action over alleged secret tracking of kids’ data; lawsuit claims privacy law violations and…
Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – Read More
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-05-13 00:07:162025-05-13 00:07:16Roblox Lawsuit Claims Hidden Tracking Used to Monetize Kids Data
The $168 million judgment against NSO Group underscores how citizens put little store in the spyware industry’s justifications for circumventing security — but will it matter?
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-05-12 22:07:232025-05-12 22:07:23NSO Group’s Legal Loss May Do Little to Curtail Spyware