GoSecure Blog
Threat Hunt of the Month: Sophisticated Phishing Campaigns Leveraging Web Session Cookie Theft
In October 2024, GoSecure Threat Hunters have uncovered a sophisticated phishing campaign that utilizes tactics like Attacker-in-the-Middle (AitM) and phishing to compromise user accounts through web session cookie theft. This specific method targets cloud-based file hosting applications such as Dropbox and OneDrive, compromising users by manipulating shared files and redirecting them to malicious sites where both credentials and multi-factor authentication details are stolen.
Threat Hunt of the Month: CVE-2024-37085 Vulnerability in VMware ESXi Hypervisors – Privilege Escalation and Ransomware Risks
In September 2024, GoSecure Threat Hunters selected a critical vulnerability, CVE-2024-37085, affecting VMware ESXi hypervisors. This vulnerability, which allows for privilege escalation, could give attackers administrative access to ESXi hosts. Such access could lead to ransomware deployment, data theft, and control over key assets within virtual environments.
Reverse Engineering Apple’s Proprietary NFC Wallet Protocol
Near-Field Communication (NFC), a technology behind tap-to-pay credit cards, has evolved significantly since the iPhone 7 in 2016. This tech now powers a range of applications, from mobile payments to access control and event ticketing, making daily interactions more convenient. However, Apple’s strict control over NFC in iPhones, requiring costly fees and agreements for access, has sparked efforts to decode their proprietary system. This summary highlights both the expansive potential of NFC and the challenges posed by Apple’s restrictive policies.
Proxy Detection: Comparing Detection Services with the Truth
In our previous blog post, we looked at different (free and paid) solutions to detect the use of anonymity tools during attacks executed on our Remote Desktop Protocol (RDP) honeypots. Confronted with inconclusive outcomes, this blog post aims to evaluate the different proxy detector tools by analyzing their results with our dataset of Truth.
Hated by Many, Loved by Hackers: Edge’s Role in Staying Undetected
A staggering 87% of people believe that malicious hackers possess exceptional computer skills. One might assume they would predominantly use anonymity networks like Tor to mask their true identities. However, our study reveals that attackers share the same browser preferences as the general population and choose it in relation to their malicious intentions. In this blog, we explore the nuances of browser choices made by attackers who have compromised a system.