Jun 30, 2020Is Zoom’s $500,000 RCE really not worth it?Back in April it was revealed that a Zoom RCE 0-day went for sale for $500,000. This raised plenty of eyebrows in the Info-sec community as to whether the price was justified or not. Many believed the price was absurd and that there is no way in the world that…Zoom4 min readZoom4 min read
Apr 30, 2020The chronicles of Fortinet’s CVE-2020–9294On April 20 I discovered a 0-day was being sold on a private Russian Cybercriminals forum. The 0-day, according to the actor selling it, was affecting all versions of Fortimail, granting the user ROOT access to any Fortimail server[1]: Of course, realizing the potential maliciousness of this exploit I…Fortinet4 min readFortinet4 min read
Apr 5, 2020Iran’s ban on Telegram that was intended to facilitate domestic spying backfiredby Under The Breach and Databreaches.net A recent report by Comparitech and Bob Diachenko concerning an exposed elasticsearch server with data scraped from a forked Telegram app was one of numerous leak reports during March. …Iran6 min readIran6 min read
Feb 28, 2020Confronting Fake NewsOn February 26, Under the Breach discovered that an Actor dumped the databases of 16 websites that left public S3 AWS buckets exposed to the internet, one of these sites is www.bgr.in, a huge Indian tech news site: We downloaded the database and discovered it is a MySql backup of…Fake News3 min readFake News3 min read
Feb 13, 2020How I found the hacker behind a 850,000 computers botnetBack in August 2019 Avast anti-virus released a technical write-up about a malicious worm named “Retadup” that infected a total of 850,000 computers, mainly in South America[1] The researchers from Avast were able to locate the C&C server, hack it on behalf of the French National Gendarmerie, and drain the…Hacker4 min readHacker4 min read
Feb 10, 2020Ulterior motives and influence operationsThis write-up will be a little shorter, it is just an anecdotal evidence that sometimes things in Cybercrime aren’t as they seem to be, often a lot more sinister. Earlier this week I noticed an actor was trying to sell access to three of the largest mobile companies in Iraq: …Cybercrime4 min readCybercrime4 min read
Feb 7, 2020Hey Russia, your data is leaking!The era of big data is upon us and it doesn’t seem like it is going away. This is evident in governments buying location data[1] : Large firms looking to capitalize on your information[2]:Russia5 min readRussia5 min read
Feb 3, 2020Genesis market 2020 overview, a bazaar for buying data out of compromised computers.So how did a group of individuals get their hands on 230,000 computers worldwide in the first place? Well we first have to understand how a mass virus spreading campaign works (if you’re already familiar with that, you can skip ahead). Granted, there are many ways one can use to…Hacker7 min readHacker7 min read
Jan 30, 2020Tracking Down REvil’s “Lalartu” by utilizing multiple OSINT methodsIn recent months we’ve seen a spike in companies having their servers breached and files encrypted. in order for the company to decrypt the files, hackers are demanding a payment, typically in Cryptocurrencies, for which in return they will give the key to open the files. A specific highly talented…Ransomware7 min readRansomware7 min read