Aggregator
勒索软件编年史:从特洛伊到AI多重勒索
勒索软件编年史:从特洛伊到AI多重勒索
年度计划完不成,可能是好事
Pwn2Own Automotive 2025 - Day One Results
Pwn2Own Automotive 2025 - Day One Results
Welcome to the first day of Pwn2Own Automotive 2025. We have 18 entries to go through today, and we will be updating the results here as we have them.
SUCCESS - The team from PCAutomotive used a stack-based buffer overflow to gain code execution on the Alpine IVI. They earn $20,000 and two Master of Pwn points.
SUCCESS - The team from Viettel Cyber Security used an OS command injection bug to exploit the Kenwood IVI for code execution. They win $20,000 and 2 Master of Pwn points.
SUCCESS - Cong Thanh (@ExLuck99) and Nam Dung (@greengrass19000) of ANHTUD used an integer overflow to gain code execution on the Sony XAV-AX8500. The earn themselves $20,000 and 2 Master of Pwn points.
SUCCESS/COLLISION - Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) used a 3 bug combo to exploit the Phoenix Contact CHARX SEC-3150, but one was publicly known. He still earns $41,750 and 4.25 Master of Pwn points.
SUCCESS/COLLISION - It took a while for us to confirm, but confirm we did! The team from Synacktiv used a stack-based buffer overflow plus a known bug in OCPP to exploit the ChargePoint with signal manipulation through the connector. They earn $47,500 and 4.75 Master of Pwn points.
SUCCESS - The PHP Hooligans used a heap-based buffer overflow to exploit the Autel charger. They earn $50,000 and 5 Master of Pwn points.
SUCCESS - The team from GMO Cybersecurity by Ierae, Inc. used a stack-based buffer overflow to to confirm their second round exploit of the Kenwood IVI. They earn $10,000 and 2 Master of Pwn points.
SUCCESS - The Viettel Cyber Security (@vcslab) team used a stack-based buffer overflow to exploit the Alpine IVI. This second round win earns the $10,000 and 2 Master of Pwn points.
SUCCESS - Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) proves he's never going to give us up or let us down by using a hard-coded cryptographic key bug in the Ubiquiti charger. He earns himself $50,000 and 5 Master of Pwn points - putting him in the early lead.
SUCCESS - It may have take 3 attempts, but it's confirmed! Thanh Do (@nyanctl) of Team Confused used a heap-based buffer overflow to exploit the Sony IVI. His round 2 win nets him $10,000 and 2 Master of Pwn points.
SUCCESS - After accessing an open port via power drill, Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of fuzzware.io leveraged a stack-based buffer overflow on the Autel MaxiCharger. Their second round win nets them $25,000 and 5 Master of Pwn points.
COLLISION - Well that's awkward. SK Shieldus (@EQSTLab) used a OS command injection bug, but it was one demonstrated in last year's contest. Alpine chose not to patch it since "in accordance with ISO21434...the vulnerability is classified as 'Sharing the Risk'." Yikes. The SK Shieldus team earns $5,000 and 1 Master of Pwn point. Check out ZDI-24-846 for details on the original bug report.
FAILURE - Unfortunately, Sina Kheirkhah (@SinSinology) could not get his exploit of the Sony IVI working within the time allotted. He still ends Day One of #Pwn2Own Automotive with $91,750 and 9.25 Master of Pwn points.
SUCCESS - The Synacktiv (@Synacktiv) team used an OS command injection bug to exploit the Kenwood DMX958XR and play a video of the original Doom game. Their second round win earns them $10,000 and 2 Master of Pwn points.
SUCCESS/COLLISION - Rob Blakely and Andres Campuzano of the Technical Debt Collectors used multiple bugs to exploit Automotive Grade Linux, but one of the bugs was previously known. They still earn $33,500 and 3.5 Master of Pwn points in the 1st PwnOwn attempt.
SUCCESS - In our first Pwn2Own After Dark submission, Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of fuzzware.io leveraged an origin validation error bug to exploit the Phoenix Contact CHARX SEC-3150. The round 2 win earns them $25,000 and 5 Master of Pwn points.
FAILURE - Unfortunately, Riccardo Mori of Quarkslab (@quarkslab) could not get his exploit of the Autel MaxiCharger AC Wallbox Commercial working within the time allotted.
COLLISION - Bongeun Koo (@kiddo_pwn) of STEALIEN also used the bug exploited in the Alpine last year. He earns $5,000 and 1 Master of Pwn point - plus lots of style points for the Nyan Cat display.
That wraps up Day 1 of #Pwn2Own Automotive 2025! In total, we awarded $382,750 for 16 unique 0-days. The team of Tobias Scharnowski (@ScepticCtf), Felix Buchmann (@diff_fusion), and Kristian Covic (@SeTcbPrivilege) of fuzzware.io is current in the lead for Master of Pwn, but Sina Kheirkhah (@SinSinology) is right on their heels. Stay tuned tomorrow for more results and surprises. #P2OAuto
辞暮尔尔,烟火年年 | 补天平台春节放假通知
辞暮尔尔,烟火年年 | 补天平台春节放假通知
7-Zip 修复绕过 Windows MoTW 安全警告的漏洞,应立即升级到24.09版
7-Zip 修复绕过 Windows MoTW 安全警告的漏洞,应立即升级到24.09版
微软终于要改账户登录:自2月份起除非用户退出否则微软账户将保持登录状态
2024年度网络安全政策法规一览
乌克兰计算机应急响应小组警告:假冒 AnyDesk 请求的网络诈骗
乌克兰计算机应急响应小组警告:假冒 AnyDesk 请求的网络诈骗
Check Point 公司发布《2025 年安全报告》显示,随着网络威胁生态系统日渐成熟,网络攻击次数骤增 44%
2025年1月 – 网络安全解决方案先驱者和全球领导者 Check Point 软件技术有限公司(纳斯达克股票代码:CHKP)今日发布了其年度报告《2025 年全球网络安全现状》,揭示全球网络攻击次数同比骤增 44%。该报告不仅揭示了新的网络趋势和新型攻击手段,而且还为首席信息安全官提供了如何应对这一持续变化形势的实用指南。
Check Point 软件技术公司研究副总裁 Maya Horowitz 表示:“2025 年的网络安全防护不仅仅要保护网络,还要维护用户对我们的系统和企业的信任。《2025 年全球网络安全现状》报告揭示了威胁的快速演变,并强调了在面对持续存在的复杂攻击时确保弹性的必要性。”
2024 年,生成式人工智能 (GenAI) 在网络攻击中的作用日益凸显。攻击者使用 GenAI 来加速网络攻击、窃取钱财和左右公众舆论,从散布虚假信息到制作深度伪造视频,无恶不作。与此同时,信息窃取程序攻击激增 58%,这表明网络生态系统日渐成熟。此外,随着攻击者越来越多地通过自带设备 (BYOD) 环境入侵企业资源,个人设备在受感染设备中占比超过 70%。
2025 年报告的主要调查结果包括:
● 勒索软件不断演变:数据泄露和勒索超过基于加密的攻击成为了主要的勒索软件攻击方式,此类攻击不仅易于实施,还最大限度地提高了非法所得。医疗行业成为了第二大攻击目标,所遇攻击次数同比增长 47%。
● 边缘设备屡遭利用:受感染的路由器、VPN 及其他边缘设备是攻击者的关键切入点。超过 200,000 台设备已被 Raptor Train 等超大型攻击者运营的高级僵尸网络控制。
● 已发现的漏洞被视而不见:2024 年,96% 的漏洞利用攻击利用了去年披露的漏洞,这凸显了主动管理补丁的重要性。
● 目标行业:教育行业连续第五年成为了首要攻击目标,所遇攻击次数同比增长 75%。
给首席信息安全官的建议:
1. 增强自带设备安全防护:实施严格策略并部署端点保护,以降低访问企业资源的个人设备带来的安全风险。
2. 投资威胁情报:利用 AI 工具来监控并防范虚假信息攻击和新兴威胁。
3. 加强补丁管理:主动解决已知漏洞,以降低遭受大范围漏洞利用攻击的可能性。
4. 确保边缘设备安全:针对路由器、VPN 及物联网设备实施强有力的安全防护措施,防止其成为攻击的“中转站”。
5. 提升应变能力:制定全面的事件响应计划并实施持续监控,以随时应对持续的威胁。