Attacks & Vulnerabilities | ChatGPT Operator Prompt Injection Exploit Leaking Private Data (2 minute read) ChatGPT Operator is an advanced AI agent equipped with web browsing and reasoning capabilities that can interact with websites on behalf of users. It is vulnerable to Prompt Injection attacks via instructions embedded into text or web content that can cause the model to browse sensitive pages and leak the information to attacker-controlled websites. OpenAI has implemented defenses such as prompting the user for confirmation, but researchers have shown that these mitigations can be bypassed. | Malicious Chrome Extensions Can Spoof Password Managers in New Attack (2 minute read) Researchers at SquareX Labs developed a new "polymorphic" attack allowing malicious Chrome extensions to steal sensitive data. Once a user is tricked into installing the extension, it scans for password managers, impersonates them, and prompts users to reauthenticate, sending the information to attackers. SquareX Labs has urged Google to restrict extensions' ability to alter their appearance or behavior, but no mitigations currently exist for this attack. | | Zen and the Art of Microcode Hacking (13 minute read) This post details the concepts and tools behind EntrySign, the AMD Zen microcode signature validation vulnerability disclosed last month. It delves into microcode fundamentals, AMD's anti-tampering measures, and the specific vulnerability involving the CMAC hash function. It also announces the release of the Zentool suite, which consists of tools for microcode patch examination, including limited disassembly, microcode patch authoring using a limited amount of reverse-engineered assembly, microcode patch signing, and microcode patch loading. | Four Ways to Grant Cross-Account Access in AWS (4 minute read) Grant access to a specific IAM role using the Principal element of the resource-based policy, an AWS account using the Principal element, a particular IAM role in an account using the AWS:PrincipalArn condition, and an entire AWS organization using the AWS:PrincipalOrgId condition. This post includes an example scenario with an S3 bucket and discusses tradeoffs associated with each method. | Auto-Color: An Emerging and Evasive Linux Backdoor (11 minute read) Palo Alto's Unit 42 is monitoring a new malware known as Auto-Color. Upon startup, if the malware is not named Auto-Color, it will try to install a malware implant that imitates libcext.so. It also copies itself to /var/log/cross/auto-color and adds this library to ld.preload. Besides its command and control capabilities, the harmful library implant uses custom encryption and strives to conceal network communications by hooking into libc's open function. | | Aryon Security (Product Launch) Aryon scans the cloud application and infrastructure for security issues or policy violations before deployment. If any issues are detected, the platform alerts the developers with suggestions for resolving the problem. | copa (GitHub Repo) copa is a CLI tool written in Go and based on buildkit that can be used to directly patch container images given the vulnerability scanning results from popular tools like Trivy. | CaptainCredz (GitHub Repo) CaptainCredz is a modular password-spraying tool with a cache mechanism and fine-grained timing control. | | | Love TLDR? Tell your friends and get rewards! | | Share your referral link below with friends to get free TLDR swag! | | | | Track your referrals here. | | Want to advertise in TLDR? π° If your company is interested in reaching an audience of cybersecurity professionals and decision makers, you may want to advertise with us. Want to work at TLDR? πΌ Apply here or send a friend's resume to jobs@tldr.tech and get $1k if we hire them! If you have any comments or feedback, just respond to this email! Thanks for reading, Prasanna Gautam, Eric Fernandez & Sammy Tbeile | | | |
0 Comments