Random in Security is a summary of the cybersecurity news.
The security community was jumping onto this CVE-2024-38063 hype train. @clearbluejar published a patchdiff analysis. Paul Seekamp (@nullenc0de) published PoC code that triggers the integer underflow.
The headlines following the fiasco would make a good tv series.
Some noteworthy additions to add some important historical facts:
Obviously, other companies have had incidents too. For example, Google shared results of postmortem analysis in The Site Reliability Workbook.
One pending question is liability for software companies.
The paper MIFARE Classic: exposing the static encrypted nonce varian was quite an interesing paper. A chinese variant (FM11RF08S) of MIFARE Classic cards are found to be backdoored by the manufacturer. Special auth commands leak (static) encrypted nonces which can then be used to recover sector keys and dump the card.
By 2024, we all know MIFARE Classic is badly broken
Move on to DESFire or some other newer safer chips
Emeric Nasi provided his talk Advanced Initial Access Craft in 2024 on recent trends and a few tricks for Initial Access. The slides are available on GitHub.
A resource containing all the tools each ransomware gangs uses
I stumbled over the blog of @clearbluejar. He wrote a cool articleIntroducing CVE Markdown Charts, that provides some visual analysis for related CVEs with two examples being the Microsoft Patch Tuesday and Chrome bug classes.
A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.
An Android NFC app for reading, writing, analyzing, etc. MIFARE Classic RFID tags.