17 December 2024

Mandiant Demonstrats a Unique QR Code Technique to Bypass Browser Isolation Defenses


Cybersecurity firm Mandiant has unveiled a groundbreaking discovery that demonstrates how threat actors could potentially bypass browser isolation technologies using QR codes as a covert command-and-control (C2) communication channel. The research, disclosed on December 8, 2024, raises significant concerns about the effectiveness of current browser isolation security measures.

The novel technique, developed by Mandiant's Red Team, leverages machine-readable QR codes embedded within web pages to establish unauthorized communication channels. This method proves effective against all major types of browser isolation solutions, including remote, on-premises, and local implementations, potentially compromising organizations' security infrastructure.

"The discovery highlights a critical weakness in what many organizations consider a robust security measure," explained a senior researcher at Mandiant. "By utilizing QR codes as a transmission medium, attackers can effectively circumvent traditional browser isolation protections that are designed to separate user browsing activity from the corporate network."

The proof-of-concept implementation demonstrated by Mandiant researchers utilizes Google Chrome in headless mode, integrated with Cobalt Strike's External C2 feature. The malicious implant operates by rendering web pages in a headless browser, capturing screenshots of embedded QR codes, and subsequently decoding them to extract command data.


However, the technique does come with notable limitations. The researchers found that the QR code-based C2 method is constrained by a maximum data capacity of 2,189 bytes, primarily due to streaming quality issues. Additionally, the communication process experiences significant latency, with each request taking approximately five seconds to complete, making high-throughput operations like SOCKS proxying impractical.

"While the current implementation may not be optimal for large-scale data exfiltration, it proves the concept that browser isolation can be circumvented through creative means," stated a Mandiant Research Team. "This should serve as a wake-up call for organizations relying solely on browser isolation as their primary defense mechanism.

"In response to these findings, Mandiant has issued several recommendations for organizations to strengthen their security posture. These include implementing comprehensive traffic inspection mechanisms to detect anomalous patterns indicative of QR code-based C2 activity, conducting regular domain reputation checks, and deploying advanced URL scanning solutions.

Security experts emphasize the importance of adopting a multi-layered "defense in depth" strategy rather than depending on a single security solution. "Organizations need to understand that no single security measure is foolproof," noted a cybersecurity analyst familiar with the research. "This discovery reinforces the need for comprehensive security strategies that combine multiple protective layers."

The revelation has prompted increased attention from the cybersecurity community, with several organizations already beginning to evaluate their browser isolation implementations in light of this new threat vector. Security vendors are also expected to develop countermeasures to detect and prevent such QR code-based bypass attempts.

As organizations continue to rely on browser isolation technologies as part of their security infrastructure, Mandiant's discovery serves as a crucial reminder of the ever-evolving nature of cyber threats and the importance of maintaining robust, multi-layered security defenses.

Found this article interesting? Keep visit thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

Source:thesecmaster.com

See also other articles on QR Codes:

http://web.archive.org/web/20201126001729/https://www.cyber.gov.au/acsc/view-all-content/publications/quick-response-codes-covid-19-environment

16 December 2024

Final report into CV - Australia (deliberately) failed the people - GOOGLE REMOVED THIS POST


We live in a fascist on-line world, where there is an attack on privacy and also 'free speech'.

Corporations that are in the top tier of surveillance, that being the 5Eyes, stringently moderate people's posts, just like they do in China.

An article that was published on the 13th of December 2024, was removed by Google, citing a violation of so called 'Community Standards'.

Was there a violation of 'Community Standards'?  

Can Google respond with which section was 'violated'?

The article contained government and mainstream media information, which was collated into one area.

YOU be the judge.

These are screen captures of the removed article:




These are the links that were within the post:

Australian health businesses advertising health information from global corporations?

 https://oversight.house.gov/wp-content/uploads/2024/12/12.04.2024-SSCP-FINAL-REPORT.pdf

https://corpau.blogspot.com/2020/07/covid-test-useless-faith-in-quick-test.html

https://constitutionwatch.com.au/the-covid-19-injections-do-not-confer-immunity-and-therefore-do-not-meet-the-definition-of-a-vaccine/

 

15 December 2024

Aussie telcos warned of China-backed phone hacking - Salt Typhoon

Urged to up security after 'Salt Typhoon' hackers breach providers worldwide.


Australia has issued a joint warning with its international partners as the United States accuses China-backed hacking group Salt Typhoon of targeting telecommunications networks in dozens of countries and recording phone conversations of American political figures.

The advisory was issued on Wednesday by cyber defence watchdog the Australian Signals Directorate (ASD) and its Australian Cyber Security Centre (ACSC), alongside security agency counterparts from the US, Canada, and New Zealand.

The notice urged telecommunications companies to increase their network security in the wake of some US residents having their phone conversations, text messages, or related call and text records accessed.

For many people, this allegedly included metadata being stolen — which can include information on the dates, times, locations, and recipients of calls and text messages.

"We believe a large number of Americans' metadata was taken," a US official told local journalists on the condition of anonymity, as Reuters reported.

"We do not believe it's every cell phone in the country, but we believe it's potentially a large number of individuals that the Chinese government was focused on."

At least eight US telecommunications providers have been affected by the cyber espionage campaign, and hackers were likely to maintain some access to US networks, according to the White House.

The wide-ranging incursion came to light earlier this year, and while the threat has remained since, the true extent to which Salt Typhoon hackers still had access to critical networks around the world remained unclear.

The Australian government has not confirmed whether Australian telecommunication networks have been breached.

US senator Mark Warner, chairman of the country’s senate intelligence committee, told The Washington Post in November that the attacks were the "worst telecom hack in our nation's history — by far".

Chinese officials have denied responsibility and have previously described allegations of state-based hacking as disinformation, or false narratives.


Australian organisations urged to boost cyber security

Telcos and organisations working to defend communications infrastructure in Australia should “strengthen their visibility and harden devices against [People’s Republic of China]-affiliated and other malicious cyber actors”, ASD said in a statement.

“Our US partners have observed these actors compromising networks of major global telecommunications providers.

“Actors have focused on large US internet backbone routers, such as provider edge and customer edge routers.

“The compromises and malicious activity target exposed and vulnerable services, unpatched devices, and under-secured environments.”

ASD said it encouraged Australian organisations to maintain "high visibility” networks so that cyber defenders had “detailed insight into network traffic, user activity, and data flow” to help them detect potential threats.

The Australian government has accused China of being behind numerous cyber attacks and related security incidents in recent years.

In September, authorities said around 2,400 devices in Australia had been compromised by a China-backed cyber crime group.

In July, the Australian government blamed a series of cyber attacks on the Chinese government and a state-sponsored group known as APT40.

'Very senior’ US figures allegedly had calls hacked

Telephone calls involving “very senior” US political figures had been targeted and recorded by Salt Typhoon hackers this year, the White House alleged on Saturday.

Anne Neuberger, the US deputy national security advisor for cyber and emerging technology, said while the metadata of a large number of Americans had likely been stolen, officials believed “the purpose of the operation was more focused”.

"We believe ... the actual number of calls that they took, recorded and took, was really more focused on very senior political individuals," she said, as Reuters reported.

Neuberger did not reveal the names of anyone who was targeted, but said the US was “still investigating the scope and scale” of the hacking campaign.

The New York Times reported in October that phones used by then-presidential candidate Donald Trump, members of Trump's family, members of president Joe Biden’s administration, and officials at the US State Department had been targeted by China-linked hackers.

Asked about US reports of potential telecommunications attacks on 28 October, a spokesperson for China’s Ministry of Foreign Affairs, Lin Jian, said, “China urges the US to stop various types of irresponsible moves to blame the victim, stop cyberattacks globally, and stop using cyber security issues to vilify China.”

Neuberger said on Saturday that Biden had been briefed on the US government’s latest findings and the White House "has made it a priority for the federal government to do everything it can to get to the bottom of this".

US government officials reportedly told NBC News that citizens could use encrypted messaging apps — the likes of which include Facebook Messenger, Signal, WhatsApp, and Telegram — to minimise the chance of their communications being intercepted.

A US senate commerce subcommittee hearing is expected to discuss the Salt Typhoon hacking on 11 December, local time.

Source: acsinformationage