❌

Normal view

Received yesterday β€” 10 April 2026 ⏭ /r/netsec - Information Security News & Discussion

Taiwanese Prosecutors Seize $6.6M in Assets from Incognito Market Admin "Pharoah" (Lin Rui-siang)

Taiwanese authorities have seized over NT$200 million ($6.67 million USD) in real estate and bank savings from 24-year-old Lin Rui-siang, the alleged mastermind behind the Incognito Market.

Lin, who operated under the alias "Pharoah," was arrested by the FBI at JFK Airport in May 2024 while in transit from Saint Lucia to Singapore. The seizure follows his December 2024 guilty plea in a U.S. court for narcotics conspiracy, money laundering, and selling adulterated medication.

submitted by /u/Siraph74
[link] [comments]

Static analysis of iOS App Store binaries: common vulnerabilities I keep finding after 15 years in mobile security

I've been doing iOS security assessments professionally for about 15 years β€” banking apps, fintech, enterprise platforms. Over that time, certain patterns keep showing up in production App Store binaries. Figured it's worth sharing what I see most frequently, since many iOS developers seem genuinely unaware these issues exist.

What keeps showing up:

The most common finding is hardcoded secrets in the binary β€” API keys, backend URLs, authentication tokens sitting right there in plaintext strings. Developers assume compilation somehow obscures these. It doesn't. Extracting them is trivial with standard tooling.

Insecure local data storage is a close second. UserDefaults for sensitive data, unprotected Core Data databases, plist files with session tokens. On a jailbroken device (or via backup extraction on a non-jailbroken one), all of this is readable.

Weak or misconfigured encryption comes third. I regularly find apps that import CryptoKit or CommonCrypto but use ECB mode, hardcoded IVs, or derive keys from predictable inputs. The encryption is technically present but functionally useless.

Then there's the network layer: disabled ATS exceptions, certificate pinning that's implemented but trivially bypassable, and HTTP endpoints mixed with HTTPS.

Methodology:

Most of this comes from static analysis β€” no runtime instrumentation needed. Download the IPA, unpack, run string extraction, inspect the Mach-O binary, check plist configurations, review embedded frameworks. You'd be surprised how much is visible before you even launch the app.

I've built custom tooling for this over the years that automates the initial triage across ~47 check categories. Happy to discuss methodology or specific techniques in comments.

I've also been running a monthly live session ("iOS App Autopsy") where I walk through this process on real apps β€” follow the link if interested.

submitted by /u/kovallux
[link] [comments]
Received β€” 9 April 2026 ⏭ /r/netsec - Information Security News & Discussion

The NaClCON (Salt Con) speaker list is out! May 31–June 2, Carolina Beach NC

For those who don't know: NaClCON is a new, intentionally small (300 person cap) conference focused on hacker history and culture, not zero-days or AI hype. Beach venue, open bars, CTF, the whole deal. $495 all-in.

The speaker list is a who's-who of people who built the scene:

Speakers:

  • Lee Felsenstein β€” Homebrew Computer Club OG, designer of the Osborne 1 (the first mass-produced portable computer)
  • Chris Wysopal (Weld Pond) β€” L0pht Heavy Industries, testified before the Senate in 1998 that they could take down the internet in 30 minutes, co-founder of Veracode
  • G. Mark Hardy β€” 40+ years in cybersecurity, talking "A Hacker Looks at 50"
  • Richard Thieme β€” Author/speaker who's keynoted DEF CON 27 times, covering the human impacts of tech since the early internet days
  • Brian Harden (noid) β€” Helped build the LA 2600 scene, DC206, and DEF CON itself. Now farms and writes about himself in third person
  • Izaac Falken β€” 2600 Magazine / Off The Hook, 30 years in professional security
  • Mei Danowski β€” Natto Thoughts, speaking on ancient Chinese strategy and the birth of China's early hacker culture
  • Josh Corman β€” "I Am The Cavalry" founder, CISA COVID task force, currently working on UnDisruptable27
  • Casey John Ellis β€” Bugcrowd founder, co-founder of disclose.io, White House, DoD, and DHS security advisor
  • Jericho β€” 33+ years in the scene, speaking on life in an early 90s hacker group
  • Andrew Brandt β€” Threat researcher (Sophos, Symantec), demoing early hacking tools on obsolete hardware
  • Johnny Shaieb: IBM X-Force Red, speaking on the history of vulnerability databases
  • B.K. DeLong (McIntyre) β€” Attrition.org, the team that manually archived 15,000+ web defacements in the late 90s
  • Jamie Arlen β€” 30+ years, Securosis, Liquidmatrix; "an epic career of doing all the wrong things and somehow still being right"
  • Heidi and Bruce Potter β€” Developers of Turngate and founders of ShmoonCon
  • Dustin Heywood (EvilMog) β€” IBM X-Force, Team Hashcat, multi-time Hacker Jeopardy World Champion

Fireside chats include noid doing DEF CON war stories and Edison Carter on old-school phone phreaking in the 80s/90s and a grog filled night with the dread pirate Hackbeer'd.

A couple things worth knowing before you register:

The conference hotel (Courtyard by Marriott Carolina Beach Oceanfront) has a room block at $139/night (roughly 70% off the peak beach-season rates) so book through naclcon.com/hotel or use group code NACC. Block expires May 1st so don't sit on it.

P.S. If the tickets are too large a hurtle for you, DM me and I'll see what I can do to get you a discount code.

naclcon.com | Register

submitted by /u/count_zero_moustafa
[link] [comments]

Threat Model Discrepancy: Google Password Manager leaks cleartext passwords via Task Switcher (Won't Fix) - Violates German BSI Standards

Hi everyone, I’m a Cybersecurity student at HFU in Germany and recently submitted a vulnerability to the Google VRP regarding the Google Password Manager on Android (tested on Pixel 8, Android 16).

The Issue: When you view a cleartext password in the app and minimize it, the app fails to apply FLAG_SECURE or blur the background. When opening the "Recent Apps" (Task Switcher), the cleartext password is fully visible in the preview, even though the app actively overlays a "Enter your screen lock" biometric prompt in the foreground. It basically renders its own secondary biometric lock completely useless.

Google's Response: Google closed the report as Won't Fix (Intended Behavior). Their threat model assumes that if an attacker has physical access to an unlocked device, it's game over.

The BSI Discrepancy: What makes this interesting is that the German Federal Office for Information Security (BSI) recently published a study on Password Managers. In their Threat Model A02 ("Attacker has temporary access to the unlocked device"), they explicitly mandate that sensitive content MUST be protected from background snapshots/screenshots. So while Google says this is intended, national security guidelines classify this as a vulnerability. (For comparison: The iOS built-in password manager instantly blurs the screen when losing focus).

Here is my PoC screenshot:
https://drive.google.com/file/d/1PTGKRpyFj_jY9S76Jlo62mSCDJ3c6uLO/view?usp=sharing
https://drive.google.com/file/d/1nIJMQbM4R17EMt9f1Ffb4UmCPYY7-GXb/view?usp=sharing

What are your thoughts on this? Should password managers protect against shoulder surfing via the Task Switcher, or is Google right to rely solely on the OS lockscreen?

submitted by /u/Onat120
[link] [comments]

dnsight - open source, config driven CLI DNS auditor

Hi everybody,

I have built an open source CLI tool to help conduct DNS related audits. Let me explain the rationale and the roadmap.

So I have worked in DevSecOps for the past few years and at 3 different companies I have built som variation of this to handle issues raised by SOC tools and to help to do basic black box pentesting. After doing it the 3rd time I decided I should take a stab at open source and build it properly myself.

What it offers is CAA, DMARC, DKIM, SPF, MX, DNSSEC and some header audits (basic ones like HSTS and CSP). Output can be done via rich terminal, JSON, Markdown and SARIF and baked into it is an β€œsdk” layer which would allow you to develop internal tools on top whilst getting access to the fully typed Python objects.

The next step is honestly inspired by a BS scare tactic email sent to the non-technical CEO and founder of a start up I was at where the sales person made false claims about the posture of our DMARC in order to trick the CEO into a sales call. Personally, I’m quite passionate about security and I believe in a world of cat-and-mouse security (where the cats are the hackers / exploiters), tools that help with basic security should be free. This leads us to the next phase, a dockerised app to conduct the audits based on your configuration at regular intervals with alerting through the appropriate channels.

I would appreciate anybody who took a look, gave it a go and provided any feedback (or anybody who wants to help contribute!). This is my first go at open source and building a tool like this so really any feedback is appreciated. Docs can additionally be found at https://dnsight.github.io/dnsight/

submitted by /u/MikeyS91
[link] [comments]
Received β€” 8 April 2026 ⏭ /r/netsec - Information Security News & Discussion

Broken by Default: I formally proved that LLM-generated C/C++ code is broken by default β€” 55.8% vulnerable, 97.8% invisible to existing tools

I spent the last few months running Z3 SMT formal verification against 3,500 code artifacts generated by GPT-4o, Claude, Gemini, Llama, and Mistral.

β–Ž Results:

β–Ž - 55.8% contain at least one proven vulnerability

β–Ž - 1,055 findings with concrete exploitation witnesses

β–Ž - GPT-4o worst at 62.4% β€” no model scores below 48%

β–Ž - 6 industry tools combined (CodeQL, Semgrep, Cppcheck...) miss 97.8%

β–Ž - Models catch their own bugs 78.7% in review β€” but generate them anyway

β–Ž Paper: https://arxiv.org/html/2604.05292v1

β–Ž GitHub: https://github.com/dom-omg/broken-by-default

submitted by /u/Hot_Dream_4005
[link] [comments]

Brandefense Q4 2025 Ransomware Trends Report β€” 2,373 incidents, 125 groups, CVE exploitation breakdown

Hi r/netsec community,

Q4 2025 data, monitoring dark web leak sites and criminal forums
throughout October–December 2025.

Numbers:
- 2,373 confirmed victims
- 125 active ransomware groups
- 134 countries, 27 industries

Group highlights:
- Qilin peaked at 481 attacks in Q4, up from 113 in Q1
- Cl0p skipped encryption entirely in most campaigns β€” pure data theft + extortion via Oracle EBS and Cleo zero-days
- 46.3% of activity attributed to smaller/unnamed groups β€” RaaS commoditization is real

CVEs exploited this quarter (with group attribution):

RCE:
- CVE-2025-10035 (Fortra GoAnywhere MFT) β€” Medusa
- CVE-2025-55182 (React Server Components) β€” Weaxor
- CVE-2025-61882 (Oracle E-Business Suite) β€” Cl0p
- CVE-2024-21762 (Fortinet FortiOS SSL VPN) β€” Qilin

Privilege Escalation:
- CVE-2025-29824 (Windows CLFS driver β†’ SYSTEM) β€” Play

Auth Bypass:
- CVE-2025-61884 (Oracle E-Business Suite) β€” Cl0p
- CVE-2025-31324 (SAP NetWeaver, CVSS 10.0) β€” BianLian, RansomExx

Notable: DragonForce announced a white-label "cartel" model through underground forums. Operations linked to Scattered Spider suggest staged attack chains β€” initial access and ransomware deployment split between separate actors.

Full report
brandefense.io/reports/ransomware-trends-report-q4-2025/

submitted by /u/brandefense
[link] [comments]

Training for Device Code Phishing

With the news of Hundreds of orgs being compromised daily, I saw a really cool red team tool that trains for this exact scenario. Have you guys used this new white hat tool? Thinking about ditching KB4 and even using this for our red teams for access.

submitted by /u/redwheel82
[link] [comments]
❌