❌

Normal view

Phishing Lures Utilizing a Single Google Cloud Storage Bucket

I have documented a campaign consisting of more 25 distinct phishing variants that all converge on a single Google Cloud Storage (GCS) infrastructure point.

Core Infrastructure:

  1. Primary Host: storage/.googleapis/.com
  2. Bucket/Object: /whilewait/comessuccess.html

Analysis Highlights:

Evasion Strategy: The campaign utilizes the inherent trust of the googleapis/.com domain to bypass SPF/DKIM-based reputation filters and secure email gateways (SEGs).

Lure Variance: Social engineering hooks include Scareware (Storage Full/Threat Detected), Retail Rewards (Lowe's/T-Mobile), and Lifestyle/Medical lures.

Redirect Logic: The comessuccess.html file serves as a centralized gatekeeper, redirecting traffic to secondary domains designed for Credit Card (CC) harvesting via fraudulent subscriptions.

submitted by /u/anuraggawande
[link] [comments]

Built a free live CVE intelligence dashboard β€” looking for feedback

Hey all,

I’ve been working on a live vulnerability intelligence dashboard that tracks trending CVEs, severity levels, and related social media activity in one place.

The goal was to make it easier to quickly see what’s gaining attention and what might actually matter, instead of scrolling through raw feeds.

Each CVE has its own page with:

  • Overview & description
  • CVSS score
  • Impact summary
  • References
  • Linked social media posts related to that CVE

It’s free to browse (no login required):

[https://leakycreds.com/vulnerability-intelligence](https://)

Would appreciate honest feedback β€” especially from folks who actively triage vulnerabilities.

What signals do you usually look at first?

What feature would you want to see here next?

submitted by /u/Intelligent_Emu_8075
[link] [comments]

How Journalists Are Reporting From Iran With No Internet

3 March 2026 at 09:30
After strikes killed senior Iranian officials, Iran cut off internet access. Journalists are relying on satellite links, encrypted apps, and smuggled footage to report from inside the country.

Attacks on GPS Spike Amid US and Israeli War on Iran

2 March 2026 at 18:34
New analysis shows that attacks on satellite navigation systems have impacted some 1,100 ships in the Middle East since the US and Israel attacked Iran on February 28.

Google and Cloudflare testing Merkel Tree Certificates instead of normal signatures for TLS

For those that don't know, during the TLS handshake, the server sends its certificate chain so the client can verify they're talking to who they think they are. When we move to Post Quantum-safe signatures for these certificates, they get huge and will cause the handshake to get really big. The PLANTS group at the IETF is working on a method to avoid this, and Merkle Tree Certificates are currently the way they're going.

Google and Cloudflare are going to start testing this (with proper safeguards in place) for traffic using Chrome and talking to certain sites hosted on Cloudflare. Announcements and explanations of MTC:

https://blog.cloudflare.com/bootstrap-mtc/

https://security.googleblog.com/2026/02/cultivating-robust-and-efficient.html

It might be a good time to test your TLS intercepting firewalls and proxies to make sure this doesn't break things for the time being. It's early days and a great time to get ahead of any problems.

submitted by /u/Shu_asha
[link] [comments]

Weekly Update 493

2 March 2026 at 07:51
Weekly Update 493

The Odido breach leaks were towards the beginning during this week's update. I recorded it the day after the second dump of data had hit, with a third dump coming a few hours later, and a final dump of everything the day after that. From what I hear, it dominated the news in the Netherlands, and we sure saw that through the traffic stats. Clearly, the leak cadence was designed for maximum news impact, and it seems to have achieved that. It may not have put any cash in the extortionist's pockets, but it's set a very visible precedent and, I suspect, put a massive law enforcement target on them. It's hard to image leaks of this impact continuing for much longer...

Weekly Update 493
Weekly Update 493
Weekly Update 493
Weekly Update 493

r/netsec monthly discussion & tool thread

Questions regarding netsec and discussion related directly to netsec are welcome here, as is sharing tool links.

Rules & Guidelines

  • Always maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.
  • Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.
  • If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.
  • Avoid use of memes. If you have something to say, say it with real words.
  • All discussions and questions should directly relate to netsec.
  • No tech support is to be requested or provided on r/netsec.

As always, the content & discussion guidelines should also be observed on r/netsec.

Feedback

Feedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.

submitted by /u/albinowax
[link] [comments]

Hacked Prayer App Sends β€˜Surrender’ Messages to Iranians Amid Israeli and US Strikes

28 February 2026 at 15:58
As Israeli airstrikes hit Tehran this morning, Iranians received mysterious push notifications saying that β€œhelp is on the way,” promising amnesty if they surrender.

The Forgotten Bug: How a Node.js Core Design Flaw Enables HTTP Request Splitting

Deep dive into a TOCTOU vulnerability in Node.js's ClientRequest.path that bypasses CRLF validation and enables Header Injection and HTTP Request Splitting across 7+ major HTTP libraries totaling 160M+ weekly downloads

submitted by /u/r3verii
[link] [comments]

New Malware - Moonrise Analysis

I recently analysed a new emerging RAT named Moonrise.

Moonrise is a Golang binary that appears to be a remote-control malware tool that lets the attacker keep a live connection to an infected Windows host, send commands, collect information, and return results in real-time.

My analysis also suggest surveillance-related features such as keylogging, clipboard monitoring, crypto focused data handling.

At the time of the analysis, this was fully undetected by all and any AV solutions.

submitted by /u/Deciqher_
[link] [comments]

Reverse CAPTCHA: Evaluating LLM Susceptibility to Invisible Unicode Instruction Injection

Tested 5 LLMs (GPT-5.2, GPT-4o-mini, Claude Opus/Sonnet/Haiku) against invisible instructions encoded in zero-width characters and Unicode Tags, hidden inside normal trivia questions.

The practical takeaway for anyone building on LLM APIs: tool access transforms invisible Unicode from an ignorable artifact into a decoded instruction channel. Models with code execution can write scripts to extract and follow hidden payloads.

Other findings:

  • OpenAI and Anthropic models are vulnerable to different encoding schemes β€” attackers need to fingerprint the target model
  • Without explicit decoding hints, compliance is near-zero β€” but a single line like "check for hidden Unicode" is enough to trigger extraction
  • Standard Unicode normalization (NFC/NFKC) does not strip these characters

Defense: strip characters in U+200B-200F, U+2060-2064, and U+E0000-E007F ranges at the input boundary. Be careful with zero-width joiners (U+200D) which are required for emoji rendering.

Code + data: https://github.com/canonicalmg/reverse-captcha-eval

Writeup: https://moltwire.com/research/reverse-captcha-zw-steganography

submitted by /u/thecanonicalmg
[link] [comments]
❌