deutrino
deutrino boosted

Several people were arrested during an undercover operation targeting child sex predators in Nevada. One of them is Tom Alexandrovich, who turns out to be the Executive Director of the Israel Cyber Directorate. The child predator was released.

I believe the security community must denounce this person and be banned from the conferences, including BlackHat and DefCon.

@fr0gger since, unfortunately, you are in the picture with this person (LinkedIn account of him was deleted already), and you have a good reputation within our community, would be super cool if you'd take a lead and get in touch with the BlackHat/DefCon organizers.

Link to news: https://www.msn.com/en-us/tv/news/israeli-official-arrested-in-nevada-child-sex-operation-is-released-and-back-in-israel/ar-AA1KCpah

#BlackHat#BHUSA#BlackHatUSA2025#Cybersecurity#ThreatIntelligence#DefCon#Israel#DEFCON33#TomAlexandrovich

This research by Marek Tóth presented at #DEFCON is good. The vulnerability he discusses is real.
However, exploiting it requires the attacker to compromise a website and add phantom workflows to it that the victim doesn't notice as suspicious. Not impossible, but also IMO not likely unless you visit shady websites frequently.
Personally, I do not think the likelihood is high enough to disrupt my existing workflows to protect against the attack.
#clickjacking #infosec
https://marektoth.com/blog/dom-based-extension-clickjacking/

Several people were arrested during an undercover operation targeting child sex predators in Nevada. One of them is Tom Alexandrovich, who turns out to be the Executive Director of the Israel Cyber Directorate. The child predator was released.

I believe the security community must denounce this person and be banned from the conferences, including BlackHat and DefCon.

@fr0gger since, unfortunately, you are in the picture with this person (LinkedIn account of him was deleted already), and you have a good reputation within our community, would be super cool if you'd take a lead and get in touch with the BlackHat/DefCon organizers.

Link to news: https://www.msn.com/en-us/tv/news/israeli-official-arrested-in-nevada-child-sex-operation-is-released-and-back-in-israel/ar-AA1KCpah

#BlackHat#BHUSA#BlackHatUSA2025#Cybersecurity#ThreatIntelligence#DefCon#Israel#DEFCON33#TomAlexandrovich

alcinnz
alcinnz boosted

Which brings me to part two, MeshMarauder.

An open source tool demonstrating proof-of-concept exploits against the DEFCON 33 Meshtastic firmware.

MeshMarauder will demostrate:

- Tracking user activity on any mesh regardless of encryption usage
- Hijack all meshtastic user profile metadata
- Change any users public key
- Send messages as any user in channel chats that appear authentic
- MITM direct messages

https://meshmarauder.net

#defcon #meshtastic #meshmarauder #cybersecurity

The scale of meshtastics avoidance of building security into the design is pretty epic.

It allows for the formation of an entire mesh just for MITMing it.

This ONE liner here in the PKI attack means that once a node gets poisoned the key we created is based on the MAC so -anyone- who knows your MAC can read your MITM'd traffic.

When attackers run mesh marauder against the DEFCON 33 firmware they are all working together. Anyone in range can read the MITM'd DMs.

https://github.com/datapartyjs/meshmarauder/blob/channel-chat/src/lorapipe-raw-packet.mjs#L191-L193

So when it's this easy to get a MITM going things like making posts in public chats as anyone you want feels kinda low key.

But I do hope that extended warranty works out, everyone seems pretty concerned about them.

#defcon #meshtastic #lora #cybersecurity

Which brings me to part two, MeshMarauder.

An open source tool demonstrating proof-of-concept exploits against the DEFCON 33 Meshtastic firmware.

MeshMarauder will demostrate:

- Tracking user activity on any mesh regardless of encryption usage
- Hijack all meshtastic user profile metadata
- Change any users public key
- Send messages as any user in channel chats that appear authentic
- MITM direct messages

https://meshmarauder.net

#defcon #meshtastic #meshmarauder #cybersecurity