<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news February 2023</title>
	<atom:link href="http://www.epanorama.net/blog/2023/01/31/cyber-security-news-february-2023/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2023/01/31/cyber-security-news-february-2023/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 19 Apr 2026 21:53:56 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/31/cyber-security-news-february-2023/comment-page-8/#comment-1796803</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Mar 2023 15:46:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193259#comment-1796803</guid>
		<description><![CDATA[https://hackaday.com/2023/02/17/this-week-in-security-usb-cable-kia-reddit-and-microsoft-rces/]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2023/02/17/this-week-in-security-usb-cable-kia-reddit-and-microsoft-rces/" rel="nofollow">https://hackaday.com/2023/02/17/this-week-in-security-usb-cable-kia-reddit-and-microsoft-rces/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/31/cyber-security-news-february-2023/comment-page-8/#comment-1796786</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Mar 2023 15:31:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193259#comment-1796786</guid>
		<description><![CDATA[https://hackaday.com/2023/02/24/answering-some-pico-balloon-questions/

When the US Air Force shot down some suspected Chinese spy balloons a couple of weeks ago, it was widely reported that one of the targets might have been a much more harmless amateur radio craft. The so-called pico balloon K9YO was a helium-inflated Mylar balloon carrying a tiny solar-powered WSPR beacon, and it abruptly disappeared in the same place and time in which the USAF claimed one of their targets. When we covered  the story it garnered a huge number of comments both for and against the balloonists, so perhaps it’s worth returning with the views of a high-altitude-ballooning expert.

https://www.daveakerman.com/?p=3137

So was an “pico balloon” shot down by an F22?

The circumstantial evidence very strongly suggests that this is the case. One of these balloons has not been seen on the amateur tracking map since the USAF shot down an object matching the description in the area that the balloon was known to be. It was launched in the USA in October 2022 and was about to complete its 7’th circumnavigation of the globe before it went missing from the tracking map.
And what are “pico” balloons?

This is the name given to them by the high altitude balloon community. They are small, plastic (often silvered) balloons, with very light payloads of the order of 10-20 grams. By using plastic with a small amount of helium, instead of bursting they float near the top of the troposphere, for days or sometimes months.]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2023/02/24/answering-some-pico-balloon-questions/" rel="nofollow">https://hackaday.com/2023/02/24/answering-some-pico-balloon-questions/</a></p>
<p>When the US Air Force shot down some suspected Chinese spy balloons a couple of weeks ago, it was widely reported that one of the targets might have been a much more harmless amateur radio craft. The so-called pico balloon K9YO was a helium-inflated Mylar balloon carrying a tiny solar-powered WSPR beacon, and it abruptly disappeared in the same place and time in which the USAF claimed one of their targets. When we covered  the story it garnered a huge number of comments both for and against the balloonists, so perhaps it’s worth returning with the views of a high-altitude-ballooning expert.</p>
<p><a href="https://www.daveakerman.com/?p=3137" rel="nofollow">https://www.daveakerman.com/?p=3137</a></p>
<p>So was an “pico balloon” shot down by an F22?</p>
<p>The circumstantial evidence very strongly suggests that this is the case. One of these balloons has not been seen on the amateur tracking map since the USAF shot down an object matching the description in the area that the balloon was known to be. It was launched in the USA in October 2022 and was about to complete its 7’th circumnavigation of the globe before it went missing from the tracking map.<br />
And what are “pico” balloons?</p>
<p>This is the name given to them by the high altitude balloon community. They are small, plastic (often silvered) balloons, with very light payloads of the order of 10-20 grams. By using plastic with a small amount of helium, instead of bursting they float near the top of the troposphere, for days or sometimes months.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/31/cyber-security-news-february-2023/comment-page-8/#comment-1796784</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Mar 2023 15:26:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193259#comment-1796784</guid>
		<description><![CDATA[https://hackaday.com/2023/02/24/this-week-in-security-godaddy-joomla-and-clamav/

Joomla’s Force Persuasion

Joomla has a critical vulnerability, CVE-2023-23752, which is a trivial information leak from a web endpoint. This flaw is present in all of the 4.x releases, up to 4.2.8, which contains the fix. The issue is the Rest API, which gives access to pretty much everything about a given site. It has an authentication component, of course. The bypass is to simply append ?public=true. Yes, it’s a good old “You don’t need to see his identification” force suggestion.


Security Announcements
[20230201] - Core - Improper access check in webservice endpoints
https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html

There’s even a PoC script that runs the request and spits out the most interesting data: the username, password, and user id contained in the data. It’s not quite as disastrous as that sounds — the API isn’t actually leaking the administrative username and password, or even password hash. It’s leaking the SQL database information. Though if your database is accessible from the Internet, then that’s pretty much as bad as it could be.

https://github.com/WhiteOwl-Pub/CVE-2023-23752]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2023/02/24/this-week-in-security-godaddy-joomla-and-clamav/" rel="nofollow">https://hackaday.com/2023/02/24/this-week-in-security-godaddy-joomla-and-clamav/</a></p>
<p>Joomla’s Force Persuasion</p>
<p>Joomla has a critical vulnerability, CVE-2023-23752, which is a trivial information leak from a web endpoint. This flaw is present in all of the 4.x releases, up to 4.2.8, which contains the fix. The issue is the Rest API, which gives access to pretty much everything about a given site. It has an authentication component, of course. The bypass is to simply append ?public=true. Yes, it’s a good old “You don’t need to see his identification” force suggestion.</p>
<p>Security Announcements<br />
[20230201] &#8211; Core &#8211; Improper access check in webservice endpoints<br />
<a href="https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html" rel="nofollow">https://developer.joomla.org/security-centre/894-20230201-core-improper-access-check-in-webservice-endpoints.html</a></p>
<p>There’s even a PoC script that runs the request and spits out the most interesting data: the username, password, and user id contained in the data. It’s not quite as disastrous as that sounds — the API isn’t actually leaking the administrative username and password, or even password hash. It’s leaking the SQL database information. Though if your database is accessible from the Internet, then that’s pretty much as bad as it could be.</p>
<p><a href="https://github.com/WhiteOwl-Pub/CVE-2023-23752" rel="nofollow">https://github.com/WhiteOwl-Pub/CVE-2023-23752</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/31/cyber-security-news-february-2023/comment-page-8/#comment-1796783</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Mar 2023 15:23:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193259#comment-1796783</guid>
		<description><![CDATA[https://hackaday.com/2023/02/24/this-week-in-security-godaddy-joomla-and-clamav/

We’ve seen some rough security fails over the years, and GoDaddy’s recent news about a breach leading to rogue website redirects might make the highlight reel. The real juicy part is buried on page 30 of a PDF filing to the SEC.

Statement on recent website redirect issues
https://aboutus.godaddy.net/newsroom/company-news/news-details/2023/Statement-on-recent-website-redirect-issues/default.aspx]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2023/02/24/this-week-in-security-godaddy-joomla-and-clamav/" rel="nofollow">https://hackaday.com/2023/02/24/this-week-in-security-godaddy-joomla-and-clamav/</a></p>
<p>We’ve seen some rough security fails over the years, and GoDaddy’s recent news about a breach leading to rogue website redirects might make the highlight reel. The real juicy part is buried on page 30 of a PDF filing to the SEC.</p>
<p>Statement on recent website redirect issues<br />
<a href="https://aboutus.godaddy.net/newsroom/company-news/news-details/2023/Statement-on-recent-website-redirect-issues/default.aspx" rel="nofollow">https://aboutus.godaddy.net/newsroom/company-news/news-details/2023/Statement-on-recent-website-redirect-issues/default.aspx</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/31/cyber-security-news-february-2023/comment-page-8/#comment-1796717</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Mar 2023 10:46:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193259#comment-1796717</guid>
		<description><![CDATA[A simple DIY hoodie can fool security cameras
The &#039;Camera Shy Hoodie&#039; looks innocuous, but keeps your face invisible to surveillance.
https://www.popsci.com/technology/camera-shy-hoodie-privacy/]]></description>
		<content:encoded><![CDATA[<p>A simple DIY hoodie can fool security cameras<br />
The &#8216;Camera Shy Hoodie&#8217; looks innocuous, but keeps your face invisible to surveillance.<br />
<a href="https://www.popsci.com/technology/camera-shy-hoodie-privacy/" rel="nofollow">https://www.popsci.com/technology/camera-shy-hoodie-privacy/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/31/cyber-security-news-february-2023/comment-page-8/#comment-1796716</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Mar 2023 10:45:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193259#comment-1796716</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw/" rel="nofollow">https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/31/cyber-security-news-february-2023/comment-page-8/#comment-1796707</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Mar 2023 06:41:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193259#comment-1796707</guid>
		<description><![CDATA[Vulnerability in Popular Real Estate Theme Exploited to Hack WordPress Websites
https://www.securityweek.com/vulnerability-in-popular-real-estate-theme-exploited-to-hack-wordpress-websites/

A critical vulnerability in the Houzez premium WordPress theme and plugin has been exploited in the wild.]]></description>
		<content:encoded><![CDATA[<p>Vulnerability in Popular Real Estate Theme Exploited to Hack WordPress Websites<br />
<a href="https://www.securityweek.com/vulnerability-in-popular-real-estate-theme-exploited-to-hack-wordpress-websites/" rel="nofollow">https://www.securityweek.com/vulnerability-in-popular-real-estate-theme-exploited-to-hack-wordpress-websites/</a></p>
<p>A critical vulnerability in the Houzez premium WordPress theme and plugin has been exploited in the wild.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/31/cyber-security-news-february-2023/comment-page-8/#comment-1796706</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Mar 2023 06:41:32 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193259#comment-1796706</guid>
		<description><![CDATA[Cyberwarfare
‘Hackers’ Behind Air Raid Alerts Across Russia: Official
https://www.securityweek.com/hackers-behind-air-raid-alerts-across-russia-official/

Russian authorities said that several television and radio stations that have recently broadcast air raid alerts had been breached by hackers.

“As a result of hacking of servers of radio stations and TV channels, in some regions of the country, information about the announcement of an air raid alert was broadcast,” Russia’s emergencies ministry said in a statement.]]></description>
		<content:encoded><![CDATA[<p>Cyberwarfare<br />
‘Hackers’ Behind Air Raid Alerts Across Russia: Official<br />
<a href="https://www.securityweek.com/hackers-behind-air-raid-alerts-across-russia-official/" rel="nofollow">https://www.securityweek.com/hackers-behind-air-raid-alerts-across-russia-official/</a></p>
<p>Russian authorities said that several television and radio stations that have recently broadcast air raid alerts had been breached by hackers.</p>
<p>“As a result of hacking of servers of radio stations and TV channels, in some regions of the country, information about the announcement of an air raid alert was broadcast,” Russia’s emergencies ministry said in a statement.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/31/cyber-security-news-february-2023/comment-page-8/#comment-1796704</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Mar 2023 06:40:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193259#comment-1796704</guid>
		<description><![CDATA[New ‘Exfiltrator-22’ Post-Exploitation Framework Linked to Former LockBit Affiliates
https://www.securityweek.com/new-exfiltrator-22-post-exploitation-framework-linked-to-former-lockbit-affiliates/

A recently identified post-exploitation framework ‘Exfiltrator-22’ uses the same C&amp;C infrastructure as the LockBit ransomware.

A recently identified post-exploitation framework offered as a service appears to be operated by former affiliates of the LockBit ransomware, cybersecurity company Cyfirma reports.

Dubbed Exfiltrator-22 or EX-22, the tool was created using the leaked source code of other post-exploitation frameworks, and uses the same command-and-control (C&amp;C) infrastructure as LockBit 3.0.

The malicious tool appears to have been created by skilled developers with knowledge of anti-analysis and defense evasion techniques, who are employing an aggressive marketing strategy, claiming that their solution is fully undetectable.

Exfiltrator-22’s operators, Cyfirma says, are likely operating from Asia and are interested in building their own affiliation program, using a subscription-based payment model: the malware is offered at $1,000 for a month, or $5,000 for lifetime access.]]></description>
		<content:encoded><![CDATA[<p>New ‘Exfiltrator-22’ Post-Exploitation Framework Linked to Former LockBit Affiliates<br />
<a href="https://www.securityweek.com/new-exfiltrator-22-post-exploitation-framework-linked-to-former-lockbit-affiliates/" rel="nofollow">https://www.securityweek.com/new-exfiltrator-22-post-exploitation-framework-linked-to-former-lockbit-affiliates/</a></p>
<p>A recently identified post-exploitation framework ‘Exfiltrator-22’ uses the same C&amp;C infrastructure as the LockBit ransomware.</p>
<p>A recently identified post-exploitation framework offered as a service appears to be operated by former affiliates of the LockBit ransomware, cybersecurity company Cyfirma reports.</p>
<p>Dubbed Exfiltrator-22 or EX-22, the tool was created using the leaked source code of other post-exploitation frameworks, and uses the same command-and-control (C&amp;C) infrastructure as LockBit 3.0.</p>
<p>The malicious tool appears to have been created by skilled developers with knowledge of anti-analysis and defense evasion techniques, who are employing an aggressive marketing strategy, claiming that their solution is fully undetectable.</p>
<p>Exfiltrator-22’s operators, Cyfirma says, are likely operating from Asia and are interested in building their own affiliation program, using a subscription-based payment model: the malware is offered at $1,000 for a month, or $5,000 for lifetime access.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2023/01/31/cyber-security-news-february-2023/comment-page-8/#comment-1796701</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 01 Mar 2023 06:36:27 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=193259#comment-1796701</guid>
		<description><![CDATA[Data Breaches
Ransomware Attack Hits US Marshals Service
https://www.securityweek.com/ransomware-attack-hits-us-marshals-service/

The US Marshals Service has confirmed that ransomware was deployed on one of its systems that contains sensitive law enforcement information.]]></description>
		<content:encoded><![CDATA[<p>Data Breaches<br />
Ransomware Attack Hits US Marshals Service<br />
<a href="https://www.securityweek.com/ransomware-attack-hits-us-marshals-service/" rel="nofollow">https://www.securityweek.com/ransomware-attack-hits-us-marshals-service/</a></p>
<p>The US Marshals Service has confirmed that ransomware was deployed on one of its systems that contains sensitive law enforcement information.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
