leekthehack
leekthehack boosted:
Coupe Circuit ๐Ÿ“ดcoupecircuit@infosec.exchange
2026-02-08

๐Ÿ‡บ๐Ÿ‡ฌ Des SMS pro-Museveni envoyรฉs aux clients de MTN en plein blackout numรฉrique

La nouvelle รฉdition de Courts-circuits (2-8 fรฉvrier 2026), c'est par-ici : coupecircuit.substack.com/p/de

2026-02-06

๐‡๐š๐œ๐ค๐ข๐ง๐  ๐‚๐š๐ฆ๐ฉ๐š๐ข๐ ๐ง ๐„๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ๐ฌ ๐Œ๐ข๐œ๐ซ๐จ๐ฌ๐จ๐Ÿ๐ญ ๐–๐ข๐ง๐๐จ๐ฐ๐ฌ ๐–๐ข๐ง๐‘๐€๐‘ ๐•๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ

A hacking campaign took just days to exploit a newly disclosed security vulnerability in Microsoft Windows version of WinRAR, researchers at Check Point Software have said.

๐Ÿž The attackers leveraged CVE-2025-8088, a path traversal vulnerability in the widely used file archive and compression software WinRAR, which was first disclosed by ESET in August 2025.

โฑ๏ธ Check Pointโ€™s analysis of the campaign suggested that attackers were actively exploiting the vulnerability within days of its disclosure.

๐Ÿ”Ž CVE-2025-8088 enables the creation of arbitrary code by crafting malicious archive files. This lets attackers execute code and maintain persistence on targeted machines, allowing them to secretly monitor users and collect sensitive data.

๐ŸŒ Check Point researchers noted that the attacks had a focus on government institutions and law enforcement agencies in Southeast Asia, pointing to a cyber-espionage campaign with the goal of collecting intelligence for geopolitical goals.

๐Ÿ‡จ๐Ÿ‡ณ Researchers concluded that the campaign was being conducted by a group dubbed Amarath-Dragon. The tools, techniques and procedures by Amarath-Dragon closely resemble APT 41, the prolific Chinese state-linked cyber-espionage and hacking group.

๐Ÿ—จ๏ธ โ€œThe campaigns by Amaranth-Dragon exploiting the CVE-2025-8088 vulnerability highlight the recent trend of sophisticated threat actors rapidly weaponizing newly disclosed vulnerabilities,โ€ Check Point Research said in a blog post.

๐Ÿ“ฐ infosecurity-magazine.com/news

leekthehack boosted:
Coupe Circuit ๐Ÿ“ดcoupecircuit@infosec.exchange
2026-02-04

Comment lโ€™Iran a coupรฉ internet pour prรจs de 90 millions de personnes

๐Ÿ‡ฎ๐Ÿ‡ท On explore ce qu'il s'est passรฉ, exactement, pour l'internet iranien en janvier. Chiffres, graphiques et chronologie ร  l'appui ๐Ÿ“Š

Iran : analyse dโ€™une coupure internet sans prรฉcรฉdent 1/3

๐Ÿ“ฐ coupecircuit.substack.com/p/co

2026-02-03

๐Ž๐ฉ๐ž๐ง๐‚๐ฅ๐š๐ฐ ๐š๐ง๐ ๐Œ๐จ๐ฅ๐ญ๐›๐จ๐จ๐ค ๐–๐ž๐ง๐ญ ๐•๐ข๐ซ๐š๐ฅ โ€“ ๐’๐จ ๐ƒ๐ข๐ ๐“๐ก๐ž๐ข๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐’๐ก๐จ๐ซ๐ญ๐œ๐จ๐ฆ๐ข๐ง๐ ๐ฌ

New findings by Paul McCarty reveal 386 fake crypto trading 'skills' in the project behind the viral OpenClaw AI assistant tool (aka Moltbot/Clawdbot) can lead users to install information-stealing malware.

These malicious skills masquerade as cryptocurrency trading automation tools and target ByBit, Polymarket, Axiom, Reddit and LinkedIn.

The researcher said he contacted the OpenClaw team multiple times and that Peter Steinberger, the creator of OpenClaw, said he had too much to do to address this issue.

McCarthy also noted that the vast majority of the malicious skills are still available on the official ClawHub/MoltHub GitHub repository and the command-and-control infrastructure appears to still be operational.

๐Ÿ“ฐ infosecurity-magazine.com/news

---
Meanwhile, Moltbook, the Reddit-like social networking platform built for AI agents contained a misconfigured database which allowed full read and write access to all data, security researchers have revealed.

In a new report, Wiz's Gal Nagli showed that a simple non-intrusive security review revealed a Supabase API key exposed in client-side JavaScript. This single point of failure granted unauthenticated access to the entire production database, claimed Nagli.

๐Ÿ“ฐ infosecurity-magazine.com/news

2026-02-03

๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐—ฐ๐—ฟ๐—ถ๐—บ๐—ฒ ๐—จ๐—ป๐—ถ๐˜ ๐—ผ๐—ณ ๐—ฃ๐—ฎ๐—ฟ๐—ถ๐˜€ ๐—ฃ๐—ฟ๐—ผ๐˜€๐—ฒ๐—ฐ๐˜‚๐˜๐—ผ๐—ฟ๐˜€ ๐—ฅ๐—ฎ๐—ถ๐—ฑ ๐—˜๐—น๐—ผ๐—ป ๐— ๐˜‚๐˜€๐—ธโ€™๐˜€ ๐—ซ ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ฒ๐˜€ ๐—ถ๐—ป ๐—™๐—ฟ๐—ฎ๐—ป๐—ฐ๐—ฒ

๐Ÿ‡ซ๐Ÿ‡ท The cybercrime unit of the Paris Prosecutorโ€™s Office raided X offices in Paris.

Musk and Linda Yaccarino were summoned for voluntary interviews in Paris on April 20.

๐Ÿ“ฐ infosecurity-magazine.com/news

2026-01-30

๐Ÿ”“ ๐—ฉ๐˜‚๐—น๐—ป๐—ช๐—ฎ๐˜๐—ฐ๐—ต ๐—™๐—ฟ๐—ถ๐—ฑ๐—ฎ๐˜†: ๐—–๐—ฉ๐—˜-๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ-๐Ÿญ๐Ÿฎ๐Ÿด๐Ÿญ

Ivanti announced emergency patches for two critical vulnerabilities, tracked as CVE-2026-1281 and CVE-2026-1340, in EPMM that have been exploited in the wild as zero-days.

๐ŸšจIvanti advisory: forums.ivanti.com/s/article/Se
๐Ÿ”Ž watchTowr analysis: labs.watchtowr.com/someone-kno
๐Ÿž CISA KEV: cisa.gov/known-exploited-vulne
๐Ÿ’พ View JSON: cveawg.mitre.org/api/cve/CVE-2

2026-01-30

๐—ก๐—ฒ๐˜„ ๐—”๐—œ-๐——๐—ฒ๐˜ƒ๐—ฒ๐—น๐—ผ๐—ฝ๐—ฒ๐—ฑ ๐— ๐—ฎ๐—น๐˜„๐—ฎ๐—ฟ๐—ฒ ๐—–๐—ฎ๐—บ๐—ฝ๐—ฎ๐—ถ๐—ด๐—ป ๐—ง๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜๐˜€ ๐—œ๐—ฟ๐—ฎ๐—ป๐—ถ๐—ฎ๐—ป ๐—ฃ๐—ฟ๐—ผ๐˜๐—ฒ๐˜€๐˜๐˜€

๐Ÿ‡ฎ๐Ÿ‡ท HarfangLab has reported that a new malicious campaign is spreading malware against people in Iran, likely including NGOs and individuals involved in documenting recent human rights abuses.

๐Ÿ“ฐ infosecurity-magazine.com/news

2026-01-29

๐—ก๐—˜๐—ช - ๐—™๐—ฟ๐—ฎ๐—ป๐—ฐ๐—ฒ ๐—™๐—ถ๐—ป๐—ฒ๐˜€ ๐—ก๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐—˜๐—บ๐—ฝ๐—น๐—ผ๐˜†๐—บ๐—ฒ๐—ป๐˜ ๐—”๐—ด๐—ฒ๐—ป๐—ฐ๐˜† ๐—ฎ โ‚ฌ๐Ÿฑ๐—บ ๐—ข๐˜ƒ๐—ฒ๐—ฟ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฐ ๐——๐—ฎ๐˜๐—ฎ ๐—•๐—ฟ๐—ฒ๐—ฎ๐—ฐ๐—ต

France Travail has received a โ‚ฌ5m fine from France's data protection regulator for security failures that led to the compromise of an estimated 43 million jobseekers.

๐Ÿ“ฐ infosecurity-magazine.com/news

2026-01-29

๐—ก๐—˜๐—ช - ๐—™๐—•๐—œ ๐—ง๐—ฎ๐—ธ๐—ฒ๐˜€ ๐——๐—ผ๐˜„๐—ป ๐—ฅ๐—”๐— ๐—ฃ ๐—ฅ๐—ฎ๐—ป๐˜€๐—ผ๐—บ๐˜„๐—ฎ๐—ฟ๐—ฒ ๐—™๐—ผ๐—ฟ๐˜‚๐—บ

RAMP's clear and dark web sites are down and replaced by a law enforcement banner showing the message: โ€œThis site has been seized.โ€

While thew FBI has made no official statements, the domains linked to RAMP now redirect to seizure notices with FBI and DoJ seals and the nameservers have been updated to ns1.fbi.seized.gov and ns2.fbi.seized.gov, confirming the seizure by US law enforcement.

In a message shared on XSS, 'Stallman,' the RAMP administrator, confirmed the takedown and said he has no plans to build a replacement. He wrote: โ€œI regret to inform you that law enforcement has seized control of the Ramp forumโ€ฆ This event has destroyed years of my work building the freest forum in the worldโ€ฆ Itโ€™s a risk we all take.โ€

๐Ÿ“ฐ infosecurity-magazine.com/news

leekthehack boosted:
Coupe Circuit ๐Ÿ“ดcoupecircuit@infosec.exchange
2026-01-28

Des signes montrent un fragile retour d'une certaine forme de connectivtรฉ depuis l'Iran ๐Ÿ‡ฎ๐Ÿ‡ท

Mais la rรฉalitรฉ pourrait รชtre plus complexe...

๐Ÿ“ฐ coupecircuit.substack.com/p/re

2026-01-26

๐Ÿ”“ ๐•๐ฎ๐ฅ๐ง๐–๐š๐ญ๐œ๐ก ๐Œ๐จ๐ง๐๐š๐ฒ: ๐‚๐•๐„-2024-37079

CISA added a critical vulnerability affecting VMware vCenter Server to its known exploited vulnerabilities (KEV) list despite the flaw being patched in June 2024.

๐Ÿšจ Broadcom/VMware advisory: support.broadcom.com/web/ecx/s
๐Ÿ“ข CISA KEV entry: cisa.gov/known-exploited-vulne
๐Ÿ“‹ View JSON: cisa.gov/known-exploited-vulne

2026-01-23

๐Ÿ”“ ๐—ฉ๐˜‚๐—น๐—ป๐—ช๐—ฎ๐˜๐—ฐ๐—ต ๐—™๐—ฟ๐—ถ๐—ฑ๐—ฎ๐˜†: ๐—–๐—ฉ๐—˜-๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฑ-๐Ÿฏ๐Ÿฐ๐Ÿฌ๐Ÿฎ๐Ÿฒ

An authentication bypass in the Versa Networks Concerto SD-WAN orchestration platform that could allow an attacker to access administrative endpoints has been added to CISA's KEV catalog, confirming of active exploitation in the wild.

๐ŸšจProjectDiscovery alert: projectdiscovery.io/blog/versa
๐Ÿ”Ž Versa advisory: security-portal.versa-networks
๐Ÿ“ข CISA KEV: cisa.gov/known-exploited-vulne
๐Ÿ’พ View JSON: cveawg.mitre.org/api/cve/CVE-2

2026-01-19

๐Ÿ”“ VulnWatch Monday: CVE-2026-0629

TP-Link has released fixes for a major security vulnerability affecting 32 of its VIGI C and VIGI InSight professional surveillance cameras, which could allow attackers to seize full control of vulnerable devices.

๐Ÿšจ TP-Link advisory: tp-link.com/us/support/faq/489
๐Ÿ’พ View JSON: cveawg.mitre.org/api/cve/CVE-2

2026-01-16

๐Ÿ”Ž VulnWatch Friday: CVE-2025-53690 ๐Ÿ”“

China-linked hacking group UAT-8837 is exploiting CVE-2025-53690 (Sitecore vulnerability) to breach North American critical infrastructure, deploying the WeepSteel backdoor, according to @TalosSecurity.

๐Ÿšจ Sitecore advisory: support.sitecore.com/kb?id=kb_
๐Ÿ”Ž Mandiant report: cloud.google.com/blog/topics/t
๐Ÿ†• Talos report: blog.talosintelligence.com/uat
๐Ÿ’พ View JSON: cveawg.mitre.org/api/cve/CVE-2

leekthehack boosted:
Coupe Circuit ๐Ÿ“ดcoupecircuit@infosec.exchange
2026-01-13

Ouganda : l'internet coupรฉ deux jours avant le scrutin

Le gouvernement avait pourtant promis de maintenir lโ€™accรจs ร  internet avant l'รฉlection prรฉsidentielle...

coupe-circuit.ghost.io/ouganda

leekthehack boosted:
Coupe Circuit ๐Ÿ“ดcoupecircuit@infosec.exchange
2026-01-13

Cette information a (malheureusement) รฉtรฉ confirmรฉe par @netblocks@mastodon.social et
@cloudflareradar

@netblocks@bird.makeup @cloudflare@noc.social @cloudflare@cloudflare.social

leekthehack boosted:
Coupe Circuit ๐Ÿ“ดcoupecircuit@infosec.exchange
2026-01-13

RE: infosec.exchange/@coupecircuit

๐Ÿšจ URGENT ๐Ÿ‡บ๐Ÿ‡ฌ Possible suspension de l'internet en Ouganda ร  venir

Une source vient de me partager un document en provenance de la Uganda Communications Commission, prรฉvoyant une suspension de lโ€™accรจs ร  internet dans le pays ร  18 heures ce 13 janvier. A croiser avec d'autres sources.

leekthehack boosted:
Coupe Circuit ๐Ÿ“ดcoupecircuit@infosec.exchange
2026-01-13
2026-01-12

๐Ÿ‘€ VulnWatch Monday: CVE-2026-21858 ๐Ÿ”“
aka "Ni8mare"

A security researcher reported a critical vulnerability in popular AI workflow automation platform n8n that could enable adversaries to compromise enterprise secrets.

๐Ÿ“ฐ infosecurity-magazine.com/news

leekthehack boosted:
Coupe Circuit ๐Ÿ“ดcoupecircuit@infosec.exchange
2025-12-22

Pourquoi Taรฏwan bloque RedNote (mais pas TikTok)

Cette semaine, dans Coupe-circuit: open.substack.com/pub/coupecir

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst