Pi (the_kernel_panic)
banner
thekernelpanic.bsky.social
Pi (the_kernel_panic)
@thekernelpanic.bsky.social
Vulnerability Researcher | Exploit Developer | Houseplant Enthusiast 🪴

Medium Blog: https://medium.com/@piyushbhor22

🏳️‍🌈🏳️‍⚧️🇨🇦
The Ontario General Provincial Election is on Feb 27, 2025.

I urge everyone to please vote!

If you would like to vote strategically, you can refer to: votewell.ca

🇨🇦🇨🇦
VoteWell
A strategic voting tool for the 2025 ON provincial election
votewell.ca
February 24, 2025 at 12:21 PM
It's messed up how Honey will swap the cookie in the affiliate link for their own, so they get paid the commission instead. It is essentially scamming the same people who promoted it and straight-up lying to you about not finding any coupons.
I remember downloading Honey at some point years ago, using it for a short period, seemingly never finding any discounts on anything, and then deleting it because it seemed like a scam/malware but I couldn't pinpoint how.

I guess here's how.

Delete it if ya got it.

www.youtube.com/watch?v=vc4y...
Exposing the Honey Influencer Scam
YouTube video by MegaLag
www.youtube.com
December 23, 2024 at 6:12 PM

My paper got accepted at TAICO!

I’ll be giving a small talk on unpatched #zero-days in ML libraries and how to exploit them.

It’s my first time giving a talk, so any tips would be super appreciated!
TAICO - Toronto AI and Cybersecurity Organization
The Toronto Artificial Intelligence and Cybersecurity Organization
taico.ca
December 11, 2024 at 12:01 PM
Reposted by Pi (the_kernel_panic)
Normally, I am not a fan of threat actors spreading malware, but in this case I will make an exception.
Today I presented at Virus Bulletin's conference in Dublin about a new network of "AI Nudify" websites created by FIN7. The sites promise to turn a regular photo into a non-consensual nude photo --- but the only thing they deliver is malware....
December 8, 2024 at 9:31 PM
I’ve started an #infosec blog! I publish my research there along with CTF walkthroughs (mostly RE and Forensics stuff).

Here’s my latest post, where I talk about the CVEs I discovered in Hugging Face Transformers:
medium.com/@piyushbhor2...
Exploiting the Transformers Library for Fun and Profit
CVE-2024-11392, CVE-2024–11393, and CVE-2024–11394
medium.com
December 8, 2024 at 11:45 PM
Reposted by Pi (the_kernel_panic)
The world’s richest 1% have more wealth than the bottom 95% put together, according to Oxfam.

There is no moral justification for this extraordinary level of inequality.

It's distorting politics, rigging our markets, and granting unprecedented power to a handful of people.
World’s top 1% own more wealth than 95% of humanity, as “the shadow of global oligarchy hangs over UN General Assembly,” says Oxfam | Oxfam International
www.oxfam.org
December 4, 2024 at 10:11 PM
I have always wanted to try #bugbounty and this summer I finally did it!

My goal was to get atleast one CVE by the end of the year and I’m happy to report I got 3!

Here’s to CVE-2024-11392, CVE-2024-11393, and CVE-2024-11394 🎉
December 2, 2024 at 12:15 PM
Lmao Andrew Tate’s “The Real World” being hacked by a group of queer hactivists has been my favourite moment of 2024.

They spammed the chat room with trans flag emojis and leaked 14 GB of data including all private chats.

youtu.be/j84gB2cbNps?...
The Andrew Tate Hack is Worse than you Think...
YouTube video by No Text To Speech
youtu.be
November 26, 2024 at 6:36 AM
Things this “wallpaper” app does:

1. Automatically installs Bing Visual Search.
2. Includes code to decrypt cookies saved in other browsers.
3. Brings a "free" geolocation web API to the system.
4. Tries to make Bing your default search engine (barf).
November 22, 2024 at 11:29 AM
I’m Pi. I made a polymorphic malware in undergrad capable of AV evasion.

I was super stocked but got a B+ because “it had no real world application.” and was recommended I focus on “making something productive.”

I now work on a red team and develop malware for assessments. 💀
Introduce yourself with your worst feedback from school 👇

I'm Claudia, and "she has potential but spends all of her time with that computer-thing. And bet she's no good at: each time something is broken!" was my tagline.

Lucky me, at that time police didn't know computer could "do" things 😶
November 22, 2024 at 9:14 AM
I just found out Mikko Hyppönen has launched a Museum of Malware Art!

I loved his book If It's Smart, It's Vulnerable, and the museum is definitely on my bucket list for when I visit Finland.

www.withsecure.com/en/experienc...
Museum of malware art
The Museum of Malware Art captures the dark side of our digital world. Through our collections and exhibitions, we explore the history, present and future of cyber attacks: the motivations behind them...
www.withsecure.com
November 20, 2024 at 11:07 AM
Reposted by Pi (the_kernel_panic)
i enjoy the madlibs style of cybercrime
Unsecured JupyterLab and Jupyter Notebooks servers abused for illegal streaming of Sports events
Unsecured JupyterLab and Jupyter Notebooks servers abused for illegal streaming of Sports events
Threat actors exploit misconfigured JupyterLab and Jupyter Notebooks servers to rip sports streams and illegally redistribute them. Researchers from security firm Aqua observed threat actors exploiting misconfigured JupyterLab and Jupyter Notebook servers to hijack environments, deploy streaming tools, and duplicate live sports broadcasts on illegal platforms. “threat actors using misconfigured servers to hijack environments for streaming sports events. By exploiting misconfigured JupyterLab and Jupyter Notebook applications, attackers drop live streaming capture tools and duplicate the broadcast on their illegal server, thus conducting stream ripping” reads the report published by Aqua. JupyterLab and Jupyter Notebook are widely used interactive tools for data science. While essential for data operations, improper security configurations can expose organizations to risks, making secure deployment critical. Aqua Nautilus researchers uncovered the attacks after deploying honeypots that mimic real-world development environments. A recent threat hunting operation conducted by Aqua researchers analyzed outbound network traffic and executed binaries in containerized environments. Using honeypots and a data warehouse for cross-referencing suspicious binaries and network events, researchers detected anomalies tied to illicit activity. One finding involved the open-source tool ffmpeg, commonly used for multimedia processing. Though typically benign, its use in these events suggests a potential shift toward malicious exploitation The Jupyter Lab and Jupyter Notebook honeypots set up by the company reveal were affetced by vulnerabilities and used weak passwords. The threat actors exploited unauthenticated access to Jupyter Lab and Jupyter Notebook to establish initial access and achieve remote code execution.  The attack chain starts with threat actors updating the server, then downloaded the tool  ffmpeg . Then attackers executed  ffmpeg  to capture live streams of sports events and redirected them to their server.   “While the immediate impact on organizations might appear minimal (though it significantly affects the entertainment industry), it could be dismissed as merely a nuisance.” cotinues the report. “However, it’s crucial to remember that the attackers gained access to a server intended for data analysis, which could have serious consequences for any organization’s operations. Potential risks include denial of service, data manipulation, data theft, corruption of AI and ML processes, lateral movement to more critical environments and, in the worst-case scenario, substantial financial and reputational damage.” In the attack analyzed by Aqua, threat actors downloaded FFmpeg from MediaFire and use the tool to record live sports events feeds from the Qatari beIN Sports network. The output is re-directed to  ustream.tv .    The attackers used an IP address from an Algerian AS (41.200.191[.]23), suggesting a possible Arab origin for the threat actors. “Traditional security tools often miss subtle indicators, especially in complex environments like JupyterLab and Jupyter Notebook, where legitimate tools can be used for unauthorized purposes. By using behavioral analysis to spot anomalies—such as the unusual deployment and execution of  ffmpeg  for live-stream capture—our team uncovered covert sports piracy operations that bypassed standard alerts.” concludes the report. Follow me on Twitter:  @securityaffairs  and  Facebook  and  Mastodon Pierluigi Paganini ( SecurityAffairs  –   hacking, piracy)
securityaffairs.com
November 20, 2024 at 9:56 AM
Reposted by Pi (the_kernel_panic)
November 20, 2024 at 4:05 AM
Does anyone here triage bug bounty or vulnerability reports?

Would love to hear some tips on improving your reports, calculating the CVSS score or just cool stories from the job!
November 19, 2024 at 7:48 AM
Reposted by Pi (the_kernel_panic)
I feel like we all just picked Bluesky and didn’t even give MILF Messenger a chance
Bluesky is number 1.
November 17, 2024 at 5:41 PM
Reposted by Pi (the_kernel_panic)
Never forget this: The GOP’s nonsensical culture war is meant to distract you from corporate corruption, worker oppression, and staggering wealth inequality.
November 16, 2024 at 6:31 AM
Just submitted a zero-day I discovered in Python 2.7 for the Junkyard Pwnathon organized by @districtcon.bsky.social

It’s a competition focused on finding security bugs in EOL (End of Life) software and hardware.

Excited to see how it goes!
November 16, 2024 at 8:29 AM