Connect with us

Press Release

By plugging in a mouse, Razer Bug enables you to access Windows 10 administration.

Published

on

By plugging in a mouse, Razer Bug enables you to access Windows 10 administration.

By just putting in a Razer mouse or keyboard, a Razer Synapse zero-day vulnerability that has been publicly published on Twitter enables you to take control of Windows as an administrator.

A well-known maker of computer accessories, Razer is well recognised for their gaming keyboards and mice.

The Razer Synapse programme will immediately download and start installing on a computer when a Razer device is plugged into Windows 10 or Windows 11. Users can set up macros, map buttons, and modify their gear using the software Razer Synapse.

Over 100 million people use Razer Synapse, according to Razer, who claims that number.

The plug-and-play Razer Synapse installation contains a zero-day vulnerability that, when exploited, allows users to swiftly gain SYSTEM access on a Windows system. This vulnerability was found by security researcher jonhat.

The greatest user rights in Windows, known as SYSTEM privileges, provide users the ability to run any command on the operating system. Basically, if a user has Windows’ SYSTEM capabilities, they have total control over the system and are able to install anything they want, including malicious software.

Razer had yet to respond, so yesterday jonhat revealed the zero-day vulnerability on Twitter and provided a little video explaining how the flaw operates.

Using a mouse while plugged in to gain access to the SYSTEM
We chose to test the flaw as BleepingComputer has a Razer mouse handy. We can confirm that it took us roughly two minutes to get SYSTEM rights in Windows 10 after plugging in our mouse.

It should be emphasised that this is a local privilege escalation (LPE) vulnerability, requiring physical access to a computer and a Razer device. To exploit the problem, all you need to do is purchase a $20 Razer mouse from Amazon and plug it into a Windows 10 computer.

On one of our Windows 10 machines, we set up a temporary ‘Test’ user with ordinary, non-administrator capabilities to test this flaw.

When we connected the Razer device to Windows 10, the operating system downloaded and set up both the driver and the Razer Synapse application automatically.

The Razer installation application got SYSTEM access as a result of the RazerInstaller.exe executable being started by a Windows process with SYSTEM privileges, as demonstrated below.

The setup procedure lets you choose the folder where the Razer Synapse software will be installed when you install it. Everything goes wrong when you have the choice of where to install your software.

The “Choose a Folder” window will show up when you move your folder. When you right-click the dialogue while holding down Shift, you will be given the option to “Open PowerShell window here,” which will launch a PowerShell prompt in the folder displayed in the dialogue.

This PowerShell prompt will inherit the same rights as the process that launched it because it was run with SYSTEM permissions.

As you can see in the screenshot below, after typing the “whoami” command at the PowerShell prompt, it became clear that the console has SYSTEM capabilities, enabling us to execute whatever command we like.

According to Will Dormann, a Vulnerability Analyst at the CERT/CC, other applications installed by the Windows plug-and-play mechanism is likely to include similar flaws.

Razer will address the flaw
Razer has contacted the security researcher to let them know that they will be delivering a remedy after this zero-day issue attracted significant notice on Twitter.

Despite the fact that the vulnerability was made public, Razer also informed the researcher that he would be getting a bug bounty payment.

Continue Reading

Press Release

Dramaindo

Published

on

Dramaindo

If you’re looking for Moenime? After that, this is where you can find various sources that provide thorough information.

Nonton Streaming Drama Sub Indo at Dramaindo.moe
Dramaindo.moe is a site where you can stream and download Indonesian dramas in 240p, 360p, 480p, and 720p HD. Tempat Nonton Drama Sub Indo Terlengkap, Dramaindo.moe.

https://163.172.111.222/
Extracurricular Drama in Indonesian – Dramaindo.moe
Extracurricular can be seen online and downloaded in HD in the following resolutions: 240p, 360p, 480p, and 720p. Dramaindo.moe is the only site where you can access Extracurricular complete episodes with subtitles in Indonesian.

https://163.172.111.222/series/extracurricular/
I hope the sources mentioned above give you with information about Dramaindo. If not, you can contact me through the comments.

Continue Reading

Press Release

T-Mobile data leak revealed call logs and phone numbers

Published

on

T-Mobile data leak revealed call logs and phone numbers

T-Mobile has disclosed a data breach that exposed customer proprietary network information (CPNI), which includes phone numbers and call history.

T-Mobile started texting consumers about a “security incident” that revealed the details of their accounts yesterday.

T-Mobile claims that recently, their systems had “malicious, unauthorised access” uncovered by their security staff. T-Mobile hired a cybersecurity company to conduct an investigation, and the results showed that threat actors had gotten access to CPNI, or customer-generated network information, used for telecommunications.

Phone numbers, call history, and the number of lines on an account are among the data compromised in this attack.

“The Federal Communications Commission (FCC) regulations’ definition of customer proprietary network information (CPNI) was accessed. The CPNI that was accessed might have included your phone number, the number of lines you have subscribed to, and, in some cases, call-related data gathered as part of your wireless service’s routine operation “T-Mobile claimed in a notification of a data breach.

According to T-Mobile, the compromised data did not include the names, addresses, email addresses, financial information, credit card information, social security numbers, tax IDs, passwords, or PINs of account holders.

T-Mobile claimed that this hack only affected a “small number of consumers (less than 0.2%)” in a statement to BleepingComputer. There are roughly 200,000 persons who have been impacted by this breach out of T-estimated Mobile’s 100 million customers.

“Less than 0.2% of our clients are now receiving notifications that some account information may have been improperly accessed. Names connected to the account, financial information, credit card details, social security numbers, passwords, PINs, and physical or email addresses were NOT among the data obtained. Phone numbers, the number of lines a user subscribes to, and, in a few rare situations, call-related data gathered as part of routine operation and service, were among the data that may have been accessed “Tells BleepingComputer, T-Mobile.

Anyone who has received a text alert about this incident should be on the watch for any suspicious texts that seem to be from T-Mobile and ask for information or contain links to websites that are not owned by T-Mobile.

Threat actors frequently employ information they have obtained from other targeted phishing and smishing efforts in an effort to obtain sensitive data such login names and passwords.

Prior data breaches at T-Mobile occurred in 2018, 2019 for prepaid customers, and in March 2020, which exposed personal and financial information.

Continue Reading

Press Release

MASSACHUSETTS COURT SUPPORTS A REQUEST FROM THE IRS TO OBTAIN THE RECORDS OF ALL CIRCLE CUSTOMERS WHO HAD $20K+ IN CRYPTO TRANSACTIONS BETWEEN 2016 AND 2020 (ZACK SEWARD/COINDESK)

Published

on

MASSACHUSETTS COURT

Massachusetts court supports a request from the IRS to obtain the records of all Circle customers who had $20K+ in crypto transactions between 2016 and 2020  —  A Massachusetts court is supporting a request from the IRS to obtain the records Circle customers, the Department of Justice said.

Continue Reading

Trending