How hackers attack and how to protect against it

Investigate Attacks

Attack prototypes already present

jQuery below 3.5.0 vulnerable to cross-site scripting

All jQuery versions below 3.5.0 are vulnerable to cross-site scripting (XSS) attacks. If exploited successfully, an attacker can trick the user’s browser to render a malicious page or hijack a user session. It is even possible to execute remote code. It is recommended to update to jQuery >= 3.5.0

AppLocker cannot stop administrative users

How to break Windows 10 AppLocker

Recently I followed the tracks of an attacker who had exploited administrator rights on an unpatched Windows 10 System. Further attacks on other internal systems were initially stopped by Windows 10 AppLocker. The execution of powershell/cmd where also forbidden by AppLocker. Minutes later, the hacker had overcome this security measure and continued his attack. AppLocker obviously had to have a vulnerability.

GitHub, Bitbucket and GitLab affected, repositories seem to be wiped

Hacker compromised hundreds of git accounts

On the morning of 3 May 2019, unknown hacker launched a coordinated attack against GitHub, Bitbucket and GitLab. The repositories of hundreds accounts appear to have been completely wiped. The hacker claims to have downloaded the entire code and demands a Bitcoin payment for returning the code. We found out how the hack was done and how to protect against it.

Several dangerous attacks possible

jQuery below 3.4.0 vulnerable to prototype pollution

All jQuery versions below 3.4.0 are affected by a new hacking technique called prototype pollution. Successful exploitation could allow an attacker to modify existing object properties, including security properties such as cookies or tokens. Privilege escalation, content manipulation, application hijacking and even remote code execution is possible.