Genesis Archives – Gridinsoft Blog https://gridinsoft.com/blogs/tag/genesis/ Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Tue, 04 Apr 2023 23:26:09 +0000 en-US hourly 1 https://wordpress.org/?v=75559 200474804 Genesis Market Seized by FBI https://gridinsoft.com/blogs/genesis-market-seized-by-fbi/ https://gridinsoft.com/blogs/genesis-market-seized-by-fbi/#respond Tue, 04 Apr 2023 23:25:06 +0000 https://gridinsoft.com/blogs/?p=14034 Genesis Market, a Darknet marketplace for stolen information, was reportedly seized by the FBI on Tuesday, April 4, 2023. The operation was likely preceded by the detainment of the market’s significant actors. The overall operation is called “Cookie Monster”. What is Genesis Market? Genesis is a Darknet marketplace that has been active since 2018. Aside… Continue reading Genesis Market Seized by FBI

The post Genesis Market Seized by FBI appeared first on Gridinsoft Blog.

]]>
Genesis Market, a Darknet marketplace for stolen information, was reportedly seized by the FBI on Tuesday, April 4, 2023. The operation was likely preceded by the detainment of the market’s significant actors. The overall operation is called “Cookie Monster”.

What is Genesis Market?

Genesis is a Darknet marketplace that has been active since 2018. Aside from data leaked from infected systems, visitors could also consider having direct access to these systems – for a separate pay. The bot (i.e. the machine infected with malware) was provided with the whole amount of data needed to use it to impersonate the real machine owner. Among this information are cookies, session tokens and login credentials. Additionally, the buyers could fit someone’s personality to their own browser.

Genesis market interface
List of bots purchased on Genesis Market

Actually, Genesis was not just a market, but a malware-as-a-service program. Hackers were offering credentials gathered by their own malware, and application software for victim impersonation. The latter were allowed to completely replicate the victims’ systems. This program (exactly, browser plugin) was spoofing the information about the system, up to user agent information. All of this is needed to circumvent even the most sophisticated security measures present on online services. It was obvious that such a tremendously developed system will attract the attention of law enforcement at some point.

Operation Cookie Monster Shuts Down the Genesis Market

On April 4, 2023, several sources simultaneously notified about the seizure of Genesis. It was pretty spontaneous, as the main Onion website of the marketplace remained working. However, a row of its auxiliary services went down, displaying the typical FBI placeholder instead of a page. As far as these banners say, the sites were shut down to the warrant of the U.S. District Court for the Eastern District of Wisconsin.

FBI banner
FBI banner that appears instead of the websites’ contents

Most probably, we observe the repeating of a BreachForums story. In brief, the largest hacking forum was seized by the FBI after the arrest of one of its administrators in late March 2023. Arrest and seizure did not happen simultaneously: another admin uncovered the compromising of network infrastructure only 3 days after the arrest. Main site of Genesis is still running, at least in the Darknet. The surface web instance is already down, showing the aforementioned banner. However, it is only a matter of time whether hackers will make a decision to go offline.

The overall situation in the underground network is now pretty interesting. The biggest forum and a pretty big marketplace are seized. Massive arrests of cybercriminals and related persons is backed with accusing Binance – one of the biggest crypto exchanges – with money laundering. Is it a domino effect? Or the only thing that unites all these events is the timeline? This jigsaw is about to be accomplished in recent weeks, if not days.

The post Genesis Market Seized by FBI appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/genesis-market-seized-by-fbi/feed/ 0 14034
Application Bugs Allowed to Open and Start Cars Hyundai, Genesis and Others https://gridinsoft.com/blogs/vulnerabilities-in-hyundai-and-genesis/ https://gridinsoft.com/blogs/vulnerabilities-in-hyundai-and-genesis/#respond Tue, 06 Dec 2022 11:01:10 +0000 https://gridinsoft.com/blogs/?p=12419 Experts from Yuga Labs discovered vulnerabilities in mobile applications for Hyundai and Genesis vehicles. In addition, the SiriusXM smart car platform, used in cars from other manufacturers (Acura, BMW, Honda, Infiniti, Jaguar, Land Rover, Lexus, Nissan, Subaru and Toyota), allowed to remotely unlock the car, start the engine and perform other actions. Let me remind… Continue reading Application Bugs Allowed to Open and Start Cars Hyundai, Genesis and Others

The post Application Bugs Allowed to Open and Start Cars Hyundai, Genesis and Others appeared first on Gridinsoft Blog.

]]>

Experts from Yuga Labs discovered vulnerabilities in mobile applications for Hyundai and Genesis vehicles.

In addition, the SiriusXM smart car platform, used in cars from other manufacturers (Acura, BMW, Honda, Infiniti, Jaguar, Land Rover, Lexus, Nissan, Subaru and Toyota), allowed to remotely unlock the car, start the engine and perform other actions.

Let me remind you that we also wrote that Ferrari Has So Far Denied If It Attacked by Ransomware, and also that Teen gets remote access to 25 Tesla cars.

Also the media reported that Bug in Honda cars allows remotely unlock and start a car.

Yuga Labs specialist Sam Curry has posted two long threads on Twitter (Hyundai, SiriusXM) about problems he and his colleagues have recently discovered in the software of many different vehicles.

The analysis began with applications for Hyundai and Genesis vehicles (MyHyundai and MyGenesis), which allow authenticated users to remotely start and stop the engine, and lock and unlock their vehicles.

vulnerabilities in Hyundai and Genesis

By intercepting and studying the traffic generated by these applications, the researchers were able to extract API calls from it. They discovered that the validation of the car owner is based only on his email address, which is simply included in the body of the JSON POST requests. Then it turned out that MyHyundai, moreover, does not require confirmation of the email address during registration.

Based on the collected data, the experts created a new account using the target’s email address with an additional control character at the end. After that, they sent an HTTP request to the Hyundai endpoint. The request contained the experts’ email in the JSON token and the victim’s address in the JSON body, which allowed the validation to be bypassed.

vulnerabilities in Hyundai and Genesis

To test their attack, the researchers tried to unlock the Hyundai car they had in their possession. The attack worked and the car was successfully unlocked. After that, a Python script was created to automate all stages of the attack, for which you only need to specify the victim’s email address. You can see the script in action in the video below.

Sam Curry
Sam Curry
The vulnerability has been fixed and the main problem was access control affecting user accounts in the application itself. You could log into someone else’s account if you knew [the victim’s] email address and therefore remotely monitor/locate her car.writes Curry.

The Yuga Labs analysts then switched to studying the products of SiriusXM, which, among other things, is a provider of telematics services for more than 15 major automakers. The company claims to operate services for approximately 12 million connected cars.Как выяснили эксперты, мобильные приложения Acura, BMW, Honda, Hyundai, Infiniti, Jaguar, Land Rover, Lexus, Nissan, Subaru и Toyota используют SiriusXM для реализации функций удаленного управления автомобилем.

Examining network traffic from the Nissan app showed that it was possible to send fake HTTP requests to an endpoint knowing only the VIN number of a particular car. The response to such a request contains the victim’s name, phone number, address, and vehicle details. In addition to disclosing data, such requests could also contain commands to perform actions with the car. So, for cars manufactured after 2015, it was possible: remote start and stop, blocking, unlocking, headlight and horn control.

vulnerabilities in Hyundai and Genesis

At the same time, experts emphasize that the VIN of almost any car can be found right in the parking lot (usually located at the bottom of the windshield) or on a specialized car sales website.

Hyundai representatives have already told the media that the vulnerabilities discovered by Yuga Labs were not used to attack car owners, and “customer accounts were not accessible to third parties.”

We also emphasize that exploiting the vulnerability required knowing the email address associated with a specific Hyundai account and vehicle, as well as having the specific script used by the researchers. Despite this, Hyundai took countermeasures within days of receiving the [vulnerability] notification.the company said.

SiriusXM developers also stated that the bugs found by specialists did not affect any client and were eliminated 24 hours after receiving the report. In addition, the company reported that the vulnerabilities were closed as part of a bug bounty program that SiriusXM has had for a long time.

The post Application Bugs Allowed to Open and Start Cars Hyundai, Genesis and Others appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/vulnerabilities-in-hyundai-and-genesis/feed/ 0 12419