Welcome, Guest
You have to register before you can post on our site.

Username/Email:
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 155
» Latest member: milicke
» Forum threads: 1,948
» Forum posts: 5,007

Full Statistics

Latest Threads
Kompromitovan zarkons.edu...
Forum: Kompromitovani resursi
Last Post: VincaSec
06-24-2025, 02:53 PM
» Replies: 0
» Views: 142
Pošta i kurirske službe -...
Forum: Phishing / Scam / Spam kampanje
Last Post: milos_rs
06-23-2025, 02:16 PM
» Replies: 134
» Views: 99,974
WhatsApp Scam - ponuda za...
Forum: Phishing / Scam / Spam kampanje
Last Post: milos_rs
06-23-2025, 02:07 PM
» Replies: 27
» Views: 18,724
Otvorena javna rasprava o...
Forum: Vesti, zanimljivosti i razno
Last Post: milos_rs
06-23-2025, 11:36 AM
» Replies: 9
» Views: 8,140
gsp.rs - JKP GSP Beograd ...
Forum: Neadekvatno zaštićeni resursi
Last Post: milos_rs
06-23-2025, 11:10 AM
» Replies: 1
» Views: 218
OKE Green piramidalna šem...
Forum: Phishing / Scam / Spam kampanje
Last Post: milos_rs
06-23-2025, 11:02 AM
» Replies: 4
» Views: 1,078
CVE‑2024‑24919: Ranjivost...
Forum: Neadekvatno zaštićeni resursi
Last Post: VincaSec
06-20-2025, 08:57 PM
» Replies: 0
» Views: 182
Potencijalno ranjivi Roun...
Forum: Neadekvatno zaštićeni resursi
Last Post: VincaSec
06-20-2025, 08:51 PM
» Replies: 0
» Views: 196
Mnogi "mediji" kao "vest"...
Forum: Phishing / Scam / Spam kampanje
Last Post: milos_rs
06-19-2025, 10:22 PM
» Replies: 0
» Views: 159
Sveopšte phishing/SPAM ka...
Forum: Phishing / Scam / Spam kampanje
Last Post: milos_rs
06-19-2025, 11:09 AM
» Replies: 15
» Views: 4,162

 
  Bleklistovani domaci sajtovi
Posted by: Petar - 10-16-2022, 06:48 PM - Forum: Kompromitovani resursi - Replies (20)

http://autoplacevi.rs/
     https://sitecheck.sucuri.net/results/autoplacevi.rs
     https://www.virustotal.com/gui/url/2b411...?nocache=1
   
http://euroguma.rs
    https://www.fortiguard.com/webfilter?q=e...&version=9
    https://www.virustotal.com/gui/url/2b411...je.gov.rs/
   

Print this item

Exclamation Ministarstva Bosne i Hercegovine ciji sajtovi ne rade - lista
Posted by: kernel_priest - 10-16-2022, 03:44 PM - Forum: Neadekvatno zaštićeni resursi - Replies (1)

Trenutno od 9 ministarstava BH nivoa - samo 1 ima sajt koji je u funkciji. Ostali ne rade. Stanje je od 16 sep 2022
Takodje ne radi ni BH parlament koji je povezan direktno sa eVlada - online CMS za upravljanje glasanjem, raspravama i drugim bitnim stvarima za BH parlament.

"SARAJEVO - Već danima vlada popriličan haos u parlamentu BiH zbog hakerskog napada kojim je prošle sedmice oboren njihov sajt, kojem se od tada ne može pristupiti.

Poslanicima i delegatima je, naime, otežan rad jer im je rečeno da ne uključuju računare, a na gubitku su i građani, koji ne mogu provjeriti šta rade političari koje plaćaju.
Zlatko Miletić, delegat u Domu naroda, ističe da ne može prići svojim službenim podacima, odnosno aktima, jer ne smiju upaliti nijedan računar dok to neko ne pokuša popraviti. Pritom, on nije optimista po pitanju toga da će se problem uopšte riješiti."



https://www.nezavisne.com/novosti/bih/Ha...BiH/736003


Ministarstva ciji sajtovi ne rade:

http://mod.gov.ba - min. odbrane
http://msb.gov.ba - min. sigurnosti
http://mpr.gov.ba - min. pravde
http://mhrr.gov.ba - min. za ljudska prava i izbjeglice
http://mcp.gov.ba - min. civilnih poslova
http://mkt.gov.ba - min. komunikacija i prometa
https://mft.gov.ba - min. finansija i trezora
http://mvteo.gov.ba - min. vanjske trgovine i ekonomskih odnosa

Ministarstvo ciji sajt radi:
mvp.gov.ba - min. vanjskih poslova

Print this item

  hotelotrant[.]me
Posted by: Petar - 10-16-2022, 11:15 AM - Forum: Kompromitovani resursi - No Replies

https://sitecheck.sucuri.net/results/hotelotrant.me
https://quttera.com/detailed_report/www.hotelotrant.me
https://scanner.pcrisk.com/detailed_repo...me#details
https://www.virustotal.com/gui/url/eead9.../detection

Inficirani resursi:
/wp-content/plugins/contact-form-7/includes/js/jquery.form.min.js?ver=3.40.0-2013.08.13
/wp-content/plugins/lightbox-plus/js/jquery.colorbox.1.3.32.js?ver=1.3.32
/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=3.5.2

Print this item

  Pedijatrija Boskovic
Posted by: Petar - 10-16-2022, 10:31 AM - Forum: Kompromitovani resursi - Replies (1)

pedijatrija-boskovic[.]com



[/url]https://malcure.com/webscan/url/6629/

https://quttera.com/detailed_report/pedijatrija-boskovic.com

https://sitecheck.sucuri.net/results/ped...skovic.com

https://scanner.pcrisk.com/detailed_repo...om#details

https://www.virustotal.com/gui/url/03a06...?nocache=1





   



https://www.siteguarding.com/

           

URLQuery nije detektovao: [u]https://urlquery.net/report/3bb60518-6c42-43a1-8eb1-753c16770805[/u]



[url=https://www.virustotal.com/gui/url/03a060a1bf798da2f3be5885ec59d605bcb59337ac76b09e49123627a1be02dc?nocache=1]

Print this item

  sopas[.]rs
Posted by: Petar - 10-15-2022, 10:23 PM - Forum: Kompromitovani resursi - Replies (1)

Savez Organizacija Podvodnih Aktivnosti Republike Srbije
https://urlscan.io/result/b700d3d4-6357-...2ae31d3ba/
Sopas[.]rs malware:
https://sitecheck.sucuri.net/results/sopas.rs
https://www.fortiguard.com/webfilter?q=s...&version=9
https://www.immuniweb.com/websec/sopas.rs/J1rAzWlO/
https://urlquery.net/report/169e2fca-706...583130a848
https://www.virustotal.com/gui/domain/sopas.rs
https://maltiverse.com/hostname/sopas.rs
https://otx.alienvault.com/indicator/domain/sopas.rs
https://safeweb.norton.com/report/show?url=sopas.rs

   
Kao sto se moze i na slici videti a i sa urlquery.net sajta svaka slika, gig, textualni fajl tj. css su maliciozni i sve ih detektuje na VT-u Fortinet (primer: https://www.virustotal.com/gui/url/b7954579ff6d126958aacb4d6274a9f46317e9b16ab948eb1e4686bbc5a91eb7?nocache=1 )

Zanimljivo je i da sledeci nisu nasli nista sumnjivo:
https://www.immuniweb.com/websec/sopas.rs/J1rAzWlO/
https://www.urlvoid.com/scan/sopas.rs/
   

Bleklistovan je na:
https://otx.alienvault.com/indicator/domain/sopas.rs - Akamai
https://blacklistalert.org/ - superblock.ascams.com

Zanimljivo je da nije na bleklistama:
https://mxtoolbox.com/SuperTool.aspx?action=blacklist%3asopas.rs&run=toolpage
https://hetrixtools.com/blacklist-check/sopas.rs

Dok ovde postoje indikacije:
https://www.isithacked.com/check/sopas.rs

Print this item

  Prodaja roleksa i viagre - domene .ba
Posted by: kernel_priest - 10-15-2022, 04:08 PM - Forum: Kompromitovani resursi - No Replies

Sajtovi sa sadrzajem prodaje viagre:



hxxps://berkut.ba/
hxxp://evvel.ba/

[Image: Screenshot-2022-10-15-at-18-05-24-Evvel.png]


Sajtovi sa prodajom roleksa:

hxxps://vivamais.ba/
hxxp://www.uup.ba/

[Image: Screenshot-2022-10-15-18-12-58.jpg]


Prodaja Ralph Lauren:

hxxp://pkzeljeznicar.ba/

[Image: Screenshot-2022-10-15-18-12-01.jpg]

Print this item

Exclamation Hakovani web sajt hotel-jezero.ba
Posted by: kernel_priest - 10-15-2022, 03:41 PM - Forum: Kompromitovani resursi - Replies (1)

Hakovani web sajt hotel-jezero.ba:

[Image: Screenshot-2022-10-15-at-17-30-10-Hacked...y-Root.png]

IP adresa (185.61.154.58) na kojoj se nalazi web sajt se spominje i u Crypto Scam porukama: https://cryptoexchangescam.github.io/Sca...taset.html

Print this item

  Kako funkcioniše mašinerija medijskog spinovanja uz mreže botova
Posted by: 1van - 10-15-2022, 01:20 PM - Forum: Društvene mreže i socijalni inženjering - Replies (1)

Ako želite da vidite kako se kombinuju lažni profili na mrežama, koji koriste popularne teme za prikupljanje pratilaca, da bi onda diskreditovali nekog drugog, ovde je opisan jedan veoma zanimljiv primer: https://twitter.com/MilosBudimir/status/...4385367040.

Arhivirano: https://archive.ph/ngdmQ.

Inače, u celoj ovoj priči ima još povezanih profila koje koriste pomenuti manipulatori, ali o tome ćemo neki drugi put Wink

Print this item

Question Kako da prijavite incident - CERT
Posted by: 1van - 10-15-2022, 12:25 PM - Forum: Odgovor na incidente i svest o bezbednosti - Replies (12)

Ako ste primetili da je neki web sajt ili servis kompromitovan, prvi korak je obavestiti CERT. CERT je skraćeno od "Computer Emergency Response Team" ili na našem jeziku "Centar za bezbednost informaciono-komunikacionih sistema". Više o CERT-ovima biće opisano u nekoj narednoj poruci.

Uzeći u obzir da većina nas ovde ima loša iskustva sa državnim CERT-om (a privatnih kao ni da nema), tj. da ne odgovaraju ili ne reaguje na prijavljene incidente, predlažem da preuzmete sledeće korake kako bi našli relevantne odgovorne osobe, i poslali im poruku:

- Kontakt strana web sajta je uvek dobar početak ali ne zaboravite da i ona može biti kompromitovana, tj. da su podaci lažni ili da podaci neće stići do pravog vlasnika
- Pronađi i kontaktiraj hosting kompaniju. Ovo je najlakše uraditi gledanjem zapisa na WHOIS servisu. Ukoliko nema podataka za određeni domen, probajte sa IP adresom web sajta. Ako WHOIS servis nema podatke probajte npr. MAXMIND.
- Pronađi i kontaktiraj kompaniju gde je registrovan domen. Pristup je isti kao i za hosting kompaniju, pogledaj WHOIS.
- Pronađi i kontaktiraj kompaniju koja drži DNS zone. Pristup je isti kao i za hosting kompaniju, pogledaj WHOIS za IP adrese DNS servera.
- Kontaktiraj CERT u matičnoj zemlji odakle potiče napad.
- U slučaju Phishing/Scam napada pogledaj koji server je korišćen za slanje poruke pa ponovi korake iznad.

Većinu ovih podataka možete da pronađete koristeći samo dva servisa:
- https://intodns.com/bezbedanbalkan.net
- https://whois.domaintools.com/bezbedanbalkan.net

A kontakt e-mail bi za svakog navedenog provajdera trebao biti [email protected][email protected][email protected]. Svakako pogledajte i njihove kontakt strane.

Ovde možete videti jedan zanimljivi slučaj rešavanja incidenta (uklanjanje malicioznog sadržaja) uz pomoć društvenih mreža: https://security-net.biz/shared/cert/jed...rbija.html.

Print this item

Lightbulb Prompt injection attacks against AI
Posted by: 1van - 10-15-2022, 12:03 PM - Forum: Vesti, zanimljivosti i razno - Replies (2)

Pisanje eksploita prostim jezikom Smile

Quote:OpenAI’s API provides access to GPT-3, which performs a wide variety of natural language tasks, and Codex, which translates natural language to code.

Problemi su opisani ovde:

https://simonwillison.net/2022/Sep/16/pr...solutions/
https://simonwillison.net/2022/Sep/12/prompt-injection/

Quote:The more I think about these prompt injection attacks against GPT-3, the more my amusement turns to genuine concern.

I know how to beat XSS, and SQL injection, and so many other exploits.

I have no idea how to reliably beat prompt injection!

As a security-minded engineer this really bothers me. I’m excited about the potential of building cool things against large language models.

But I want to be confident that I can secure them before I commit to shipping any software that uses this technology.

A big problem here is provability. Language models like GPT-3 are the ultimate black boxes. It doesn’t matter how many automated tests I write, I can never be 100% certain that a user won’t come up with some grammatical construct I hadn’t predicted that will subvert my defenses.

Quote:If I had a protection against XSS or SQL injection that worked for 99% of cases it would be only be a matter of time before someone figured out an exploit that snuck through.

And with prompt injection anyone who can construct a sentence in some human language (not even limited to English) is a potential attacker / vulnerability researcher!

Another reason to worry: let’s say you carefully construct a prompt that you believe to be 100% secure against prompt injection attacks (and again, I’m not at all sure that’s possible.)

What happens if you want to run it against a new version of the language model you are using?

Every time you upgrade your language model you effectively have to start from scratch on those mitigations—because who knows if that new model will have subtle new ways of interpreting prompts that open up brand new holes?


[Image: attachment.php?aid=96]



Attached Files Thumbnail(s)
   
Print this item