CIVHUB

1683 bookmarks
Newest
kubectl proxy
kubectl proxy
Synopsis Creates a proxy server or application-level gateway between localhost and the Kubernetes API server. It also allows serving static content over specified HTTP path. All incoming data enters through one port and gets forwarded to the remote Kubernetes API server port, except for the path matching the static content path. kubectl proxy [--port=PORT] [--www=static-dir] [--www-prefix=prefix] [--api-prefix=prefix] Examples # To proxy all of the Kubernetes API and nothing else kubectl proxy --api-prefix=/ # To proxy only part of the Kubernetes API and also some static files # You can get pods info with 'curl localhost:8001/api/v1/pods' kubectl proxy --www=/my/files --www-prefix=/static/ --api-prefix=/api/ # To proxy the entire Kubernetes API at a different root # You can get pods info with 'curl localhost:8001/custom/api/v1/pods' kubectl proxy --api-prefix=/custom/ # Run a proxy to the Kubernetes API server on port 8011, serving static content from .
·kubernetes.io·
kubectl proxy
April 25, 2025 Treasury TIGTA Inspector General Probes Whether Trump, DOGE Sought Private Taxpayer Information or Sensitive IRS Material
April 25, 2025 Treasury TIGTA Inspector General Probes Whether Trump, DOGE Sought Private Taxpayer Information or Sensitive IRS Material
The request, spelled out in an email obtained by ProPublica, comes amid concerns that DOGE has overstepped its bounds in seeking highly restricted private information about taxpayers, public employees or federal agencies.
·propublica.org·
April 25, 2025 Treasury TIGTA Inspector General Probes Whether Trump, DOGE Sought Private Taxpayer Information or Sensitive IRS Material
Disrupting active exploitation of on-premises SharePoint vulnerabilities
Disrupting active exploitation of on-premises SharePoint vulnerabilities

131.226.2[.]6 IP Post exploitation C2 134.199.202[.]205 IP IP address exploiting SharePoint vulnerabilities 104.238.159[.]149 IP IP address exploiting SharePoint vulnerabilities 188.130.206[.]168 IP IP address exploiting SharePoint vulnerabilities 65.38.121[.]198 IP Post-exploitation C2 for Storm-2603

These vulnerabilities affect on-premises SharePoint servers only and do not affect SharePoint Online in Microsoft 365.
As of this writing, Microsoft has observed two named Chinese nation-state actors, Linen Typhoon and Violet Typhoon exploiting these vulnerabilities targeting internet-facing SharePoint servers
Microsoft observed multiple threat actors conducting reconnaissance and attempting exploitation of on-premises SharePoint servers through a POST request to the ToolPane endpoint.
In observed attacks, threat actors send a crafted POST request to the SharePoint server, uploading a malicious script named spinstall0.aspx. Actors have also modified the file name in a variety of ways, such as spinstall.aspx, spinstall1.aspx, spinstall2.aspx, etc. The spinstall0.aspx script contains commands to retrieve MachineKey data and return the results to the user through a GET request, enabling the theft of the key material by threat actors
Since 2012, Linen Typhoon has focused on stealing intellectual property, primarily targeting organizations related to government, defense, strategic planning, and human rights.
Since 2015, the Violet Typhoon activity group has been dedicated to espionage, primarily targeting former government and military personnel, non-governmental organizations (NGOs), think tank
using Mimikatz, specifically targeting the Local Security Authority Subsystem Service (LSASS) memory to extract plaintext credentials. The actor moves laterally using PsExec and the Impacket toolkit, executing commands using Windows Management Instrumentation (WMI). Storm-2603 is then observed modifying Group Policy Objects (GPO) to distribute Warlock ransomware in compromised environments.
Fast reverse proxy tool used to connect to C2 IP 65.38.121[.]198
131.226.2[.]6 IP Post exploitation C2 134.199.202[.]205 IP IP address exploiting SharePoint vulnerabilities 104.238.159[.]149 IP IP address exploiting SharePoint vulnerabilities 188.130.206[.]168 IP IP address exploiting SharePoint vulnerabilities 65.38.121[.]198 IP Post-exploitation C2 for Storm-2603
·microsoft.com·
Disrupting active exploitation of on-premises SharePoint vulnerabilities
July NNSA hack China UPDATE: Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities | CISA
July NNSA hack China UPDATE: Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities | CISA
Conduct scanning for IPs 107.191.58[.]76, 104.238.159[.]149, and 96.9.125[.]147, particularly between July 18-19, 2025.
Conduct scanning for IPs 107.191.58[.]76, 104.238.159[.]149, and 96.9.125[.]147, particularly between July 18-19, 2025.
·cisa.gov·
July NNSA hack China UPDATE: Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities | CISA
Advisory Update on Cyber Threat Activity Targeting Commvault’s SaaS Cloud Application (Metallic) | CISA
Advisory Update on Cyber Threat Activity Targeting Commvault’s SaaS Cloud Application (Metallic) | CISA
Threat actors may have accessed client secrets for Commvault’s (Metallic) Microsoft 365 (M365) backup software-as-a-service (SaaS) solution, hosted in Azure. This provided the threat actors with unauthorized access to Commvault’s customers’ M365 environments that have application secrets stored by Commvault.
For certain Commvault customers, rotate their application secrets, rotate those credentials on Commvault Metallic applications and service principles available between February and May 2025.[2] Note: This mitigation only applies to a limited number of customers who themselves have control over Commvault’s application secrets.
For certain Commvault customers, rotate their application secrets, rotate those credentials on Commvault Metallic applications and service principles available between February and May 2025.[2] Note: This mitigation only applies to a limited number of customers who themselves have control over Commvault’s application secrets
·cisa.gov·
Advisory Update on Cyber Threat Activity Targeting Commvault’s SaaS Cloud Application (Metallic) | CISA
disclosed april, not patched till september Commvault releases patches for two nasty bug chains after exploits proven
disclosed april, not patched till september Commvault releases patches for two nasty bug chains after exploits proven
: Researchers disclosing their findings said 'it's as bad as it sounds'
They then found the method in Commvault's code used to decrypt passwords, and used it against the retrieved admin password to log in as that admin. Notably, during watchTowr's version of the disclosure timeline, Commvault originally pushed back on this bug, saying it couldn't be feasibly exploited in real-world scenarios.
The vendor argued the flaw was impractical, which may explain why the make-me-admin bug carries the lowest severity score (5.3) of all four vulnerabilities, namely because of the conditions that highly limit the exploitability.
·theregister.com·
disclosed april, not patched till september Commvault releases patches for two nasty bug chains after exploits proven