Profile avatar
vanhoefm.bsky.social
Prof. @KU_Leuven | krackattacks.com & fragattacks.com | Open to consultancy | Ex-Postdoc NYU | Network Security & Crypto
23 posts 642 followers 299 following
Regular Contributor
Active Commenter

In two weeks, @vanhoefm.bsky.social , professor at DistriNet at KU Leuven, takes the stage for our next #DistinguishedLecture. He will present current strategies to strengthen Wi-Fi #security based on recent attacks on networks and previously detected design flaws. All information: buff.ly/gslCMCB

February 2025 Android Security Bulletin includes a heap buffer overflow in a Linux kernel USB peripheral driver (CVE-2024-53104) marked exploited in the wild. It's likely one of the USB bugs exploited by forensic data extraction tools. We block them using these. source.android.com/docs/securit...

Does the culture you grow up in shape the way you see the world? In a new Psych Review paper, @chazfirestone.bsky.social & I tackle this centuries-old question using the Müller-Lyer illusion as a case study. Come think through one of history's mysteries with us🧵(1/13):

The PC is Dead: It’s Time to Make Computing Personal Again

After an embargo of 8 months, we are glad to finally share our USENIX Security '25 paper! We found more than 4 MILLION vulnerable tunneling servers by scanning the Internet. These vulnerable servers can be abused as proxies to launch DDoS attacks and possibly to access internal networks.

mitmproxy 11.1 is out! 🥳 We now support *Local Capture Mode* on Windows, macOS, and - new - Linux! This allows users to intercept local applications even if they don't have proxy settings. More details are at mitmproxy.org/posts/local-.... Super proud of this team effort. 😃

Just saw a malware technique I've not seen in so long it gave me nostalgia. On windows ".com" is an executable file extension, so they'd named their malware "signup​.website.​com"

We updated our CFP for Phrack 72! The deadline is now April 1st 2025. Check the site for specifics on how to contribute, as well as some inspiration! We also posted a link to purchase physical copies of Phrack 71, and a donation link too. Enjoy! phrack.org

I don’t normally get worked up about the naming threat actors thing. But the Volt & Salt Typhoon is a disaster as it’s so hard for non-specialists to tell them apart: - Salt is Snowden style espionage by China against US - Volt is a direct 🇨🇳 military threat to degrade western infrastructure 1/2

Researchers unveiled an attack that completely undermines security assurances AMD makes to customers using one of its most expensive microprocessor product lines in the cloud. BadRAM takes minutes to bypass SEV-SNP protections that warn when the VM is compromised arstechnica.com/information-...

Wow, an adversary first compromised a neighbor of the target, and then attacked the target over Wi-Fi (with stolen password). This is the first observed case of the #AntennaForHire attack that AirEye hypothesized. Any Wi-Fi attack is now a remote attack! www.volexity.com/blog/2024/11...

Just a reminder that the CFP closes in a few days. If you've got something to submit... www.shmoocon.org/call-for-pap...

A different way to look at offense and defense with @hacks4pancakes.com at RSA. 🦄🥞 youtu.be/WKF2nnKo4yQ?...

Our thread at bsky.app/profile/grap... was posted to spread awareness about the auto-reboot feature we've been advocating for inclusion across platforms now that iOS 18.1 shipped it at the end of October. We also wanted to address confusion based on weird police theories about it.

Unath RCE in Citrix Virtual Apps and Desktops (XEN) labs.watchtowr.com/visionaries-...

folder gotchas (in the terminal) wizardzines.com/comics/folde...

This awesome fuzzing blog post by @r00tkitsmm.bsky.social covers a super reliable macOS kernel binary rewriting to instrument any KEXT or XNU at BB or edge level. Mandatory reading for anyone interested in fuzzing whether you use MacOS or not. So many good system internals and fuzzing references!

The Dutch Electoral Council (Kiesraad) had development/deployment infrastructure credentials inside the installer of their voting calculation software OSV2020. Disclosure timeline: fun and fast! 😅 www.zerocopter.com/blog-en/the-...

New #TunnelCrack flaw can break a large majority of VPNs: we can trick a VPN into leaking traffic outside the protected VPN tunnel. Our tests indicate that this is a widespread design issue. For a demo, more details, and the USENIX Security paper, see tunnelcrack.mathyvanhoef.com

300+ scientists from 32 countries have signed an open letter criticizing the EU proposal for regulation to detect Child Sexual Abuse Material https://docs.google.com/document/d/13Aeex72MtFBjKhExRTooVMWN9TC-pbH-5LEaAbMF91Y/edit TL;DR ineffective; risk for function creep/abuse; violates human rights

Case in point: there's an active Mastodon security exploit. Getting the fix rolled out everywhere (including heavily customized servers) is very difficult. And if someone does get remote code execution on all instances, the attacker can do *permanent* graph damage that backup restorations won't fix

I always knew some VPN companies were shady. But seeing how they treat vulnerability disclosures makes some of them look even worse. At least there are some that treat the reports properly though and that do live up to their reputation. To be continued...

Metaverse is dead and VCs and tech press can't wait to hype the next thing. This is not a place of honor. No lessons have been learned here.

Hello Bluesky! Let's make this first post a shameless plug: if you want to watch one of my recent presentation on new Wi-Fi vulnerabilities see https://www.youtube.com/watch?v=WEjgFMuwIAc