Dismiss this notice
Avast Premium Security Christmas 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9410

Dismiss this notice
ExpressVPN Christmas 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9405

Dismiss this notice
Master PDF Editor Christmas 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9407

Dismiss this notice
O&O Software Christmas Blowout 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9409

Dismiss this notice
Bandicam Christmas 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9404

Dismiss this notice
HitmanPro.Alert Christmas 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9406

Dismiss this notice
GFYI [Official] Ashampoo® Christmas Blowout 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9408

Dismiss this notice
Emsisoft Anti-Malware Home Christmas 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9412

Dismiss this notice
Macrium Reflect Home Christmas 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=9415

Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
SQLite Vulnerabilities Demoed With Hacking of iPhone, Malware C&C
#1
Quote:Researchers have uncovered some potentially serious SQLite vulnerabilities and they have demonstrated their findings by hacking an iPhone and a command and control (C&C) server used by malware.
 
SQLite is a small, fast and full-featured database management system contained in a C library. SQLite is widely used and it can be found by default in many mobile and desktop operating systems, including Windows 10, macOS, iOS, Android, BlackBerry 10 OS, Oracle Solaris 10, FreeBSD, and LG webOS. It’s also used by popular web browsers such as Chrome, Firefox and Safari.
 
Researchers at cybersecurity firm Check Point started investigating SQLite after noticing that some pieces of malware steal passwords from compromised machines by collecting the SQLite database files used by the targeted apps to store passwords. The database files are uploaded to the C&C server and parsed using PHP so that their content can be transferred to a central database where the attackers store all collected passwords.
 
Check Point’s investigation revealed the existence of several vulnerabilities that allow an attacker to execute arbitrary code by getting an application using SQLite to query a specially crafted database.

Read more here: https://www.securityweek.com/sqlite-vuln...malware-cc
[-] The following 1 user Likes silversurfer's post:
  • harlan4096
Reply


Messages In This Thread
SQLite Vulnerabilities Demoed With Hacking of iPhone, Malware C&C - by silversurfer - 13 August 19, 12:23

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Recent Posts
Intel Is Patching the Patch for the Patc...
Over the last two ...Toligo — 19:58
The best password managers
In today’s digital...Toligo — 19:55
AV-Test.org - The best Windows antivirus...
During November...harlan4096 — 16:58
Patch H for KAVKISKTSKFA 2020 / KS 3.0 /...
Hi,   Patch is a...harlan4096 — 16:49
How to block Facebook and Google from id...
Over the weekend, Th...Herran — 14:24

[-]
Birthdays
Today's Birthdays
avatar (35)uxegihor
Upcoming Birthdays
No upcoming birthdays.

[-]
Online Staff
There are no staff members currently online.

>