Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Exploits

The Jester’s Twitter QR-Code Exploits Targets

Paul Anderson by Paul Anderson
March 9, 2012 - Updated on May 29, 2022
in Exploits, Security
0
The jester boot page
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

@Th3j35t3r earlier today replaced his old Twitter profile pic with a new picture.  It was a QR-Code seen in the image below, this led to a known smartphone exploit.

You might also like

BreachForums Owner Arrested and Charged

Plex media server seen exploited in the wild utilizing a 3 year old RCE

New TPM 2.0 exploit attackers to access or overwrite sensitive data

“It was a highly targeted and precise attack, against known bad guys, randoms were left totally unscathed,” 

Jester Code

Those who scanned the QR-Code on any Android or iPhone mobile device were automatically pointed to a site that revealed The Jester’s frequently used avatar and the content “BOO!”.

Here is the content of the “BOO” webpage:

Entropic

The Jester explains in his blog,

“Embedded inside the webpage with the ‘BOO’ greeting was some UTF encrypted javascript, (I used this site to encrypt it) inside which was some code execution shellcode. When anyone hit the page the shellcode executed. The shellcode was a modified and updated version of the use-after-free remote code execution CVE-2010-1807, a known exploit forWebkit, which facilitated a reverse TCP shell connection to a ‘remote server’ which had an instance of netcat listening on port 37337… Webkit is an SDK component part used in both Safari for iPhone and also Chrome for Android,”

Those who scanned the QR-Code were then cross-referenced on Jester’s database of recognized targets, and those targets were later on pwned, getting their address books, texts and emails deleted.  The Jester explains,

I also had a list of ‘targets’ – twitter usernames I was interested in, these were comprised of usernames of:

  • Islamic Extremists
  • Al Qaeda Supporters
  • Anonymous Members
  • Lulz/Antisec Members

Here’s a very SMALL sample of the much longer list: @alemarahweb, @HSMPress @AnonymousIRC, @wikileaks,@anonyops, @barretbrownlol, @DiscordiAnon

and his statistics,

In all this ‘curiosity pwned the cat’ sting went on for 5 days un-noticed.

Here’s some facts and figures on how it went:

  • Over 1200 curious netizens scanned the QR-Code.
  • ^ Of those over 500 devices reverse shelled back to the listening server.
  • ^^ Of those, a significant number were on the ‘shit-list’ and as such treated as valid targets.

 

Tags: boocodeexploitsmart phonethe jester
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

BreachForums Owner Arrested and Charged

by Paul Anderson
March 17, 2023
0
BreachForums Owner Arrested and Charged

On Wednesday afternoon, federal agents arrested a man in Peekskill, New York, for allegedly running a dark web data breach site known as "BreachForums." The suspect, Conor Brian...

Read more

Plex media server seen exploited in the wild utilizing a 3 year old RCE

by Kyle
March 11, 2023
0
Plex RCE responsible-for lastpass breach

CISA, the cybersecurity and infrastructure agency, has included a severe remote code execution (RCE) vulnerability in the Plex Media Server, which is nearly three years old, in its...

Read more

New TPM 2.0 exploit attackers to access or overwrite sensitive data

by Paul Anderson
March 5, 2023
0
New TPM 2.0 Exploit

Two buffer overflow vulnerabilities have been discovered in the Trusted Platform Module (TPM) 2.0 specification, which could give cybercriminals unauthorized access to or the ability to overwrite sensitive...

Read more

Stolen credit card market BidenCash leaks over 2 million credit cards

by Paul Anderson
March 3, 2023
0
Stolen credit card market BidenCash leaks over 2 million credit cards

BidenCash, a marketplace that focuses on carding, has leaked a database of 2,165,700 credit and debit cards to celebrate its first anniversary. Instead of keeping the leak a...

Read more

Google reports a rise in ransomware attacks

by Paul Anderson
July 15, 2022
0
Google reports a rise in ransomware attacks

In the 3rd issue of the recently released, Threat Horizons, Google's Cybersecurity Action Team (GCAT) provides organizations with information about emerging risks and actionable mitigation. Bad actors have...

Read more
Next Post
Police plan to raid The Pirate Bay for the Second time

Police plan to raid The Pirate Bay for the Second time

Related News

NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Netwire RAT seized by FBI and other worldwide police agencies

Netwire RAT seized by FBI and other worldwide police agencies

March 16, 2023
The Emotet botnet returns and is sending a slew of malicious emails

The Emotet botnet returns and is sending a slew of malicious emails

March 14, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.