Malware Shredder
malware-shredder.bsky.social
Malware Shredder
@malware-shredder.bsky.social
I'm a malware analyst and a security researcher.

Contacts:

E-mail: [email protected]
Discord: malware.shredder
Reposted by Malware Shredder
Google Gemini AI Bot Hijacks Smart Homes, Turns Off the Lights
Google Gemini AI Bot Hijacks Smart Homes, Turns Off the Lights
Using invisible prompts, the attacks demonstrate a physical risk that could soon become reality as the world increasingly becomes more interconnected with artificial intelligence.
www.darkreading.com
August 6, 2025 at 8:54 PM
Reposted by Malware Shredder
'ReVault' Security Flaws Impact Millions of Dell Laptops
'ReVault' Security Flaws Impact Millions of Dell Laptops
The now-patched vulnerabilities exist at the firmware level and enable deep persistence on compromised systems.
www.darkreading.com
August 6, 2025 at 9:39 PM
Reposted by Malware Shredder
Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams
Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams
thehackernews.com
August 6, 2025 at 9:44 PM
Reposted by Malware Shredder
CVE-2025-7770 - Tigo Energy CCA Predictable Session ID Vulnerability
CVE ID : CVE-2025-7770

Published : Aug. 6, 2025, 9:15 p.m. | 2 hours, 9 minutes ago

Description : Tigo Energy's CCA device is vulnerable to insecure session ID generation in their remote API. The sessio...
CVE-2025-7770 - Tigo Energy CCA Predictable Session ID Vulnerability
Tigo Energy's CCA device is vulnerable to insecure session ID generation in their remote API. The session IDs are generated using a predictable method based on the current timestamp, allowing attackers to recreate valid session IDs. When combined with the ability to circumvent session ID requirements for certain commands, this …
cvefeed.io
August 6, 2025 at 11:50 PM
Reposted by Malware Shredder
CVE-2025-6634 - Autodesk 3ds Max Memory Corruption Vulnerability
CVE ID : CVE-2025-6634

Published : Aug. 6, 2025, 9:15 p.m. | 2 hours, 9 minutes ago

Description : A maliciously crafted TGA file, when linked or imported into Autodesk 3ds Max, can force a Memory Corruption...
CVE-2025-6634 - Autodesk 3ds Max Memory Corruption Vulnerability
A maliciously crafted TGA file, when linked or imported into Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
cvefeed.io
August 6, 2025 at 11:55 PM
Reposted by Malware Shredder
CVE-2025-7768 - Tigo Energy CCA Hard-Coded Credentials Vulnerability
CVE ID : CVE-2025-7768

Published : Aug. 6, 2025, 9:15 p.m. | 2 hours, 9 minutes ago

Description : Tigo Energy's Cloud Connect Advanced (CCA) device contains hard-coded credentials that allow unauthorize...
CVE-2025-7768 - Tigo Energy CCA Hard-Coded Credentials Vulnerability
Tigo Energy's Cloud Connect Advanced (CCA) device contains hard-coded credentials that allow unauthorized users to gain administrative access. This vulnerability enables attackers to escalate privileges and take full control of the device, potentially modifying system settings, disrupting solar energy production, and interfering with safety mechanisms.
cvefeed.io
August 7, 2025 at 12:00 AM
Reposted by Malware Shredder
2025-07-23 (Wednesday): Ten days of scans and probes and web traffic hitting my web server. A #pcap of the traffic is available at www.malware-traffic-analysis.net/2025/07/23/i...
July 24, 2025 at 2:31 AM
Reposted by Malware Shredder
2025-08-01 (Friday): Some info on a #LummaStealer example I found today:

github.com/malware-traf...

#Lumma
github.com
August 2, 2025 at 2:30 AM
Reposted by Malware Shredder
CVE-2025-7769 - Tigo Energy CCA Command Injection Vulnerability
CVE ID : CVE-2025-7769

Published : Aug. 6, 2025, 9:15 p.m. | 2 hours, 9 minutes ago

Description : Tigo Energy's CCA is vulnerable to a command injection vulnerability in the /cgi-bin/mobile_api endpoint when...
CVE-2025-7769 - Tigo Energy CCA Command Injection Vulnerability
Tigo Energy's CCA is vulnerable to a command injection vulnerability in the /cgi-bin/mobile_api endpoint when the DEVICE_PING command is called, allowing remote code execution due to improper handling of user input. When used with default credentials, this enables attackers to execute arbitrary commands on the device that could cause potential …
cvefeed.io
August 7, 2025 at 12:05 AM