Get the latest tech news

We spent $20 to achieve RCE and accidentally became the admins of .mobi


Welcome back to another watchTowr Labs blog. Brace yourselves, this is one of our most astounding discoveries. Summary What started out as a bit of fun between colleagues while avoiding the Vegas heat and $20 bottles of water in our Black Hat hotel rooms - has now seemingly become a

Well, with our WHOIS server clearly working - we figured we’d come back in a few days and see if anything at all reached out to us - giving us us a good excuse to stare at a separate PSIRT response indicating a 2 year lead time to resolve a vulnerability. We hope you’ve enjoyed (and/or been terrified by) today’s post, in which we took control of a chunk of the Internet’s infrastructure, opened up a big slab of juicy attack surface, and found a neat way of undermining TLS/SSL - the fundamental protocol that allows for secure communication on the web. We want to thank the UK's NCSC and the ShadowServer Foundation for rapidly working with us ahead of the release of this research to ensure that the 'dotmobiregistry.net' domain is suitably handled going forwards, and that a process is put in place to notify affected parties.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of RCE

RCE

Photo of admins

admins

Related news:

News photo

A disgruntled employee deleted backups and locked IT admins out of workstations in a failed data extortion attempt

News photo

Ivanti fixes maximum severity RCE bug in Endpoint Management software

News photo

Navigating Endpoint Privilege Management: Insights for CISOs and Admins