Professional Documents
Culture Documents
Weekly Stealienews (2nd Week Nov 2021)
Weekly Stealienews (2nd Week Nov 2021)
STEALIENEWS
Week -2 November 15th 2021 Issue #0211
BY: STEALIEN INDONESIA In a subsequent tweet, the group claimed that it “Hackers may have just made
“…got all (symmetric) ps5 root keys.” some big strides towards
FlailOverflow wrote,
possibly jailbreaking the
“They can all be obtained from PlayStation 5 over the
A pair of PlayStation 5 breaches shows the
consoles don’t have protection from attackers software — including per-console weekend,”
taking over its most basic functions. root key, if you look hard enough!” Schneier wrote about the breaches.
Both exploits were posted on Twitter on Nov. 7 The message is practically a dare for other
without disclosure to Sony or specifics, but they would-be hackers to try to access decrypted “Decrypted firmware which is
nonetheless signal potential security problems to firmware files for themselves. possible through
come for the gaming giant. FailOverFlow’s keys, would
PS5 Kernel Exploit
FailOverFlow, which has already earned a potentially allow for hackers to
reputation as a prolific PlayStation jailbreaker The second hack was also posted on Twitter on further reverse-engineer the PS5
group, posted a Nov. 7 tweet which appeared to Nov. 7 by Google security engineer Andy software and potentially develop
contain the PS5 firmware symmetric root keys: Nguyen, who is also known widely in hacker the sorts of hacks that allowed
circles as TheFlow. He was apparently able to
access the PlayStation 5 “Debug Settings” for things like installing Linux,
menu, indicating he has a PS5 kernel exploit. emulators or even pirated games
on past Sony consoles.”
Wolo, which first reported on both breaches,
pointed out this menu is typically only Schneier added that he doesn’t think
on testkit devices and allows quality assurance a hack-proof computer system will ever
and development teams to install package files be a reality.
on the Sony PlayStation 5.
Page 1
Monday November 15, 2021 STEALIENEWS Issue #0211
Access
22955 and CVE-2021-22956):
IT SECURITY TIPS What makes social engineering so dangerous is • Do not open any emails from untrusted
that it preys on human error, much more of a sources. Sound advice under any
wild card—and much harder to track—than circumstances.
taking advantage of vulnerabilities in software
Social engineering refers to a broad
and operating systems. • If an offer seems too good to be true, assume
spectrum of malicious activities using
it is.
psychological manipulation to trick users Social Engineering bad guys try to get at users
into giving away sensitive information. through human psychology and preying on • Lock your laptop whenever you are away
Perpetrators are particularly patient, waiting curiosity. It’s important to go into all cyber- from your workstation.
in the weeds, collecting data and situations with your eyes wide open because
background information on their intended only the users and employees can counter these • Make sure your antivirus/malware software
victims. attacks. is up to date.
Then they gain the victim’s trust and Here are several tips employees can keep in • Be vigilant about cyber security.
provide seemingly harmless reasons for mind to protect themselves (and your
their victims to give up sensitive business):
information.
Page 2
Monday November 15, 2021 STEALIENEWS Issue #0211
Muslims
cryptocurrency, Bitcoin
Page 3