mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 08:47:18 +00:00
[threat-actors] Add Fail0verflow
This commit is contained in:
parent
6cb21d39a7
commit
63bcac4ed9
1 changed files with 15 additions and 0 deletions
|
@ -16652,6 +16652,21 @@
|
||||||
},
|
},
|
||||||
"uuid": "10582c97-90de-4f2b-8e4d-21513c3971fc",
|
"uuid": "10582c97-90de-4f2b-8e4d-21513c3971fc",
|
||||||
"value": "Storm-1679"
|
"value": "Storm-1679"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Fail0verflow is a hacking group known for exploiting vulnerabilities in gaming consoles, notably the Nintendo Wii and PlayStation 3. They utilized techniques such as RAM shorting, buffer overflow, and a signing bug to achieve code execution and develop the Homebrew Channel for the Wii. In 2010, they compromised an ECDSA key for the PS3, and later announced the retrieval of PS5 symmetric root keys, enabling the potential for custom firmware and homebrew software. Their exploits often involve kernel access and have raised concerns about the implications for piracy and litigation in the gaming community.",
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://blog.0x7d0.dev/history/how-the-nintendo-wii-security-was-defeated/",
|
||||||
|
"https://arstechnica.com/gaming/2021/11/uncovered-ps5-encryption-keys-are-the-first-step-to-unlocking-the-console/",
|
||||||
|
"https://malware.news/t/playstation-5-hacked-twice/54441/1"
|
||||||
|
],
|
||||||
|
"synonyms": [
|
||||||
|
"Team Twiizer"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"uuid": "096c57c1-263f-463e-8089-e553872db149",
|
||||||
|
"value": "Fail0verflow"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 313
|
"version": 313
|
||||||
|
|
Loading…
Reference in a new issue