Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Dark Web Hacker ‘Tombstone’ Markets Google Subdomain Vulnerabilities on Cybercrime Forum

    Dark Web Hacker ‘Tombstone’ Markets Google Subdomain Vulnerabilities on Cybercrime Forum

    June 12, 2024

    A dark web hacker that goes by the name “Tombstone” has claimed and advertised multiple vulnerabilities affecting a subdomain affiliated with Google LLC.

    The hacker claimed these flaws on the Russian-language cybercrime forum Exploit and stressed the susceptibility of the domain to XSS-DOM and prototype pollution vulnerabilities.

    Screenshots shared by threat actor Tombstone showcased ‘edu.google.com’ as one of the allegedly impacted domains, raising concerns about potential exploits.

    Tombstone’s post on Exploit lacked a specified price for the vulnerabilities, urging interested parties to initiate private communications for further details. The disclosed vulnerabilities pose significant risks to Google and its associated services, warranting immediate attention to mitigate potential cyber threats.

    “These vulnerabilities are in the software, not the source code Note that I only sell bugs with POC and full proof not exploits With a great price for long-term cooperation in other projects Exchange of Apple, FB, Meta, Microsoft banks”, reads the threat actor post.

    Dark Web Hacker Claims Prototype Pollution and XSS-DOM Vulnerability

    Source: Dark Web

    The vulnerabilities advertised by Tombstone have direct implications for Google LLC, a prominent entity within the IT & ITES industry. Notably, domains such as google.com and edu.google.com have been identified as being at risk, primarily affecting users currently using the Google services. 

    The vulnerabilities disclosed by Tombstone encompass XSS-DOM and prototype pollution, both of which can serve as entry points for malicious cyber activities. XSS-DOM vulnerabilities, in particular, enable threat actors to inject client-side scripts into web pages viewed by other users, potentially leading to session hijacking, phishing attacks, malware distribution, and data theft.

    Prototype pollution vulnerabilities, however, involve manipulating a JavaScript object’s prototype to achieve unintended behavior, often resulting in unauthorized data manipulation or code execution. The combination of these vulnerabilities within Google’s subdomain highlights the critical need for robust cybersecurity measures to safeguard against potential cyberattacks.

    Previous Incidents and Security Research

    Prior to Tombstone’s disclosure, security researcher Henry N. Caga had identified the XSS vulnerability within a Google subdomain, further emphasizing the susceptibility of Google’s infrastructure to such exploits. Caga’s research revealed the presence of a vulnerability within the URL associated with ‘https://aihub.cloud.google.com,’ prompting an in-depth investigation.

    Despite initial challenges in replicating the XSS pop-up, Caga’s persistence ultimately led to the discovery of a double-encoded payload that triggered the vulnerability. Subsequent testing unveiled the widespread nature of the vulnerability across all URLs within the aihub.cloud.google.com domain, accentuating the severity of the issue.

    Following responsible disclosure protocols, Caga promptly reported the findings to Google’s security team, accompanied by comprehensive documentation and proof of concept scripts. Google’s swift response included an upgrade in the issue’s priority and severity levels, acknowledging Caga’s contributions with a reward of $4,133.70, along with a $1,000 bonus for the thoroughness of the report and proof of concept scripts.

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleProtect Your WordPress Site with the .htaccess File: Tutorial and Essential Tips
    Next Article Medusa Ransomware Group Claims Cyberattack on Organizations in USA, Canada

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4831 – TOTOLINK HTTP POST Request Handler Buffer Overflow Vulnerability

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Mitigating Hallucinations in Large Vision-Language Models: A Latent Space Steering Approach

    Machine Learning

    UX in Universal Design Series: Support for Chronic Conditions in Health Systems – 11

    Development

    Flyby tracks and predicts passes of satellites in Earth orbit

    Linux

    Google AI Introduces Patchscopes: A Machine Learning Approach that Trains LLMs to Provide Natural Language Explanations of Their Hidden Representations

    Development

    Highlights

    CVE-2025-47420 – Crestron Automate VX Privilege Escalation Vulnerability

    May 6, 2025

    CVE ID : CVE-2025-47420

    Published : May 6, 2025, 10:15 p.m. | 1 hour, 42 minutes ago

    Description : 266 vulnerability in Crestron Automate VX allows Privilege Escalation.This issue affects Automate VX: from 5.6.8161.21536 through 6.4.0.49.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Key considerations for successful database management during a merger and acquisition

    July 26, 2024

    Hackers Exploit Firefox and Windows Flaws: RomCom’s Advanced Attack Unveiled

    November 27, 2024

    Hackers Repurpose RansomHub’s EDRKillShifter in Medusa, BianLian, and Play Attacks

    March 27, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.