Malware News
12.9K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
U.S. Attorney Announces Historic $3.36 Billion Cryptocurrency Seizure And Conviction In Connection With Silk Road Dark Web Fraud | USAO-SDNY
🗣digicat

>today remains the Department’s second largest financial seizure ever

What's the biggest?
👤RamblinWreckGT

Wait...

He technically did nothing wrong. He stole from scumbags. Just because it's tainted doesn't mean he should go to jail. Holy shit.
👤asecuredlife

Infinite money glitch irl:
- Create anonymous account on darknet market
- Exploit race condition to steal bitcoin (You could double spend if you do it fast)
- Quickly transfer bitcoin through a chain of addresses to hide source.
- Wait for hard fork to double your money
- ~~Make stupid opsec fails that lead to you getting caught~~
- Profit.
👤NullVoidPointer


🎖@malwr
Jit-Picking: Differential Fuzzing of JavaScript Engines [PDF](https://mu00d8.me/paper/bernhard22jitpicking.pdf)
🗣Gallus


🎖@malwr
Free online cybercrime intelligence tools from info-stealers data
Find it here

What is it? - this (first to the left) free tool lets you search any domain and discover:

\- How many compromised employees & users a domain (company) has based on a cybercrime database composed of millions of compromised computers worldwide.

\- The external attack surface of that domain that is known to threat actors - each of the URLs have corresponding compromised credentials that are used by threat actors as an initial attack vector.

Why is it useful?

\- Risk assessment - looking up a domain and seeing it has a lot of compromised employees can indicate the company is not up to date with proper security measures, each compromised employee indicates that someone in the company downloaded and executed an info-stealing malware and had all their corporate credentials, personal credentials, cookies, documents, etc stolen by hackers that are using the credentials as an initial attack vector.

\- Assets discovery (External attack surface) - the tool let you see the top 5 URLs that compromised employees & clients had credentials to, often these URLs are not attainable anywhere else because internal URLs accessed by users & employees are not indexed anywhere and cannot be scraped.
🗣Malwarebeasts


🎖@malwr
👍2
Why don't Windows functions begin with a pointless MOV EDI,EDI instruction on x86-64?
🗣aqrit

That instruction wasn't actually pointless. It was a 2 byte instruction that allowed for a short jump. This would allow for hot patching of a function.
👤alittlejolly


🎖@malwr
🔥1
Fuzzing Web Applications using FFuf
FFuf is a fast web fuzzer written in Go. This article explains how to use FFuf to enumerate directories and break authentication in web applications. https://medium.com/@manishmshiva/fuzzing-web-applications-using-ffuf-c4ad74190b72
🗣manishmanalath


🎖@malwr
🔥1