Desde Chile con Malware (From Chile with Malware): This blog post provides a short update on our ongoing tracking of infrastructure associated with IcedID.
π£digicat
π@malwr
π£digicat
π@malwr
Team-Cymru
Team Cymru: From Chile with Malware - Tech Company Insights
Learn the truth about the "From Chile with Malware" campaign in this insightful blog post from Team Cymru. Discover the real origins of this threat and how it highlights the need for greater cybersecurity awareness.
π€1
Interesting writeup about reverse engineering embedded/IoT devices (MikroTik router) by @hgarrereyn and @__comedian
Blog post: https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/
Slides (RECon): https://github.com/MarginResearch/resources/blob/83e402a86370f7c3acf8bb3ad982c1fee89c9b53/documents/Pulling_MikroTik_into_the_Limelight.pdf
#iot #embedded #mikrotik #routeros #reverseengineering #infosec #cybsersecurity
π£0xor0ne
π@malwr
Blog post: https://margin.re/2022/06/pulling-mikrotik-into-the-limelight/
Slides (RECon): https://github.com/MarginResearch/resources/blob/83e402a86370f7c3acf8bb3ad982c1fee89c9b53/documents/Pulling_MikroTik_into_the_Limelight.pdf
#iot #embedded #mikrotik #routeros #reverseengineering #infosec #cybsersecurity
π£0xor0ne
π@malwr
The VB Conference is a great place to share your research with the security community. Submit your proposals for papers by 5 April for a chance to be part of one of the longest running security conferences in the world. #'vb2023 https://www.virusbulletin.com/conference/vb2023/call-papers/
π£virusbtn
π@malwr
π£virusbtn
π@malwr
BlackBerry has posted a report on a new APT-C-36 (also known as Blind Eagle) campaign, where the threat actor impersonated a Colombian government tax agency to target key industries in Colombia. https://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia
π£virusbtn
π@malwr
π£virusbtn
π@malwr
Quick introduction for reverse engineering beginners to Cutter (Rizin GUI) by @Jacob_Pimental
https://www.goggleheadedhacker.com/post/intro-to-cutter
#cutter #reverseengineering #beginner #infosec
π£0xor0ne
π@malwr
https://www.goggleheadedhacker.com/post/intro-to-cutter
#cutter #reverseengineering #beginner #infosec
π£0xor0ne
π@malwr
RIG Exploit Kit (In-Depth Analysis) : https://www.prodaft.com/m/reports/RIG___TLP_CLEAR-1.pdf (pdf)
π£binitamshah
π@malwr
π£binitamshah
π@malwr
QiAnXin researchers write about the Kaiji botnet and its connection with the Ares group, which owns multiple botnets and provides rental services for DDoS attacks. https://ti.qianxin.com/blog/articles/Kaiji-Botnet-Resurfaces-Unmasking-Ares-Hacking-Group-EN/
π£virusbtn
π@malwr
π£virusbtn
π@malwr
An ubiquitous format: DOS MZ Executable.
- the header of LINK.EXE, from IBM PC-DOS 1.0 in 1981
- the DOS stub that is still present in 32b/64b PE files nowadays.
π£angealbertini
π@malwr
- the header of LINK.EXE, from IBM PC-DOS 1.0 in 1981
- the DOS stub that is still present in 32b/64b PE files nowadays.
π£angealbertini
π@malwr
Let's create Malware in Python : https://www.youtube.com/watch?v=UtMMjXOlRQc
Ref :
1) https://papers.vx-underground.org/papers/Other/VXUG%20Zines/2022-12-04%20-%20About%20malware%20writing%20and%20how%20to%20start.html
2) Writing a simple wiper malware : https://0x00sec.org/t/python-and-malware-writing-a-simple-wiper-malware/31652
π£binitamshah
π@malwr
Ref :
1) https://papers.vx-underground.org/papers/Other/VXUG%20Zines/2022-12-04%20-%20About%20malware%20writing%20and%20how%20to%20start.html
2) Writing a simple wiper malware : https://0x00sec.org/t/python-and-malware-writing-a-simple-wiper-malware/31652
π£binitamshah
π@malwr
YouTube
i created malware with Python (it's SCARY easy!!)
Create your Python Malware lab: https://ntck.co/linode (you get a $100 Credit good for 60 days as a new user!)
We are going to write our very own malware in Python!! Itβs actually scary easy to do and it will give you a peek behind the curtain of how badβ¦
We are going to write our very own malware in Python!! Itβs actually scary easy to do and it will give you a peek behind the curtain of how badβ¦
Learning Assembly : https://www.youtube.com/playlist?list=PLHJns8WZXCdvESvdr1BRjo4RHiR1Ylhw9 credits @jstrosch (18 video's)
π£binitamshah
π@malwr
π£binitamshah
π@malwr