Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
The VB Conference is a great place to share your research with the security community. Submit your proposals for papers by 5 April for a chance to be part of one of the longest running security conferences in the world. #'vb2023 https://www.virusbulletin.com/conference/vb2023/call-papers/
πŸ—£virusbtn


πŸŽ–@malwr
BlackBerry has posted a report on a new APT-C-36 (also known as Blind Eagle) campaign, where the threat actor impersonated a Colombian government tax agency to target key industries in Colombia. https://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia
πŸ—£virusbtn


πŸŽ–@malwr
Quick introduction for reverse engineering beginners to Cutter (Rizin GUI) by @Jacob_Pimental

https://www.goggleheadedhacker.com/post/intro-to-cutter

#cutter #reverseengineering #beginner #infosec
πŸ—£0xor0ne


πŸŽ–@malwr
RIG Exploit Kit (In-Depth Analysis) : https://www.prodaft.com/m/reports/RIG___TLP_CLEAR-1.pdf (pdf)
πŸ—£binitamshah


πŸŽ–@malwr
QiAnXin researchers write about the Kaiji botnet and its connection with the Ares group, which owns multiple botnets and provides rental services for DDoS attacks. https://ti.qianxin.com/blog/articles/Kaiji-Botnet-Resurfaces-Unmasking-Ares-Hacking-Group-EN/
πŸ—£virusbtn


πŸŽ–@malwr
An ubiquitous format: DOS MZ Executable.
- the header of LINK.EXE, from IBM PC-DOS 1.0 in 1981
- the DOS stub that is still present in 32b/64b PE files nowadays.
πŸ—£angealbertini


πŸŽ–@malwr
Learning Assembly : https://www.youtube.com/playlist?list=PLHJns8WZXCdvESvdr1BRjo4RHiR1Ylhw9 credits @jstrosch (18 video's)
πŸ—£binitamshah


πŸŽ–@malwr
Frebniis : New Malware Abuses Microsoft IIS Feature to Establish Backdoor : https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/frebniis-malware-iis
πŸ—£binitamshah


πŸŽ–@malwr
🐜 CVE-2022-24942 Heap-based buffer overflow in Silicon Labs Gecko SDK (found via automated binary analysisπŸ–₯️)
πŸ—£attilaszia

Skimming the discovery section I saw a mention of a taint tracking module, curious about what other high-level concepts the zero-day analysis tool uses (if it's possible for you to share, I get that you have IP to protect).

Are there any e.g. whitepapers about how the system as a whole works? I'm somewhat knowledgeable about fuzzing and various approaches to that (basic coverage-guided mutation stuff, search-based, grammar-based, etc), curious if that general theory is what the dynamic analysis is based on or if there are other types of dynamic analysis I should go read up on.
πŸ‘€captain_zavec

PRIS looks interesting however I wouldn't be comfortable uploading firmware blobs to the cloud for analysis by PRIS
πŸ‘€WindyDaysAreWindy

Just read your article about log4j incident really cool. Keep the good work!
πŸ‘€waitwatidonteven


πŸŽ–@malwr