Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Quick introduction for reverse engineering beginners to Cutter (Rizin GUI) by @Jacob_Pimental

https://www.goggleheadedhacker.com/post/intro-to-cutter

#cutter #reverseengineering #beginner #infosec
πŸ—£0xor0ne


πŸŽ–@malwr
RIG Exploit Kit (In-Depth Analysis) : https://www.prodaft.com/m/reports/RIG___TLP_CLEAR-1.pdf (pdf)
πŸ—£binitamshah


πŸŽ–@malwr
QiAnXin researchers write about the Kaiji botnet and its connection with the Ares group, which owns multiple botnets and provides rental services for DDoS attacks. https://ti.qianxin.com/blog/articles/Kaiji-Botnet-Resurfaces-Unmasking-Ares-Hacking-Group-EN/
πŸ—£virusbtn


πŸŽ–@malwr
An ubiquitous format: DOS MZ Executable.
- the header of LINK.EXE, from IBM PC-DOS 1.0 in 1981
- the DOS stub that is still present in 32b/64b PE files nowadays.
πŸ—£angealbertini


πŸŽ–@malwr
Learning Assembly : https://www.youtube.com/playlist?list=PLHJns8WZXCdvESvdr1BRjo4RHiR1Ylhw9 credits @jstrosch (18 video's)
πŸ—£binitamshah


πŸŽ–@malwr
Frebniis : New Malware Abuses Microsoft IIS Feature to Establish Backdoor : https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/frebniis-malware-iis
πŸ—£binitamshah


πŸŽ–@malwr
🐜 CVE-2022-24942 Heap-based buffer overflow in Silicon Labs Gecko SDK (found via automated binary analysisπŸ–₯️)
πŸ—£attilaszia

Skimming the discovery section I saw a mention of a taint tracking module, curious about what other high-level concepts the zero-day analysis tool uses (if it's possible for you to share, I get that you have IP to protect).

Are there any e.g. whitepapers about how the system as a whole works? I'm somewhat knowledgeable about fuzzing and various approaches to that (basic coverage-guided mutation stuff, search-based, grammar-based, etc), curious if that general theory is what the dynamic analysis is based on or if there are other types of dynamic analysis I should go read up on.
πŸ‘€captain_zavec

PRIS looks interesting however I wouldn't be comfortable uploading firmware blobs to the cloud for analysis by PRIS
πŸ‘€WindyDaysAreWindy

Just read your article about log4j incident really cool. Keep the good work!
πŸ‘€waitwatidonteven


πŸŽ–@malwr
How I created a botnet and evaded AV and endpoint detection with one repo
πŸ—£bilbo_begones

Great tool to add too and methods, been thinking of making my own but it's like making a puzzle I'm reverse
πŸ‘€drugged_programmer


πŸŽ–@malwr
Nice reading from 2020 on backdoored counterfeit Cisco equipment.
Credits @FSecure

https://labs.withsecure.com/content/dam/labs/docs/2020-07-the-fake-cisco.pdf

#backdoor #infosec #malware #cybersecurity
πŸ—£0xor0ne


πŸŽ–@malwr