Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
🐜 CVE-2022-24942 Heap-based buffer overflow in Silicon Labs Gecko SDK (found via automated binary analysisπŸ–₯️)
πŸ—£attilaszia

Skimming the discovery section I saw a mention of a taint tracking module, curious about what other high-level concepts the zero-day analysis tool uses (if it's possible for you to share, I get that you have IP to protect).

Are there any e.g. whitepapers about how the system as a whole works? I'm somewhat knowledgeable about fuzzing and various approaches to that (basic coverage-guided mutation stuff, search-based, grammar-based, etc), curious if that general theory is what the dynamic analysis is based on or if there are other types of dynamic analysis I should go read up on.
πŸ‘€captain_zavec

PRIS looks interesting however I wouldn't be comfortable uploading firmware blobs to the cloud for analysis by PRIS
πŸ‘€WindyDaysAreWindy

Just read your article about log4j incident really cool. Keep the good work!
πŸ‘€waitwatidonteven


πŸŽ–@malwr
How I created a botnet and evaded AV and endpoint detection with one repo
πŸ—£bilbo_begones

Great tool to add too and methods, been thinking of making my own but it's like making a puzzle I'm reverse
πŸ‘€drugged_programmer


πŸŽ–@malwr
Nice reading from 2020 on backdoored counterfeit Cisco equipment.
Credits @FSecure

https://labs.withsecure.com/content/dam/labs/docs/2020-07-the-fake-cisco.pdf

#backdoor #infosec #malware #cybersecurity
πŸ—£0xor0ne


πŸŽ–@malwr
File Analysis Suite enable you to quickly and efficiently reduce information risk, analyze, optimize, and secure employee access to critical data. See how in @MicroFocusSec's new #DataProtection white paper: http://ms.spr.ly/60125enQj #DataSecurity #DataPrivacy #CyberResilience
πŸ—£MicroFocus


πŸŽ–@malwr
Finding the right decompiler for Python bytecode can be a pain because there are so many.

I compiled this table to check the supported versions
πŸ—£struppigel


πŸŽ–@malwr
πŸ‘1
If you want to know what its like to be grilled as a forensic expert watch this. From the Murdaugh trial today.
πŸ—£MDCDF

Thanks. I hate it.
πŸ‘€carandfreedomgeek2

Solid one. Another is the kid in Michigan for that shooting. Thanks for posting a link OP!
πŸ‘€bigt252002

When does the expert testimony start?
πŸ‘€FabsudNalteb


πŸŽ–@malwr
New video drop! In this video, we'll explore more #yara basics by looking into #ascii versus #wide char strings. We'll also talk string obfuscation and use the #xor modifier.

https://youtu.be/J9Qr8Vfe9_s
πŸ—£jstrosch


πŸŽ–@malwr
Indirect Prompt Injection on Bing Chat : https://greshake.github.io/

New ways of breaking app-integrated LLMs : https://github.com/greshake/llm-security

Paper : https://arxiv.org/pdf/2302.12173.pdf
πŸ—£binitamshah


πŸŽ–@malwr
Fortinet's James Slaughter writes about the MyDoom worm (also known as Novarg and Mimail) that was first discovered in 2004, but which continues to operate well beyond expectations, with fresh infections still occurring in the wild. https://www.fortinet.com/blog/threat-research/just-because-its-old-doesnt-mean-you-throw-it-away-including-malware
πŸ—£virusbtn


πŸŽ–@malwr
Analysis of BlackLotus UEFI bootkit - Bypasses UEFI Secure Boot even on fully updated Windows 11 systems (It brings legit yet vulnerable binaries to the victim system to exploit CVE-2022-21894 & bypass UEFI Secure Boot) : https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/ credits @smolar_m
πŸ—£binitamshah


πŸŽ–@malwr