Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
New video drop! In this video, we'll explore more #yara basics by looking into #ascii versus #wide char strings. We'll also talk string obfuscation and use the #xor modifier.

https://youtu.be/J9Qr8Vfe9_s
๐Ÿ—ฃjstrosch


๐ŸŽ–@malwr
Indirect Prompt Injection on Bing Chat : https://greshake.github.io/

New ways of breaking app-integrated LLMs : https://github.com/greshake/llm-security

Paper : https://arxiv.org/pdf/2302.12173.pdf
๐Ÿ—ฃbinitamshah


๐ŸŽ–@malwr
Fortinet's James Slaughter writes about the MyDoom worm (also known as Novarg and Mimail) that was first discovered in 2004, but which continues to operate well beyond expectations, with fresh infections still occurring in the wild. https://www.fortinet.com/blog/threat-research/just-because-its-old-doesnt-mean-you-throw-it-away-including-malware
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
Analysis of BlackLotus UEFI bootkit - Bypasses UEFI Secure Boot even on fully updated Windows 11 systems (It brings legit yet vulnerable binaries to the victim system to exploit CVE-2022-21894 & bypass UEFI Secure Boot) : https://www.welivesecurity.com/2023/03/01/blacklotus-uefi-bootkit-myth-confirmed/ credits @smolar_m
๐Ÿ—ฃbinitamshah


๐ŸŽ–@malwr
Trend Micro's Daniel Lunghi (@thehellu) details the update that Iron Tiger made to the custom malware family SysUpdate in its latest campaign. The custom malware now includes new features and has added malware infection support for the Linux platform. https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
cisagov/decider: A web application that assists network defenders, analysts, and researcher in the process of mapping adversary behaviors to the MITRE ATT&CKยฎ framework.
๐Ÿ—ฃjnazario

I guess I'm trying to understand the place of this tool. Is this the idea if you don't have an existing TIP feeding you intelligence to source and map things on your own?
๐Ÿ‘คasecuredlife

Can someone point me to the benefits of mapping adversary behaviours in the scope of an incident ? I always feel like I do this for higher management, rarely for myself in the scope of forensics/incident analysis. What do I miss?
๐Ÿ‘คbromomotatata


๐ŸŽ–@malwr
Trend Micro researchers analyse a recent malspam campaign distributing the RedLine stealer and targeting the hospitality industry. https://www.trendmicro.com/en_us/research/23/c/managed-xdr-exposes-spear-phishing-campaign-targeting-hospitalit.html
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
ESET researchers analysed a recent Mustang Panda backdoor which is part of an ongoing campaign. MQsTTang (Kumquat) uses the MQTT protocol for C&C communication, one of the benefits of which is that it hides the rest of the infrastructure behind a broker. https://www.welivesecurity.com/2023/03/02/mqsttang-mustang-panda-latest-backdoor-treads-new-ground-qt-mqtt/
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
๐Ÿ‘2