Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Quick introduction on how to set up Ghidra for analysing bare metal firmwares by @attifyme

https://blog.attify.com/analyzing-bare-metal-firmware-binaries-in-ghidra/

#reverseengineering #embedded #iot #hacking #beginner
πŸ—£0xor0ne


πŸŽ–@malwr
Want to know from which source file line a specific instruction comes? With the right debug info, IDA can show you that 🌐 https://hex-rays.com/blog/igors-tip-of-the-week-130-source-line-numbers/?utm_source=Social-Media-Post&utm_medium=Twitter&utm_campaign=Igor-Tip-130

#IgorsTipOfTheWeek #IDAtips #IDAPro
πŸ—£HexRaysSA


πŸŽ–@malwr
Here’s a tutorial on how to unpack Android APKs with the Medusa framework!

This is an alternative method of decoding using dynamic analysis rather than static analysis which I used in my previous video: Writing a Custom Android Decryptor in Java.

https://youtu.be/ffM5R2Wfl0A
πŸ—£lauriewired


πŸŽ–@malwr
I have written a brief article explaining how compilation units matching work in #Diaphora:

https://github.com/joxeankoret/diaphora/blob/master/doc/articles/compilation_units.md
πŸ—£matalaz


πŸŽ–@malwr
I just published my implementation of call stack spoofing using hardware breakpoints 😁
Works for syscalls and APIs, supports x64, x86 and WoW64.
https://www.coresecurity.com/blog/hardware-call-stack
πŸ—£s4ntiago_p


πŸŽ–@malwr
The Red Report 2023 β€” A comprehensive analysis of the most prevalent TTPs used in 2022, and how they were leveraged by threat actors. Based on an in-depth analysis of over 500,000 real-world malware samples collected from a wide range of sources.

https://drive.google.com/file/d/1Rp2QF4e5-zvdtPJApaiRQEGtscweb8SV/view
πŸ—£snkhan


πŸŽ–@malwr
πŸ‘1
Researchers from The DFIR Report present a review of 2022 in which they look at the most prevalent types of intrusions, the most common TTPs used to infiltrate networks, and provide predictions on what they expect to see in the coming year. https://thedfirreport.com/2023/03/06/2022-year-in-review/
πŸ—£virusbtn


πŸŽ–@malwr
Another tool for the upcoming Maldev Academy course! This tool is part of the entropy reduction module.
https://github.com/Maldev-Academy/EntropyReducer
πŸ—£NUL0x4C


πŸŽ–@malwr
AhnLab's ASEC team describe a recent Lazarus attack in which the affected company used a vulnerable version of a certificate program commonly used by public Korean institutions & universities, & the software’s 0-day vulnerability was used for infiltration. https://asec.ahnlab.com/en/48810/
πŸ—£virusbtn


πŸŽ–@malwr
In the latest edition of the Ransomware Roundup Fortinet reseachers cover the Sirattacker and ALC ransomware. https://www.fortinet.com/blog/threat-research/ransomware-roundup-sirattacker-acl
πŸ—£virusbtn


πŸŽ–@malwr
πŸ‘1