Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Want to know from which source file line a specific instruction comes? With the right debug info, IDA can show you that 🌐 https://hex-rays.com/blog/igors-tip-of-the-week-130-source-line-numbers/?utm_source=Social-Media-Post&utm_medium=Twitter&utm_campaign=Igor-Tip-130

#IgorsTipOfTheWeek #IDAtips #IDAPro
πŸ—£HexRaysSA


πŸŽ–@malwr
Here’s a tutorial on how to unpack Android APKs with the Medusa framework!

This is an alternative method of decoding using dynamic analysis rather than static analysis which I used in my previous video: Writing a Custom Android Decryptor in Java.

https://youtu.be/ffM5R2Wfl0A
πŸ—£lauriewired


πŸŽ–@malwr
I have written a brief article explaining how compilation units matching work in #Diaphora:

https://github.com/joxeankoret/diaphora/blob/master/doc/articles/compilation_units.md
πŸ—£matalaz


πŸŽ–@malwr
I just published my implementation of call stack spoofing using hardware breakpoints 😁
Works for syscalls and APIs, supports x64, x86 and WoW64.
https://www.coresecurity.com/blog/hardware-call-stack
πŸ—£s4ntiago_p


πŸŽ–@malwr
The Red Report 2023 β€” A comprehensive analysis of the most prevalent TTPs used in 2022, and how they were leveraged by threat actors. Based on an in-depth analysis of over 500,000 real-world malware samples collected from a wide range of sources.

https://drive.google.com/file/d/1Rp2QF4e5-zvdtPJApaiRQEGtscweb8SV/view
πŸ—£snkhan


πŸŽ–@malwr
πŸ‘1
Researchers from The DFIR Report present a review of 2022 in which they look at the most prevalent types of intrusions, the most common TTPs used to infiltrate networks, and provide predictions on what they expect to see in the coming year. https://thedfirreport.com/2023/03/06/2022-year-in-review/
πŸ—£virusbtn


πŸŽ–@malwr
Another tool for the upcoming Maldev Academy course! This tool is part of the entropy reduction module.
https://github.com/Maldev-Academy/EntropyReducer
πŸ—£NUL0x4C


πŸŽ–@malwr
AhnLab's ASEC team describe a recent Lazarus attack in which the affected company used a vulnerable version of a certificate program commonly used by public Korean institutions & universities, & the software’s 0-day vulnerability was used for infiltration. https://asec.ahnlab.com/en/48810/
πŸ—£virusbtn


πŸŽ–@malwr
In the latest edition of the Ransomware Roundup Fortinet reseachers cover the Sirattacker and ALC ransomware. https://www.fortinet.com/blog/threat-research/ransomware-roundup-sirattacker-acl
πŸ—£virusbtn


πŸŽ–@malwr
πŸ‘1
πŸ”ThreatLabz has identified significant code similarities between the #Nevada and #Nokoyawa #ransomware families including debug strings, command-line arguments and encryption algorithms. More details: https://www.zscaler.com/blogs/security-research/nevada-ransomware-yet-another-nokayawa-variant

IOCs are available here: https://github.com/threatlabz/iocs/tree/main/nokoyawa
πŸ—£Threatlabz


πŸŽ–@malwr
Threat actors’ use of Microsoft OneNote to spread Qakbot marks a novel malware distribution strategy. Our researchers detail how they deobfuscated and unpacked it, and extracted its configurations. Read more. https://bit.ly/3mlVyPV
πŸ—£TrellixARC


πŸŽ–@malwr
πŸ”₯2
Reverse engineering the runtime code integrity protection of Call of Duty: Black Ops 3
Blog post by @momo5502

https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/

#reverseengineering #learning #infotech #infosec
πŸ—£0xor0ne


πŸŽ–@malwr
Cool blog post for learning Ghidra a little bit more in depth by adding a new ISA (credits Tracy Mosley (@TrenchantARC))

https://trenchant.io/expanding-the-dragon-adding-an-isa-to-ghidra/

#ghidra #reverseengineering #infosec #cybersecurity
πŸ—£0xor0ne


πŸŽ–@malwr