Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
The Red Report 2023 β€” A comprehensive analysis of the most prevalent TTPs used in 2022, and how they were leveraged by threat actors. Based on an in-depth analysis of over 500,000 real-world malware samples collected from a wide range of sources.

https://drive.google.com/file/d/1Rp2QF4e5-zvdtPJApaiRQEGtscweb8SV/view
πŸ—£snkhan


πŸŽ–@malwr
πŸ‘1
Researchers from The DFIR Report present a review of 2022 in which they look at the most prevalent types of intrusions, the most common TTPs used to infiltrate networks, and provide predictions on what they expect to see in the coming year. https://thedfirreport.com/2023/03/06/2022-year-in-review/
πŸ—£virusbtn


πŸŽ–@malwr
Another tool for the upcoming Maldev Academy course! This tool is part of the entropy reduction module.
https://github.com/Maldev-Academy/EntropyReducer
πŸ—£NUL0x4C


πŸŽ–@malwr
AhnLab's ASEC team describe a recent Lazarus attack in which the affected company used a vulnerable version of a certificate program commonly used by public Korean institutions & universities, & the software’s 0-day vulnerability was used for infiltration. https://asec.ahnlab.com/en/48810/
πŸ—£virusbtn


πŸŽ–@malwr
In the latest edition of the Ransomware Roundup Fortinet reseachers cover the Sirattacker and ALC ransomware. https://www.fortinet.com/blog/threat-research/ransomware-roundup-sirattacker-acl
πŸ—£virusbtn


πŸŽ–@malwr
πŸ‘1
πŸ”ThreatLabz has identified significant code similarities between the #Nevada and #Nokoyawa #ransomware families including debug strings, command-line arguments and encryption algorithms. More details: https://www.zscaler.com/blogs/security-research/nevada-ransomware-yet-another-nokayawa-variant

IOCs are available here: https://github.com/threatlabz/iocs/tree/main/nokoyawa
πŸ—£Threatlabz


πŸŽ–@malwr
Threat actors’ use of Microsoft OneNote to spread Qakbot marks a novel malware distribution strategy. Our researchers detail how they deobfuscated and unpacked it, and extracted its configurations. Read more. https://bit.ly/3mlVyPV
πŸ—£TrellixARC


πŸŽ–@malwr
πŸ”₯2
Reverse engineering the runtime code integrity protection of Call of Duty: Black Ops 3
Blog post by @momo5502

https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/

#reverseengineering #learning #infotech #infosec
πŸ—£0xor0ne


πŸŽ–@malwr
Cool blog post for learning Ghidra a little bit more in depth by adding a new ISA (credits Tracy Mosley (@TrenchantARC))

https://trenchant.io/expanding-the-dragon-adding-an-isa-to-ghidra/

#ghidra #reverseengineering #infosec #cybersecurity
πŸ—£0xor0ne


πŸŽ–@malwr
Mandiant, in partnership with the SonicWall PSIRT team, has identified a suspected Chinese campaign running malware on SonicWall devices. The malware has functionality to steal user credentials, provide shell access, and persist through firmware upgrades. https://www.mandiant.com/resources/blog/suspected-chinese-persist-sonicwall
πŸ—£virusbtn


πŸŽ–@malwr
Fortinet researchers analyse ScrubCrypt and other malware delivered by the 8220 Gang threat actor on an exploitable Oracle Weblogic Server. https://www.fortinet.com/blog/threat-research/old-cyber-gang-uses-new-crypter-scrubcrypt
πŸ—£virusbtn


πŸŽ–@malwr
Businesses in IT, healthcare, and manufacturing industries suffered the most ransomware attacks in the fourth quarter of 2022. https://research.trendmicro.com/3ZdZTU2
πŸ—£TrendMicroRSRCH


πŸŽ–@malwr
We've updated the vx-underground malware sample collection. We've added 54,258 samples.

Special thanks to petikvx

Check it out here: https://www.vx-underground.org/malware.html
πŸ—£vxunderground


πŸŽ–@malwr
πŸ“πŸ“πŸ“Please forward posts to the other groups πŸ“πŸ“πŸ“