Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Threat actors’ use of Microsoft OneNote to spread Qakbot marks a novel malware distribution strategy. Our researchers detail how they deobfuscated and unpacked it, and extracted its configurations. Read more. https://bit.ly/3mlVyPV
πŸ—£TrellixARC


πŸŽ–@malwr
πŸ”₯2
Reverse engineering the runtime code integrity protection of Call of Duty: Black Ops 3
Blog post by @momo5502

https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/

#reverseengineering #learning #infotech #infosec
πŸ—£0xor0ne


πŸŽ–@malwr
Cool blog post for learning Ghidra a little bit more in depth by adding a new ISA (credits Tracy Mosley (@TrenchantARC))

https://trenchant.io/expanding-the-dragon-adding-an-isa-to-ghidra/

#ghidra #reverseengineering #infosec #cybersecurity
πŸ—£0xor0ne


πŸŽ–@malwr
Mandiant, in partnership with the SonicWall PSIRT team, has identified a suspected Chinese campaign running malware on SonicWall devices. The malware has functionality to steal user credentials, provide shell access, and persist through firmware upgrades. https://www.mandiant.com/resources/blog/suspected-chinese-persist-sonicwall
πŸ—£virusbtn


πŸŽ–@malwr
Fortinet researchers analyse ScrubCrypt and other malware delivered by the 8220 Gang threat actor on an exploitable Oracle Weblogic Server. https://www.fortinet.com/blog/threat-research/old-cyber-gang-uses-new-crypter-scrubcrypt
πŸ—£virusbtn


πŸŽ–@malwr
Businesses in IT, healthcare, and manufacturing industries suffered the most ransomware attacks in the fourth quarter of 2022. https://research.trendmicro.com/3ZdZTU2
πŸ—£TrendMicroRSRCH


πŸŽ–@malwr
We've updated the vx-underground malware sample collection. We've added 54,258 samples.

Special thanks to petikvx

Check it out here: https://www.vx-underground.org/malware.html
πŸ—£vxunderground


πŸŽ–@malwr
πŸ“πŸ“πŸ“Please forward posts to the other groups πŸ“πŸ“πŸ“
Malware News pinned Β«πŸ“πŸ“πŸ“Please forward posts to the other groups πŸ“πŸ“πŸ“Β»
Writing a Debugger From Scratch - DbgRs Part 2 - Register State and Stepping https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-2/ #Pentesting #Debugging #CyberSecurity #Infosec
πŸ—£ptracesecurity


πŸŽ–@malwr
πŸ”₯1
Linux Malware Families,What else is popular?
πŸ—£panda_zheng


πŸŽ–@malwr
AhnLab ASEC researchers look into attacks against poorly managed MS-SQL servers. The threat actors used not only Cobalt Strike but also the Netcat tool in their attacks, along with other malware for privilege escalation, information theft & proxy tools. https://asec.ahnlab.com/en/49249/
πŸ—£virusbtn


πŸŽ–@malwr
#Fortinet released security updates to address vulnerabilities affecting multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system. More: http://cisa.gov/news-events/alerts/2023/03/09/fortinet-releases-march-2023-vulnerability-advisories #Cybersecurity #InfoSec #VulnerabilityManagement
πŸ—£CISACyber


πŸŽ–@malwr
vmlinux-to-elf is a useful tool for converting vmlinux/vmlinuz/bzImage/zImage kernel images to and ELF file that can be analyzed with IDA and Ghidra.

https://github.com/marin-m/vmlinux-to-elf

#Linux #kernel #reverseengineering #tool
πŸ—£0xor0ne


πŸŽ–@malwr
πŸ‘1