Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
ZeusCloud - an open-source cloud security platform
Sharing something we're in the early innings of developing: https://github.com/Zeus-Labs/ZeusCloud

Have heard from many devops friends that they often get charged w/ managing security. Hope to get your feedback on if this would be helpful!

ZeusCloud is an open-source cloud security platform that thinks like an attacker! ZeusCloud works by:

1. Identifying risks across your cloud environments (e.g. misconfigurations, identity weakness, vulnerabilities, etc.)
2. Prioritizing those risks based on toxic risk combinations an attacker may exploit.
3. Remediating by giving step by step instructions on how to fix the risk findings.
4. Monitoring compliance - track your PCI DSS, SOC 2, GDPR, CIS goals.

So far, we’ve added misconfiguration checks and common identity-based attack paths for AWS. Up next on our roadmap are network/access graph visualizations of your entire cloud environment, vulnerability scanning, and secret scanning!

Check out our GitHub (Licensed Apache 2.0): https://github.com/Zeus-Labs/ZeusCloud

Play around with our Sandbox environment: https://demo.zeuscloud.io

Get Started (free/self-hosted): https://docs.zeuscloud.io/introduction/get-started
πŸ—£VariousAd5147

This looks very cool! Is there a way to add exclusions to rules?
πŸ‘€thescrambler1979

This is quite interesting. I've had something a bit similar in mind but instead I will take a better look and check if I could just contribute here.
πŸ‘€puputtiap

This product is similar to Selefra, https://github.com/selefra/selefra
πŸ‘€Disastrous_Pie7425


πŸŽ–@malwr
What could these mysterious β€œalign” items in the disassembly mean? Igor is here to clarify 🌐 https://hex-rays.com/blog/igors-tip-of-the-week-133-alignment-items/?utm_source=Social-Media-Post&utm_medium=Twitter&utm_campaign=Igor-Tip-133

#IgorsTipOfTheWeek #IDAtips #IDAPro
πŸ—£HexRaysSA


πŸŽ–@malwr
VMware-player-14.1.3-9474260 how can I extract filesystem data from the stored files?
Hi,

So I installed the above version of VMware and it would not run on either my laptop or computer as a result of both not having some features it apparently requires in the hardware/BIOS (virtualisation was enabled however it complained about using an Intel CPU on the laptop. Curiously VirtualBox works fine on both devices. Anyway, is there a means of which I can merely extract all the contents of the saved .vmx machine without manually running the machine? Thanks in advance.
πŸ—£Man_in_the_uk

This is now resolved, for some reason virtual box was able to run it on
my laptop but when posting this whilst trying to do this on a computer
it did not work.
πŸ‘€Man_in_the_uk

OvfTool would do the conversion to *.ovf

https://developer.vmware.com/web/tool/4.5.0/ovf-tool

Personally prefer the VMware products and wish for return of VMware Server for Linux :-)
πŸ‘€tgbauer

OK so having taken the original vmdk files to my brothers computer he can't access via the virtual office box either. So I have to see if there's a way to save the windows seven vm in such a way I can get it to boot up in virtual box. I have read you can transfer a installation from one computer to another but I don't know if the fact a hdd has things like a bootloader will be an issue, any ideas? Thanks for your help.
πŸ‘€Man_in_the_uk


πŸŽ–@malwr
Synthetic Memory Protections: An update on ROP mitigations [PDF](https://www.openbsd.org/papers/csw2023.pdf)
πŸ—£Gallus

Brief summary leaving out a ton of details:

Looks like OpenBSD is/has introduced some new exploit mitigations that work to hinder ROP-based exploited chains. There are four new mitigations

Immutable mappings (permissions) - Mappings can be marked as immutable so the mappings rwx permissions cannot be modified after that point, nor can the page be unmapped and remapped with different permissions. So you can't use a ROP chain to make some page you can get data in executable.

Xonly - eXecute Only memory - Memory that can be mapped as executable but not readable. Mainly this tries to prevent attacks from being able to find ROP gadgets in the first place, if they can't read the executable code they can't find gadgets. Of course if you have access to the original binaries then you can get the executable data from there, but it prevents Blind ROP style attacks.

I was surprised to see they had an amd64 implementation using the RPKU register (only on newer CPUs). I can't comment much on the implementation since I'm unfamiliar with how that aspect works, but it did surprise me.

There is also a kernel enforced XOM, I'm not sure how effective it will be though. It seems like it just basically validates addresses on copyin calls. So pure-userland/CPU reads wouldn't trip this check, though I'm sure there are some cases it'll stop.

Stack Protection - This one is a meant to prevent stack pivots, which is where you use a ROP gadget to move the stack to a completely new region of memory, usually off the stack somewhere the attacker has more control. To do this pages mapped for the stack get marked, and when there is a syscall the kernel verifies the stack pointer still points to a stack page otherwise it kills the program.


Execute Syscall Protection - Restricts where syscalls can originate from, on syscall the instruction pointer/program counter must point to a region where syscalls are permitted. This prevents chains that create an executable section to dump shellcode into and execute that. Forcing chains to use an existing syscall gadget.

----

Honestly, an interesting set of mitigations. Nothing that is game changing, but as they say, they are all steps that make exploitation most costly and difficult.
πŸ‘€PM_ME_YOUR_SHELLCODE


πŸŽ–@malwr
πŸ‘1
Wireshark Experts! I need your help. Does this look like malicious network activity (Spoofing) to you?
The Destination Addresses:

52.112.107.86, 52.112.107.113, 52.112.107.80, and 52.112.107.12 All have the same MAC address: 9c:1e:95:23:2a:70

As does the 52.35.31.120 address.

The 192.168.1.70 and .71 addresses I believe to be a server and client respectively.

Any insight or help would be greatly appreciated!

https://preview.redd.it/7ms5lpdlnjqa1.png?width=2143&format=png&auto=webp&v=enabled&s=67c06172bc714f2f99352f57876e424c2845d932
πŸ—£SmiIeyMcgee

With the limited info provided, what I can say is it looks like .70 is running teams and .71 is a computer browsing the internet, possibly a Firefox browser.

https://www.virustotal.com/gui/ip-address/52.35.31.120

Your assumption that these are β€œthe client and the server” appears to be incorrect and they are both hosts on your local network. The 192.168. tells you these are addresses in your local network and would not be a server unless you are running a homelab of some sort.

All of the STUN traffic is contacting Microsoft-owned IP space, over the STUN port, which is used for VOIP as stated by other commenters. The reverse DNS makes it look like a Teams relay.

https://www.virustotal.com/gui/ip-address/52.112.107.86

https://www.speedguide.net/port.php?port=3478

The reason all of the destination MAC addresses are the same is because at that layer, you will only be getting the local destination MAC address, i.e. the local destination of the device routing traffic destined for the internet. Given that the OUI belongs to β€œActionTek Electronics”, I’d say you’re looking at your router’s MAC address.

https://www.wireshark.org/tools/oui-lookup.html
https://www.actiontec.com

With the provided information, there is nothing here that is explicitly concerning.
πŸ‘€mossoakbear

Since you have asked about the MAC address, I'm assuming you're concerned with ARP poisoning? The MAC address for Internet bound traffic, which this is, will all be the same and should match the MAC address for your Default Gateway (Router).

STUN UDP 3478 traffic to that IP space would be normal unless there's other information.https://learn.microsoft.com/en-us/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide#skype-for-business-online-and-microsoft-teams
πŸ‘€TechFemme

It's difficult to give an accurate answer without knowing a bit of background to the investigation but some info that could help...

The STUN protocol is used for VoIP services and the IPs seem to resolve to MS. Do you have a MS Communication Server in your environment? Or any other VoIP service like Skype for business?

The packets are often logged as malformed or don't get decoded as wireshark simply doesn't have the correct decoders for this data. You may be able to find a plugin depending on the service being used.

STUN packets have been exploited for DoS attacks in the past so it could be malicious but there isn't enough data to reach a reliable conclusion here.

What alerted you to this activity in the first place? Any other suspicious or unusual activity within the same timeframe?
πŸ‘€tommythecoat


πŸŽ–@malwr
Efficient SIEM and Detection Engineering in 10 steps
πŸ—£mszymczyk

SIEM is the biggest snake oil of the security industry. It never ceases to amaze me how much of a silver bullet people think it is that will save you from everything. Don’t get me wrong it is a valuable detective control if implemented properly, if done poorly it’s a great way to pour money down the drain.
πŸ‘€Big_baddy_fat_sack


πŸŽ–@malwr
The US Military Cyber Professionals Associatian calls for the creation of a US Cyber Force - the Brits have one and the US want one too
πŸ—£digicat

They need to get rid of the space force, and implement a cyber force
πŸ‘€clear-carbon-hands

As a guy in one of the military cyber forces, please no. The issues with conducting cyber operations won’t go away if we all wear the same uniform
πŸ‘€Grumps-Tucan


πŸŽ–@malwr
Is there a way to make the name field of a global structure wider? I can't read the method names
πŸ—£fwork

Yes, one of the buttons on top bar of the listing opens a block of various headers. You can resize those headers just as table headers and by that change the width of the listing contents.
πŸ‘€d_stroid


πŸŽ–@malwr
Time Travel Debugging IDA plugin, ttddbg, 1.1.0 is out with new tracing feature ! Based on #IDA database, arguments and return value are pretty-printed !

Enjoy βœˆοΈπŸ›°οΈπŸš

https://github.com/airbus-cert/ttddbg
πŸ—£citronneur


πŸŽ–@malwr
πŸ‘1
Credits : packetlife.net
πŸ—£patidarayush11


πŸŽ–@malwr
Bypassing PowerShell Strong Obfuscation https://i5c.us/d29692
πŸ—£sans_isc


πŸŽ–@malwr
πŸ‘1
I made a writeup on #Magniber #ransomware (from 2022) demonstrating the capabilities of the latest #TinyTracer: https://hshrzd.wordpress.com/2023/03/30/magniber-ransomware-analysis/
πŸ—£hasherezade


πŸŽ–@malwr
πŸ’˜1