Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Time Travel Debugging IDA plugin, ttddbg, 1.1.0 is out with new tracing feature ! Based on #IDA database, arguments and return value are pretty-printed !

Enjoy βœˆοΈπŸ›°οΈπŸš

https://github.com/airbus-cert/ttddbg
πŸ—£citronneur


πŸŽ–@malwr
πŸ‘1
Credits : packetlife.net
πŸ—£patidarayush11


πŸŽ–@malwr
Bypassing PowerShell Strong Obfuscation https://i5c.us/d29692
πŸ—£sans_isc


πŸŽ–@malwr
πŸ‘1
I made a writeup on #Magniber #ransomware (from 2022) demonstrating the capabilities of the latest #TinyTracer: https://hshrzd.wordpress.com/2023/03/30/magniber-ransomware-analysis/
πŸ—£hasherezade


πŸŽ–@malwr
πŸ’˜1
Walk through an incident where initial access was obtained through exploitation of CVE-2023-0669 (Go AnyWhere MFT) a day after the release of the vuln and 4 days before a patch was released. Also, I have some thoughts on vuln adoption by criminals.

https://securityintelligence.com/posts/x-force-prevents-zero-day-from-going-anywhere/
πŸ—£TactiKoolSec


πŸŽ–@malwr
❀1πŸ’˜1
Supply chain attack in 3CX Windows Electron DesktopApp
πŸ—£qwerty0x41

It should also be noted that the MacOS version was also trojaned. If you have installed 3CXDesktopApp-18.12.416.dmg (SHA1 3DC840D32CE86CEBF657B17CEF62814646BA8E98), you have a trojaned version.

Since it had only one C2 domain hard coded and that is offline, the malware is dormant.

Still, burn it with fire.
πŸ‘€CrimsonNorseman

Some IOCs posted by a user on the 3CX forum: ~~https://www.3cx.com/community/threads/3cx-icos.119967/#post-559156~~

EDIT: thread was removed, refer to https://www.sentinelone.com/blog/smoothoperator-ongoing-campaign-trojanizes-3cx-software-in-software-supply-chain-attack/#heading-5 for what seems to be up to date IOCs
πŸ‘€qwerty0x41

Supply chain? So what dependency was compromised/exploited? Electron itself or a node.js library?
πŸ‘€iliark


πŸŽ–@malwr
πŸ€”1
Our team from @Unit42_Intel released a blog related to 3CXDesktopApp supply chain attack. Enjoy!

https://unit42.paloaltonetworks.com/3cxdesktopapp-supply-chain-attack/

#dfir #supplychainattack #Unit42
πŸ—£r3nzsec


πŸŽ–@malwr
https://github.com/ggerganov/kbd-audio

this tool lets you extract text from an audio recording of keyboard strokes, right now, for free

i am not making this shit up, you can potentially steal a password from an audio recording in an office
πŸ—£f4micom


πŸŽ–@malwr
πŸ€”2
πŸ”If you are looking for a comprehensive overview of the current #3CX supply chain attack, I created a diagram that shows the attack flow!πŸ’₯I'll update as soon as the analysis progresses. Stay tuned for the MacOS edition! #cybersecurity #infosec #supplychainattack #3CXpocalypse
πŸ—£fr0gger_


πŸŽ–@malwr
πŸ‘1
Proofpoint researchers have observed recent espionage-related activity by TA473 (Winter Vivern). TA473 has continuously leveraged an unpatched Zimbra vulnerability to target webmail portals of NATO-aligned governments in Europe. https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability
πŸ—£virusbtn


πŸŽ–@malwr
Fortinet researchers have observed several attack bursts targeting Cacti & Realtek vulnerabilities, spreading ShellBot & Moobot malware. In an article they examine the payloads of these two attacks and the resulting malware behaviour. https://www.fortinet.com/blog/threat-research/moobot-strikes-again-targeting-cacti-and-realtek-vulnerabilities
πŸ—£virusbtn


πŸŽ–@malwr