Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Our team from @Unit42_Intel released a blog related to 3CXDesktopApp supply chain attack. Enjoy!

https://unit42.paloaltonetworks.com/3cxdesktopapp-supply-chain-attack/

#dfir #supplychainattack #Unit42
πŸ—£r3nzsec


πŸŽ–@malwr
https://github.com/ggerganov/kbd-audio

this tool lets you extract text from an audio recording of keyboard strokes, right now, for free

i am not making this shit up, you can potentially steal a password from an audio recording in an office
πŸ—£f4micom


πŸŽ–@malwr
πŸ€”2
πŸ”If you are looking for a comprehensive overview of the current #3CX supply chain attack, I created a diagram that shows the attack flow!πŸ’₯I'll update as soon as the analysis progresses. Stay tuned for the MacOS edition! #cybersecurity #infosec #supplychainattack #3CXpocalypse
πŸ—£fr0gger_


πŸŽ–@malwr
πŸ‘1
Proofpoint researchers have observed recent espionage-related activity by TA473 (Winter Vivern). TA473 has continuously leveraged an unpatched Zimbra vulnerability to target webmail portals of NATO-aligned governments in Europe. https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability
πŸ—£virusbtn


πŸŽ–@malwr
Fortinet researchers have observed several attack bursts targeting Cacti & Realtek vulnerabilities, spreading ShellBot & Moobot malware. In an article they examine the payloads of these two attacks and the resulting malware behaviour. https://www.fortinet.com/blog/threat-research/moobot-strikes-again-targeting-cacti-and-realtek-vulnerabilities
πŸ—£virusbtn


πŸŽ–@malwr
SonicWall researchers analyse a recent AsyncRAT malware variant, finding additional commands support from the C2, a clipper module, a cryptostealer module, a keylogger module, and the ability to prevent the system from going to sleep. https://securitynews.sonicwall.com/xmlpost/asyncrat-variant-includes-cryptostealer-capabilites/
πŸ—£virusbtn


πŸŽ–@malwr
How to avoid the aCropalypse
πŸ—£Gallus

”Buy an iPhone”
πŸ‘€nikanjX

i thought they were all fixed already? shouldn't the answer be just "update yo shit"?
πŸ‘€run_out_of_cake

I am a little confused. Does this only affect PNG? Don't most pixel phones shoot in jpg? Is that also affected?
πŸ‘€digitalend


πŸŽ–@malwr
❀1
πŸ› οΈ .NET malware decompiling challenges: Obfuscations of strings/constants can be tedious. Automate w/ IDA Pro's Python 🐍 interface for MSIL binary patching, even for simple cases: https://threatcat.ch/blog/undo-dotnet-constant-obfuscation-in-ida-pro/
#CyberSecurity #MalwareAnalysis #IDAPro #DotNET
πŸ—£threatcat_ch


πŸŽ–@malwr
YARA is for detection, analysis, IR, TI & more. Its an automation vehicle, a conduit to help you test, store your insights & *applied* to data. Its accessible & fun & can make your hard work & analyses more durable and lasting at scale.

http://yararul.es/

#100daysofYARA
πŸ—£stvemillertime


πŸŽ–@malwr
πŸ¦€Reverse Engineering a Native Desktop Application (Tauri App)

- And solving the CTF Challenge

https://infosecwriteups.com/reverse-engineering-a-native-desktop-application-tauri-app-5a2d92772da5

#infosec #reverseengineering #tauri #rustlang #rust
πŸ—£AstraKernel


πŸŽ–@malwr
A lot of things to learn in this series by greenluigi1 on car Infotainment system hacking

Part 1: https://programmingwithstyle.com/posts/howihackedmycar/
Part 2: https://programmingwithstyle.com/posts/howihackedmycarpart2/
Part 3: https://programmingwithstyle.com/posts/howihackedmycarpart3/

#hacking
πŸ—£0xor0ne


πŸŽ–@malwr
πŸ”₯1