Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Here is a ETW based POC to monitor for (some) direct and indirect syscalls. Should find multiple open source implementations trying to avoid userlandhooks.

https://github.com/thefLink/Hunt-Weird-Syscalls
๐Ÿ—ฃthefLinkk


๐ŸŽ–@malwr
๐Ÿ‘1
Hey, FIRSTies! After much dedicated work, the #EthicsSIG has published their #CaseStudies to the FIRST website! Check out the encompassing document here: http://ow.ly/rG2S50NNbJt
๐Ÿ—ฃFIRSTdotOrg


๐ŸŽ–@malwr
c2detect: Search for c2 servers by listener outside https://github.com/michael2to3/c2-search-netlas
๐Ÿ—ฃ_r_netsec


๐ŸŽ–@malwr
dnstop โ€“ Monitor and display DNS server traffic on your network https://www.cyberciti.biz/faq/dnstop-monitor-bind-dns-server-dns-network-traffic-from-a-shell-prompt/ #Linux #Unix #FreeBSD
๐Ÿ—ฃnixcraft


๐ŸŽ–@malwr
EclecticIQ researchers have identified a spear phishing campaign targeting Ukrainian government entities including the Foreign Intelligence Service of Ukraine (SZRU) and Security Service of Ukraine (SSU), likely conducted by APT group Gamaredon. https://blog.eclecticiq.com/exposed-web-panel-reveals-gamaredon-groups-automated-spear-phishing-campaigns
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
VirusTotal's trompi summarises the latest activity of the APT43 group based on the telemetry of its malware toolset, including geographical distribution, lookups, submissions, file types, detection ratios & efficacy of crowd-sourced YARA rules. https://blog.virustotal.com/2023/04/apt43-investigation-into-north-korean.html
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
I have finished my write-up on reversing the Cobalt Strike implementations of indirect syscalls. With thanks to @0xDISREL for suggesting I look at it and supplying a beacon and to @DuchyRE for tips about unpacking and structures.

https://github.com/dodo-sec/Malware-Analysis/blob/main/Cobalt%20Strike/Indirect%20Syscalls.md
๐Ÿ—ฃdodo_sec


๐ŸŽ–@malwr
#VMware released a security update to address a vulnerability in Tools. A remote attacker could likely exploit the vulnerability to take control of an affected system. More at http://cisa.gov/news-events/alerts/2023/04/21/vmware-releases-security-update-aria-operations-logs. #Cybersecurity #InfoSec
๐Ÿ—ฃCISACyber


๐ŸŽ–@malwr
Introducing VirusTotal Code Insight: empowering threat analysis with generative AI. This tool is based on Sec-PaLM (LLM) and helps explaining behavior of suspicious scripts. Code Insight is available now for all our users! More details by @bquintero: https://blog.virustotal.com/2023/04/introducing-virustotal-code-insight.html
๐Ÿ—ฃvirustotal


๐ŸŽ–@malwr
The AhnLab ASEC team analyse a recent coin miner distributed to Linux SSH servers that are being improperly managed. https://asec.ahnlab.com/ko/51680/
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
#yaradbg v0.0.3 is out

1โƒฃ New yara editor: syntax highlighting, showing evaluation res inline, autocomplete, ...
2โƒฃ You can upload pass-protected zip containing malware directly (pass must be" infected")

Not sure who uses it but ping if you do, enjoy :)

https://yaradbg.dev/
๐Ÿ—ฃDissectMalware


๐ŸŽ–@malwr
๐Ÿ‘3
Trend Micro's Don Ovid Ladores analyses recent updates to information stealer ViperSoftX. The new campaign uses DLL sideloading for its arrival & execution technique, a more sophisticated encryption method of byte remapping, & a monthly change in C2 server https://www.trendmicro.com/en_us/research/23/d/vipersoftx-updates-encryption-steals-data.html
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
The latest podcast from Check Point looks into Operation Silent Watch: several human rights activists in Azerbaijan received the same phishing email that delivered them spyware capable of causing significant harm to their personal and professional lives. https://research.checkpoint.com/2023/operation-silent-watch/
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr