Secureworks researchers look into the infostealer ecosystem. The evolution of criminal marketplaces allows relatively low-skilled threat actors to access tools with advanced capabilities to attack many victims. https://www.secureworks.com/research/the-growing-threat-from-infostealers
π£virusbtn
π@malwr
π£virusbtn
π@malwr
Zscaler's Santiago Vicente & Brett Stone-Gross present a technical analysis of the CryptNet ransomware and look at its close relationship with the Yashma ransomware. https://www.zscaler.com/blogs/security-research/technical-analysis-cryptnet-ransomware
π£virusbtn
π@malwr
π£virusbtn
π@malwr
Symantec researchers analyse the Merdoor backdoor, used very selectively by the Lancefly threat group in attacks targeting organizations in South and Southeast Asia. https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lancefly-merdoor-zxshell-custom-backdoor
π£virusbtn
π@malwr
π£virusbtn
π@malwr
Recently we found a suspicious shellcode running in the memory of a system process. We decided to investigate how the shellcode was initially placed into the process and where on the infected system the threat was hidden.
We named this #malware #Minas π https://kas.pr/fn5y
π£e_kaspersky
π@malwr
We named this #malware #Minas π https://kas.pr/fn5y
π£e_kaspersky
π@malwr
This is interesting reading regarding the .zip TLD. However, it's of near zero consequence to phishing attacks, read it first then I'll explain: https://medium.com/@bobbyrsec/the-dangers-of-googles-zip-tld-5e1e675e59a5
π£troyhunt
π@malwr
π£troyhunt
π@malwr
Medium
The Dangers of Googleβs .zip TLD
Can you quickly tell which of the URLs below is legitimate and which one is a malicious phish that drops evil.exe?
Ppl that run an honeypot: what hosting company are you using? What is your fav software?
Hi all,
Iβd like to run an honeypot in the hope to collect some current malware samples. If you are an honeypot admin, then I have some questions for you:
1) what software are you running? And why?
2) what is the hosting company that is hosting your honeypot/honeypots?
3) How much do you pay every month?
4) what software would you suggest for a cheap/low end VPS?
5) after how much hours/days have you collected the 1st binary sample in your honeypot?
I have done some research and I found an incredible AIO solution called T-POT. It is a collection of the most used honeypots (cowrie, dionaea etc.) but it requires 8+ GB of ram and 150GB of HDD spaceβ¦ so it will not be cheap to host this π
Thanks a lot!
π£Luca-91
I run a custom HTTP honeypot at the edge of my home network and on a cheapy VPS. I'm able to find command injection attempts in payload and headers which usually yield Mirai and Mozi samples.
Overall, I collect the request data and store it in a MySQL table for aggregating stats.
π€issued-username
T-pot, set a few malware files in the server as well
π€dumpsteraccount01
I run 3 honeypots on EC2/Lightsail instances at AWS. I am using mainly Snort/Suricata to detect attacks against the devices - not so much a 'honeypot' but I am in the process of standing up more low-interaction true honeypots on the platform. Lightsail can do fixed cost of like $5/$10/$20 etc price points, overall price with a syslog server to aggregate everything is like $30-40 per month or something, maybe a little less. Hard to tell since I am running lots of other things on AWS.
T-POT is extreme end of honeypots..not worth it for me.
Self-Promotion: https://beesting.tools/
π€panscanner
π@malwr
Hi all,
Iβd like to run an honeypot in the hope to collect some current malware samples. If you are an honeypot admin, then I have some questions for you:
1) what software are you running? And why?
2) what is the hosting company that is hosting your honeypot/honeypots?
3) How much do you pay every month?
4) what software would you suggest for a cheap/low end VPS?
5) after how much hours/days have you collected the 1st binary sample in your honeypot?
I have done some research and I found an incredible AIO solution called T-POT. It is a collection of the most used honeypots (cowrie, dionaea etc.) but it requires 8+ GB of ram and 150GB of HDD spaceβ¦ so it will not be cheap to host this π
Thanks a lot!
π£Luca-91
I run a custom HTTP honeypot at the edge of my home network and on a cheapy VPS. I'm able to find command injection attempts in payload and headers which usually yield Mirai and Mozi samples.
Overall, I collect the request data and store it in a MySQL table for aggregating stats.
π€issued-username
T-pot, set a few malware files in the server as well
π€dumpsteraccount01
I run 3 honeypots on EC2/Lightsail instances at AWS. I am using mainly Snort/Suricata to detect attacks against the devices - not so much a 'honeypot' but I am in the process of standing up more low-interaction true honeypots on the platform. Lightsail can do fixed cost of like $5/$10/$20 etc price points, overall price with a syslog server to aggregate everything is like $30-40 per month or something, maybe a little less. Hard to tell since I am running lots of other things on AWS.
T-POT is extreme end of honeypots..not worth it for me.
Self-Promotion: https://beesting.tools/
π€panscanner
π@malwr
Reddit
From the Malware community on Reddit
Explore this post and more from the Malware community
GitHub - imthenachoman/How-To-Secure-A-Linux-Server: An evolving how-to guide for securing a Linux server. https://github.com/imthenachoman/How-To-Secure-A-Linux-Server
π£akaclandestine
π@malwr
π£akaclandestine
π@malwr
GitHub
GitHub - imthenachoman/How-To-Secure-A-Linux-Server: An evolving how-to guide for securing a Linux server.
An evolving how-to guide for securing a Linux server. - imthenachoman/How-To-Secure-A-Linux-Server
#Sysmon can log FileCreateStreamHash events (ZoneIdentifiers; ADS) since v11.10, which allows us to write a Sigma rule that looks for suspicious files downloaded from .zip Domains #ZipTLD
blog with explanations
https://fabian-voith.de/2020/06/25/sysmon-v11-1-reads-alternate-data-streams/
Rule
https://github.com/SigmaHQ/sigma/pull/4250/files#diff-59c47b72f788177a5a0ad98c0489cd3dfb5cddc7d61a4fb2e94dd688ec15f075
π£cyb3rops
π@malwr
blog with explanations
https://fabian-voith.de/2020/06/25/sysmon-v11-1-reads-alternate-data-streams/
Rule
https://github.com/SigmaHQ/sigma/pull/4250/files#diff-59c47b72f788177a5a0ad98c0489cd3dfb5cddc7d61a4fb2e94dd688ec15f075
π£cyb3rops
π@malwr
Team Cymru's S2 Research Team look at the QakBot infrastructure, drawing out some high-level trends and anomalies based on their ongoing tracking of the malware's command-and-control (C2) infrastructure. https://www.team-cymru.com/post/visualizing-qakbot-infrastructure
π£virusbtn
π@malwr
π£virusbtn
π@malwr
Security researcher @embee_research analyses the Quasar RAT C2 configuration and uses this information to pivot to additional servers utilising Shodan and Censys. https://embee-research.ghost.io/hunting-quasar-rat-shodan/
π£virusbtn
π@malwr
π£virusbtn
π@malwr
Thoth is now usable directly from VS Code, we just released an extension.
https://github.com/FuzzingLabs/thoth/tree/master/vscode-extension
You can generate callgraphs and run all the analyzers for both Cairo and Sierra directly from the UI.
π£FuzzingLabs
π@malwr
https://github.com/FuzzingLabs/thoth/tree/master/vscode-extension
You can generate callgraphs and run all the analyzers for both Cairo and Sierra directly from the UI.
π£FuzzingLabs
π@malwr
Insider Threat Mitigation Guide
Source: Cybersecurity & Infrastructure Security Agency
Download Link:
https://www.cisa.gov/sites/default/files/publications/Insider%20Threat%20Mitigation%20Guide_Final_508.pdf
For more unique resources and tools for the cyber community, please visit:
https://cyberstartupobservatory.com/cyber-startup-observatory-community/
#CyberSecurity #InfoSec #InformationSecurity
π£JMonteagudoE
π@malwr
Source: Cybersecurity & Infrastructure Security Agency
Download Link:
https://www.cisa.gov/sites/default/files/publications/Insider%20Threat%20Mitigation%20Guide_Final_508.pdf
For more unique resources and tools for the cyber community, please visit:
https://cyberstartupobservatory.com/cyber-startup-observatory-community/
#CyberSecurity #InfoSec #InformationSecurity
π£JMonteagudoE
π@malwr
π₯1
New Strain of Sotdas Malware Discovered | Qualys Security Blog https://blog.qualys.com/vulnerabilities-threat-research/2023/05/17/new-strain-of-sotdas-malware-discovered
π£Cyber_O51NT
π@malwr
π£Cyber_O51NT
π@malwr
Qualys
New Strain of Sotdas Malware Discovered | Qualys
There are numerous malicious codes that are currently active on smart devices, such as Ddosf, Dofloo, Gafgyt, MrBlack, Persirai, Sotdas, Tsunami, Triddy, Mirai, Moose, and Satori, among others.
Trend Microβs Fyodor Yarochkin, Zhengyu Dong & Paul Pajares present an overview of the Lemon Groupβs use of pre-infected mobile devices and how this scheme is potentially being developed and expanded to other IoT devices. https://www.trendmicro.com/en_us/research/23/e/lemon-group-cybercriminal-businesses-built-on-preinfected-devices.html
π£virusbtn
π@malwr
π£virusbtn
π@malwr
Excellent series by @LordNoteworthy explaining how virtualization on x86 works
Intro to Virtualization: https://docs.saferwall.com/blog/virtualization-internals-part-1-intro-to-virtualization/
VMWare and Full Virtualization using Binary Translation: https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/
Xen and Paravirtualization: https://docs.saferwall.com/blog/virtualization-internals-part-3-xen-and-paravirtualization/
QEMU: https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu/
#virtualization #hacking #infotech #infosec #learning
π£0xor0ne
π@malwr
Intro to Virtualization: https://docs.saferwall.com/blog/virtualization-internals-part-1-intro-to-virtualization/
VMWare and Full Virtualization using Binary Translation: https://docs.saferwall.com/blog/virtualization-internals-part-2-vmware-and-virtualization-using-binary-translation/
Xen and Paravirtualization: https://docs.saferwall.com/blog/virtualization-internals-part-3-xen-and-paravirtualization/
QEMU: https://docs.saferwall.com/blog/virtualization-internals-part-4-qemu/
#virtualization #hacking #infotech #infosec #learning
π£0xor0ne
π@malwr
π2β€1