Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
#Sysmon can log FileCreateStreamHash events (ZoneIdentifiers; ADS) since v11.10, which allows us to write a Sigma rule that looks for suspicious files downloaded from .zip Domains #ZipTLD

blog with explanations
https://fabian-voith.de/2020/06/25/sysmon-v11-1-reads-alternate-data-streams/

Rule
https://github.com/SigmaHQ/sigma/pull/4250/files#diff-59c47b72f788177a5a0ad98c0489cd3dfb5cddc7d61a4fb2e94dd688ec15f075
๐Ÿ—ฃcyb3rops


๐ŸŽ–@malwr
Team Cymru's S2 Research Team look at the QakBot infrastructure, drawing out some high-level trends and anomalies based on their ongoing tracking of the malware's command-and-control (C2) infrastructure. https://www.team-cymru.com/post/visualizing-qakbot-infrastructure
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
Security researcher @embee_research analyses the Quasar RAT C2 configuration and uses this information to pivot to additional servers utilising Shodan and Censys. https://embee-research.ghost.io/hunting-quasar-rat-shodan/
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
Thoth is now usable directly from VS Code, we just released an extension.

https://github.com/FuzzingLabs/thoth/tree/master/vscode-extension

You can generate callgraphs and run all the analyzers for both Cairo and Sierra directly from the UI.
๐Ÿ—ฃFuzzingLabs


๐ŸŽ–@malwr
Insider Threat Mitigation Guide
Source: Cybersecurity & Infrastructure Security Agency
Download Link:
https://www.cisa.gov/sites/default/files/publications/Insider%20Threat%20Mitigation%20Guide_Final_508.pdf
For more unique resources and tools for the cyber community, please visit:
https://cyberstartupobservatory.com/cyber-startup-observatory-community/
#CyberSecurity #InfoSec #InformationSecurity
๐Ÿ—ฃJMonteagudoE


๐ŸŽ–@malwr
๐Ÿ”ฅ1
Trend Microโ€™s Fyodor Yarochkin, Zhengyu Dong & Paul Pajares present an overview of the Lemon Groupโ€™s use of pre-infected mobile devices and how this scheme is potentially being developed and expanded to other IoT devices. https://www.trendmicro.com/en_us/research/23/e/lemon-group-cybercriminal-businesses-built-on-preinfected-devices.html
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
It has shipped - #ILSpy 8 is here with record structs, required members & more language features, plus - yes - more themes! https://github.com/icsharpcode/ILSpy/releases/tag/v8.0
๐Ÿ—ฃilspy


๐ŸŽ–@malwr
โค1๐Ÿ‘1
MITRE ATT&CKยฎ- ICS Matrix
Source: MITRE ATT&CKยฎ
Available for download in Press Quality:
https://cyberstartupobservatory.com/cyber-security-frameworks/
For more unique resources and tools for the cyber community, please visit:
https://cyberstartupobservatory.com/cyber-startup-observatory-community/
#CyberSecurity #InfoSec #InformationSecurity
๐Ÿ—ฃJMonteagudoE


๐ŸŽ–@malwr