Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
#Sysmon can log FileCreateStreamHash events (ZoneIdentifiers; ADS) since v11.10, which allows us to write a Sigma rule that looks for suspicious files downloaded from .zip Domains #ZipTLD

blog with explanations
https://fabian-voith.de/2020/06/25/sysmon-v11-1-reads-alternate-data-streams/

Rule
https://github.com/SigmaHQ/sigma/pull/4250/files#diff-59c47b72f788177a5a0ad98c0489cd3dfb5cddc7d61a4fb2e94dd688ec15f075
๐Ÿ—ฃcyb3rops


๐ŸŽ–@malwr
Team Cymru's S2 Research Team look at the QakBot infrastructure, drawing out some high-level trends and anomalies based on their ongoing tracking of the malware's command-and-control (C2) infrastructure. https://www.team-cymru.com/post/visualizing-qakbot-infrastructure
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
Security researcher @embee_research analyses the Quasar RAT C2 configuration and uses this information to pivot to additional servers utilising Shodan and Censys. https://embee-research.ghost.io/hunting-quasar-rat-shodan/
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
Thoth is now usable directly from VS Code, we just released an extension.

https://github.com/FuzzingLabs/thoth/tree/master/vscode-extension

You can generate callgraphs and run all the analyzers for both Cairo and Sierra directly from the UI.
๐Ÿ—ฃFuzzingLabs


๐ŸŽ–@malwr
Insider Threat Mitigation Guide
Source: Cybersecurity & Infrastructure Security Agency
Download Link:
https://www.cisa.gov/sites/default/files/publications/Insider%20Threat%20Mitigation%20Guide_Final_508.pdf
For more unique resources and tools for the cyber community, please visit:
https://cyberstartupobservatory.com/cyber-startup-observatory-community/
#CyberSecurity #InfoSec #InformationSecurity
๐Ÿ—ฃJMonteagudoE


๐ŸŽ–@malwr
๐Ÿ”ฅ1
Trend Microโ€™s Fyodor Yarochkin, Zhengyu Dong & Paul Pajares present an overview of the Lemon Groupโ€™s use of pre-infected mobile devices and how this scheme is potentially being developed and expanded to other IoT devices. https://www.trendmicro.com/en_us/research/23/e/lemon-group-cybercriminal-businesses-built-on-preinfected-devices.html
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
It has shipped - #ILSpy 8 is here with record structs, required members & more language features, plus - yes - more themes! https://github.com/icsharpcode/ILSpy/releases/tag/v8.0
๐Ÿ—ฃilspy


๐ŸŽ–@malwr
โค1๐Ÿ‘1
MITRE ATT&CKยฎ- ICS Matrix
Source: MITRE ATT&CKยฎ
Available for download in Press Quality:
https://cyberstartupobservatory.com/cyber-security-frameworks/
For more unique resources and tools for the cyber community, please visit:
https://cyberstartupobservatory.com/cyber-startup-observatory-community/
#CyberSecurity #InfoSec #InformationSecurity
๐Ÿ—ฃJMonteagudoE


๐ŸŽ–@malwr
Phishing Analysis: Decrypting HTTPS traffic with Wireshark
๐Ÿ—ฃstra1ghtarrow

How would this work if GPS spoofing was used?
๐Ÿ‘คPoofing_SME

As others have stated, using a dedicated MITM tool for ssl interception is faster and more efficient than using Wireshark. (It's also an industry expectation).

That being said it is still overall a fairly well written article. The only constructive criticism I'll give is this line comes off as condescending towards your wife and self congratulatory...

"Thanks to the regular user awareness sessions I have conducted with her (lol), she did the right thing and forwarded the email to me."

As technical writing is subject to a more formalized style in general this type of language I find unacceptable and off putting and using "lol" here was unnecessary.

I urge you though to continue your technical writing and journey into cybersec as you clearly have passion. Cheers.
๐Ÿ‘คTaikor

Why did you create an SSLKeylog file to decrypt traffic when you can see right in the payload section of the developer tools what is being passed and what IP its being passed to?


I feel like you took extra steps for a rather simple phishing tactic.
๐Ÿ‘คSwitchInteresting718


๐ŸŽ–@malwr
Lazarus Group Targeting Windows IIS Web Servers
๐Ÿ—ฃdigicat

I have been seeing a couple instances of similar attacks through misconfigured IIS Servers where services have been taken over and used to load malicious payloads into incomings RDS via VPN sessions via service accounts over the past couple of weeks.

When I traced the attacks I found them all to be coming out of Russia. Neither here nor there, but was able to reconfigure firewalls, close ports on IIS, and mitigate.
๐Ÿ‘คRatherB_fishing


๐ŸŽ–@malwr