Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
It has shipped - #ILSpy 8 is here with record structs, required members & more language features, plus - yes - more themes! https://github.com/icsharpcode/ILSpy/releases/tag/v8.0
๐Ÿ—ฃilspy


๐ŸŽ–@malwr
โค1๐Ÿ‘1
MITRE ATT&CKยฎ- ICS Matrix
Source: MITRE ATT&CKยฎ
Available for download in Press Quality:
https://cyberstartupobservatory.com/cyber-security-frameworks/
For more unique resources and tools for the cyber community, please visit:
https://cyberstartupobservatory.com/cyber-startup-observatory-community/
#CyberSecurity #InfoSec #InformationSecurity
๐Ÿ—ฃJMonteagudoE


๐ŸŽ–@malwr
Phishing Analysis: Decrypting HTTPS traffic with Wireshark
๐Ÿ—ฃstra1ghtarrow

How would this work if GPS spoofing was used?
๐Ÿ‘คPoofing_SME

As others have stated, using a dedicated MITM tool for ssl interception is faster and more efficient than using Wireshark. (It's also an industry expectation).

That being said it is still overall a fairly well written article. The only constructive criticism I'll give is this line comes off as condescending towards your wife and self congratulatory...

"Thanks to the regular user awareness sessions I have conducted with her (lol), she did the right thing and forwarded the email to me."

As technical writing is subject to a more formalized style in general this type of language I find unacceptable and off putting and using "lol" here was unnecessary.

I urge you though to continue your technical writing and journey into cybersec as you clearly have passion. Cheers.
๐Ÿ‘คTaikor

Why did you create an SSLKeylog file to decrypt traffic when you can see right in the payload section of the developer tools what is being passed and what IP its being passed to?


I feel like you took extra steps for a rather simple phishing tactic.
๐Ÿ‘คSwitchInteresting718


๐ŸŽ–@malwr
Lazarus Group Targeting Windows IIS Web Servers
๐Ÿ—ฃdigicat

I have been seeing a couple instances of similar attacks through misconfigured IIS Servers where services have been taken over and used to load malicious payloads into incomings RDS via VPN sessions via service accounts over the past couple of weeks.

When I traced the attacks I found them all to be coming out of Russia. Neither here nor there, but was able to reconfigure firewalls, close ports on IIS, and mitigate.
๐Ÿ‘คRatherB_fishing


๐ŸŽ–@malwr
A Modern Approach to Evading AntiVirus and Bypassing Endpoint Detection
๐Ÿ—ฃResidentHacker

Learnt new stuff, thanks and cool stuff for AV evasion
๐Ÿ‘คKa4maroot

If you look at the git, Bypassing Endpoint Detection is a bit of a misnomer here. This is AV evasion + living off the land. Nice resource for a few evasion techniques though!
๐Ÿ‘คSittadel


๐ŸŽ–@malwr
librick/ic1101: Reverse engineering of a 2021 Honda Civic headunit
๐Ÿ—ฃtnavda

I've been curious if the LKAS stuff is contained within one of the APKs, or if that software is located elsewhere. There is a hard-coded 45MPH minimum to activate LKAS, but that always seemed pretty arbitrary to me, and I wonder if one could modify that and see what happens.
๐Ÿ‘คebol4anthr4x


๐ŸŽ–@malwr
Ransomware Notes

This is a collection of various #ransomware notes from the past to the present.

https://github.com/threatlabz/ransomware_notes

#cybersecurity #infosec
https://t.me/hackgit/8819
๐Ÿ—ฃhack_git


๐ŸŽ–@malwr
Microsoft Threat Intelligence researchers share information on the Volt Typhoon state-sponsored actor, its campaign targeting critical infrastructure providers, & its tactics for achieving and maintaining unauthorized access to target networks. https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
ESET's Lukas Stefanko describes a new Android RAT based on AhMyth. AhRat's specific malicious behaviour, which involves extracting microphone recordings & stealing files with specific extensions, potentially indicates involvement in an espionage campaign. https://www.welivesecurity.com/2023/05/23/android-app-breaking-bad-legitimate-screen-recording-file-exfiltration/
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
Windows File Explorer will support 7z, rar, and other compressed formats using open source libarchive library. Opening files soon, compressing files will come later. #MSBuild
๐Ÿ—ฃunixterminal


๐ŸŽ–@malwr
The DFIR Report's researchers look into an incident that started with the execution of IcedID malware contained within an Excel document delivered to the victim as part of a malspam campaign. https://thedfirreport.com/2023/05/22/icedid-macro-ends-in-nokoyawa-ransomware/
๐Ÿ—ฃvirusbtn


๐ŸŽ–@malwr
Iโ€™m excited to kick the morning off by announcing the release of ๐ŸŽ Living Off the Orchard: macOS Binaries (LOOBins)!

https://loobins.io

You can find more details about the LOOBins project in my โ€œIntroducing LOOBinsโ€ Medium post here:
https://infosecb.medium.com/introducing-loobins-9e732b9e06a6?source=friends_link&sk=e4d46e0ef07add52b5c77fd3a9dd3387
๐Ÿ—ฃinfosecb


๐ŸŽ–@malwr