Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
librick/ic1101: Reverse engineering of a 2021 Honda Civic headunit
πŸ—£tnavda

I've been curious if the LKAS stuff is contained within one of the APKs, or if that software is located elsewhere. There is a hard-coded 45MPH minimum to activate LKAS, but that always seemed pretty arbitrary to me, and I wonder if one could modify that and see what happens.
πŸ‘€ebol4anthr4x


πŸŽ–@malwr
Ransomware Notes

This is a collection of various #ransomware notes from the past to the present.

https://github.com/threatlabz/ransomware_notes

#cybersecurity #infosec
https://t.me/hackgit/8819
πŸ—£hack_git


πŸŽ–@malwr
Microsoft Threat Intelligence researchers share information on the Volt Typhoon state-sponsored actor, its campaign targeting critical infrastructure providers, & its tactics for achieving and maintaining unauthorized access to target networks. https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
πŸ—£virusbtn


πŸŽ–@malwr
ESET's Lukas Stefanko describes a new Android RAT based on AhMyth. AhRat's specific malicious behaviour, which involves extracting microphone recordings & stealing files with specific extensions, potentially indicates involvement in an espionage campaign. https://www.welivesecurity.com/2023/05/23/android-app-breaking-bad-legitimate-screen-recording-file-exfiltration/
πŸ—£virusbtn


πŸŽ–@malwr
Windows File Explorer will support 7z, rar, and other compressed formats using open source libarchive library. Opening files soon, compressing files will come later. #MSBuild
πŸ—£unixterminal


πŸŽ–@malwr
The DFIR Report's researchers look into an incident that started with the execution of IcedID malware contained within an Excel document delivered to the victim as part of a malspam campaign. https://thedfirreport.com/2023/05/22/icedid-macro-ends-in-nokoyawa-ransomware/
πŸ—£virusbtn


πŸŽ–@malwr
I’m excited to kick the morning off by announcing the release of 🍎 Living Off the Orchard: macOS Binaries (LOOBins)!

https://loobins.io

You can find more details about the LOOBins project in my β€œIntroducing LOOBins” Medium post here:
https://infosecb.medium.com/introducing-loobins-9e732b9e06a6?source=friends_link&sk=e4d46e0ef07add52b5c77fd3a9dd3387
πŸ—£infosecb


πŸŽ–@malwr
Fortinet researchers identified several simultaneous attacks targeting a government entity in the UAE. While most were classified as known threats, one remained unidentified - a custom targeted PowerShell-based backdoor with email-based C2 protocol. https://www.fortinet.com/blog/threat-research/operation-total-exchange-backdoor-discovered
πŸ—£virusbtn


πŸŽ–@malwr
Tool Release: Code Credential Scanner (ccs) https://research.nccgroup.com/2023/05/23/tool-release-code-credential-scanner-ccs/
πŸ—£Dinosn


πŸŽ–@malwr
πŸ”“ Part 1 of our #OALABS Patreon tutorial series on the PEB unlocked for everyone…

Understanding The PEB for Reverse Engineers

https://youtu.be/uyisPPTupmA
πŸ—£herrcore


πŸŽ–@malwr
πŸ”₯1
Check Point's Alexey Bukhteyev & Arie Olshtein provide insights into GuLoader's evolution. GuLoader is a prominent shellcode-based downloader, active for more than 3 years, that has been used in a large number of attacks to deliver a wide range of malware. https://research.checkpoint.com/2023/cloud-based-malware-delivery-the-evolution-of-guloader/
πŸ—£virusbtn


πŸŽ–@malwr
Nice quick introduction to persistence techniques in Windows by Ari Novick (@CyberArk)

https://www.cyberark.com/resources/threat-research-blog/persistence-techniques-that-persist

#cybersecurity
πŸ—£0xor0ne


πŸŽ–@malwr
βœ…βœ…βœ… Forward posts to the other groups βœ…βœ…βœ…
Malware News pinned Β«βœ…βœ…βœ… Forward posts to the other groups βœ…βœ…βœ…Β»