Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
JPCERT/CC's Yuma Masubuchi provides details of an attack targeting Linux routers with the GobRAT malware. The attacker initially targets a router with WEBUI open to the public, executes scripts possibly by using vulnerabilities, & finally executes GobRAT. https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
πŸ—£virusbtn


πŸŽ–@malwr
Trend Micro's Sarah Pearl Camiling & Paul John Bardon write about a new Go-based information-stealing malware named Bandit Stealer, which targets numerous browsers and cryptocurrency wallets while evading detection. https://www.trendmicro.com/en_us/research/23/e/new-info-stealer-bandit-stealer-targets-browsers-wallets.html
πŸ—£virusbtn


πŸŽ–@malwr
πŸ‘1
WinDiff - Browse and compare exports, debug symbols and debug types of PEs between Windows versions.

WinDiff is a streamlined revamp of ntdiff, wired directly to Winbindex to fetch Windows updates and PEs automatically.

App: https://windiff.vercel.app
Repo: https://github.com/ergrelet/windiff
πŸ—£ergrelet


πŸŽ–@malwr
Find out the IP address through a call to Telegram… https://medium.com/@ibederov_en/find-out-the-ip-address-through-a-call-to-telegram-a899441b1bac #Pentesting #CyberSecurity #Infosec
πŸ—£ptracesecurity


πŸŽ–@malwr
πŸ‘1
A Video Demonstration on Cracking a GSM Capture File https://www.rtl-sdr.com/a-video-demonstration-on-cracking-a-gsm-capture-file/
πŸ—£rtlsdrblog


πŸŽ–@malwr
❀2
Check Point researchers analyse the TinyNote backdoor associated with the Camaro Dragon cluster of activity. This Go-based backdoor is distributed with names related to foreign affairs matters, and likely targets Southeast and East Asian embassies. https://research.checkpoint.com/2023/malware-spotlight-camaro-dragons-tinynote-backdoor/
πŸ—£virusbtn


πŸŽ–@malwr
SonicWall researchers recently observed a new variant of GuLoader. They look at unpacking its shellcodes, a new anti-debug technique it deploys, and its custom Vectored Exception Handler. https://securitynews.sonicwall.com/xmlpost/guloader-demystified-unraveling-its-vectored-exception-handler-approach/
πŸ—£virusbtn


πŸŽ–@malwr
Seeing more malware using binary padding for evasion and obfuscation?

Intezer security researcher @MhicRoibin explains how and why threat actors are inflating malware files with junk data, plus what you can do about it: https://hubs.li/Q01RRkPP0
πŸ—£IntezerLabs


πŸŽ–@malwr
Zscaler's Mallikarjun Piddannavar presents a technical analysis of a new info stealer called Bandit Stealer, which has been marketed and sold as a service on underground criminal forums since April 2023. https://www.zscaler.com/blogs/security-research/technical-analysis-bandit-stealer
πŸ—£virusbtn


πŸŽ–@malwr