Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
A Video Demonstration on Cracking a GSM Capture File https://www.rtl-sdr.com/a-video-demonstration-on-cracking-a-gsm-capture-file/
πŸ—£rtlsdrblog


πŸŽ–@malwr
❀2
Check Point researchers analyse the TinyNote backdoor associated with the Camaro Dragon cluster of activity. This Go-based backdoor is distributed with names related to foreign affairs matters, and likely targets Southeast and East Asian embassies. https://research.checkpoint.com/2023/malware-spotlight-camaro-dragons-tinynote-backdoor/
πŸ—£virusbtn


πŸŽ–@malwr
SonicWall researchers recently observed a new variant of GuLoader. They look at unpacking its shellcodes, a new anti-debug technique it deploys, and its custom Vectored Exception Handler. https://securitynews.sonicwall.com/xmlpost/guloader-demystified-unraveling-its-vectored-exception-handler-approach/
πŸ—£virusbtn


πŸŽ–@malwr
Seeing more malware using binary padding for evasion and obfuscation?

Intezer security researcher @MhicRoibin explains how and why threat actors are inflating malware files with junk data, plus what you can do about it: https://hubs.li/Q01RRkPP0
πŸ—£IntezerLabs


πŸŽ–@malwr
Zscaler's Mallikarjun Piddannavar presents a technical analysis of a new info stealer called Bandit Stealer, which has been marketed and sold as a service on underground criminal forums since April 2023. https://www.zscaler.com/blogs/security-research/technical-analysis-bandit-stealer
πŸ—£virusbtn


πŸŽ–@malwr
CatSniffer is an original multiprotocol,& multiband board made for sniffing, communicating,& attacking IoT devices. That integrates the new chips CC1352, SX1262,& SAMD21E17 (Sub 1GHz & 2.4GHz).

https://github.com/ElectronicCats/CatSniffer

#SoftwareDefinedRAdio #SDR
#LoRa #LoRaWAN
#BLE #ZigBee
πŸ—£giammaiot2


πŸŽ–@malwr
In a new blog post Trend Micro researchers discuss the latest TargetCompany ransomware variant, Xollam, and the new initial access technique it uses. https://www.trendmicro.com/en_us/research/23/f/xollam-the-latest-face-of-targetcompany.html
πŸ—£virusbtn


πŸŽ–@malwr
For those who are encountering Golang malware (which are likely to be more and more of you as they language gains in popularity): the Ghidra scripts I made to help analyse Golang binaries in Ghidra are now public, along with a corporate blog diving into the details. The code itself is (if I may say so myself) very well documented. As such, if you push you Java hate aside, it's a knowledge base in and on its own.

Blog: https://www.trellix.com/en-us/about/newsroom/stories/research/feeding-gophers-to-ghidra.html

GitHub: https://github.com/advanced-threat-research/GhidraScripts

ℹ️ Sent from one of our channel members

πŸŽ–@malwr
πŸ”₯5
RedLine Technical Analysis Report

https://apophis133.medium.com/redline-technical-analysis-report-5034e16ad152

ℹ️ Sent from one of our channel members

πŸŽ–@malwr
πŸ”₯4