Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Seeing more malware using binary padding for evasion and obfuscation?

Intezer security researcher @MhicRoibin explains how and why threat actors are inflating malware files with junk data, plus what you can do about it: https://hubs.li/Q01RRkPP0
πŸ—£IntezerLabs


πŸŽ–@malwr
Zscaler's Mallikarjun Piddannavar presents a technical analysis of a new info stealer called Bandit Stealer, which has been marketed and sold as a service on underground criminal forums since April 2023. https://www.zscaler.com/blogs/security-research/technical-analysis-bandit-stealer
πŸ—£virusbtn


πŸŽ–@malwr
CatSniffer is an original multiprotocol,& multiband board made for sniffing, communicating,& attacking IoT devices. That integrates the new chips CC1352, SX1262,& SAMD21E17 (Sub 1GHz & 2.4GHz).

https://github.com/ElectronicCats/CatSniffer

#SoftwareDefinedRAdio #SDR
#LoRa #LoRaWAN
#BLE #ZigBee
πŸ—£giammaiot2


πŸŽ–@malwr
In a new blog post Trend Micro researchers discuss the latest TargetCompany ransomware variant, Xollam, and the new initial access technique it uses. https://www.trendmicro.com/en_us/research/23/f/xollam-the-latest-face-of-targetcompany.html
πŸ—£virusbtn


πŸŽ–@malwr
For those who are encountering Golang malware (which are likely to be more and more of you as they language gains in popularity): the Ghidra scripts I made to help analyse Golang binaries in Ghidra are now public, along with a corporate blog diving into the details. The code itself is (if I may say so myself) very well documented. As such, if you push you Java hate aside, it's a knowledge base in and on its own.

Blog: https://www.trellix.com/en-us/about/newsroom/stories/research/feeding-gophers-to-ghidra.html

GitHub: https://github.com/advanced-threat-research/GhidraScripts

ℹ️ Sent from one of our channel members

πŸŽ–@malwr
πŸ”₯5
RedLine Technical Analysis Report

https://apophis133.medium.com/redline-technical-analysis-report-5034e16ad152

ℹ️ Sent from one of our channel members

πŸŽ–@malwr
πŸ”₯4
The latest blog post from http://Sekoia.io's TDR researchers aims at understanding & contextualising cyber malicious activities associated with Iran-nexus intrusions sets over the 2022-2023 period. https://blog.sekoia.io/iran-cyber-threat-overview/
πŸ—£virusbtn


πŸŽ–@malwr
IBM Security X-Force researchers show how ITG10 is likely targeting South Korean government entities, universities, think tanks and dissidents with phishing emails in order to deliver RokRAT via LNK files. https://securityintelligence.com/posts/itg10-targeting-south-korean-entities/
πŸ—£virusbtn


πŸŽ–@malwr
Practical Windows Forensics Training https://github.com/bluecapesecurity/PWF #Pentesting #Windows #CyberSecurity #Infosec
πŸ—£ptracesecurity


πŸŽ–@malwr