Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
My friend @dfirence created an awesome app called Mitre Assistant where you can visualize all the techniques used by a threat actor and more! Check this out! πŸ‘‡#infosec

https://ma-insights.vercel.app/
πŸ—£fr0gger_


πŸŽ–@malwr
The slides of our talk at Recon 2023 "Dissecting the Modern Android Data Encryption Scheme" are now available online.

Thanks @reconmtl for organizing this great event.
https://github.com/quarkslab/conf-presentations/blob/master/Recon23/Recon23-Android-FBE-mrossibellom-dmelotti.pdf
πŸ—£max_r_b


πŸŽ–@malwr
"windows-api-function-cheatsheets: A reference of Windows API function calls, including functions for file operations, process..."

#infosec #pentest #redteam
https://github.com/snowcra5h/windows-api-function-cheatsheets
πŸ—£CyberWarship


πŸŽ–@malwr
"BLACKHAT_Asia2023: Black Hat Asia 2023 PDF Public"

#infosec #pentest #redteam
https://github.com/Mr-xn/BLACKHAT_Asia2023
πŸ—£CyberWarship


πŸŽ–@malwr
Bypass-Sandbox-Evasion - Bypass Malware Sandbox Evasion Ram Check https://www.kitploit.com/2023/06/bypass-sandbox-evasion-bypass-malware.html #Pentesting #Bypass #Malware #Sandbox #CyberSecurity #Infosec
πŸ—£ptracesecurity


πŸŽ–@malwr
πŸ”₯1
Mandiant's Alexander Marvi, Brad Slaybaugh, Ron Craft & Rufus Brown have discovered additional techniques utilized by UNC3886 across multiple organizations to keep out of the sights of EDR solutions. https://www.mandiant.com/resources/blog/vmware-esxi-zero-day-bypass
πŸ—£virusbtn


πŸŽ–@malwr
πŸ‘1πŸ”₯1
KasperskyLab/TinyCheckPublic

TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them.
https://github.com/KasperskyLab/TinyCheck
πŸ—£Tinolle


πŸŽ–@malwr
Nuclei + Paramspider = NucleiFuzzer (Automation)
NucleiFuzzer is a powerful automation tool for detecting xss,sqli,ssrf,open-redirect..etc vulnerabilities in web applications.
You can find the tool below
πŸ‘‡πŸ‘‡πŸ‘‡
https://github.com/0xKayala/NucleiFuzzer
#BugBountyTips #BugBounty #HackerOne
πŸ—£ibrahimatix0x01


πŸŽ–@malwr
VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors https://www.mandiant.com/resources/blog/vmware-esxi-zero-day-bypass #VMware #Pentesting #CyberSecurity #Infosec
πŸ—£ptracesecurity


πŸŽ–@malwr
Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings
πŸ—£nangaparbat

This is why I come to the sub. Thanks for posting!
πŸ‘€One-Fan7214

> Due to the way cellular networks are designed, it is difficult to prevent Delivery Reports from being returned to the originator making it challenging to thwart this covert attack without making fundamental changes to the network architecture.

Bollocks. Our network blocks them by default. Source: guy that built it.

EDIT: And furthermore, enabling SMS Home Routing in non-Transparent mode will protect against timing attacks since the target's home SMS-R will respond to the incoming SRI-SM and FSM messages immediately no matter where the subscriber is located. It will also foil the delivery receipt by lying and reporting successful delivery regardless.
πŸ‘€ExParrot1337

before you all freak out, the accuracy is pretty good but at the granularity of countries. Still a problem in many circumstances.
πŸ‘€vjeuss


πŸŽ–@malwr
Driver-Based Privilege Escalation and How to Catch This Threat
In this video, I show a driver-based privilege escalation. This can be used to stop protected processes or do other actions requiring kernel access. I will also show you how to detect this using the loldrivers.io feed MISP and Elastic SIEM.

Driver Installation Privilege Escalation and Detection
πŸ—£Infosecsamurai


πŸŽ–@malwr
Analysis of CVE-2023-29336 Win32k Privilege Escalation
πŸ—£wolfcod

Great thanks! Needs to be more of this stuff, would love to learn more about taking a CVE/Patch Tuesday vulnerability to a PoC. Not much around about it, obviously because it's fairly difficult.
πŸ‘€jahwni


πŸŽ–@malwr