Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
VMware ESXi Zero-Day Used by Chinese Espionage Actor to Perform Privileged Guest Operations on Compromised Hypervisors https://www.mandiant.com/resources/blog/vmware-esxi-zero-day-bypass #VMware #Pentesting #CyberSecurity #Infosec
πŸ—£ptracesecurity


πŸŽ–@malwr
Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings
πŸ—£nangaparbat

This is why I come to the sub. Thanks for posting!
πŸ‘€One-Fan7214

> Due to the way cellular networks are designed, it is difficult to prevent Delivery Reports from being returned to the originator making it challenging to thwart this covert attack without making fundamental changes to the network architecture.

Bollocks. Our network blocks them by default. Source: guy that built it.

EDIT: And furthermore, enabling SMS Home Routing in non-Transparent mode will protect against timing attacks since the target's home SMS-R will respond to the incoming SRI-SM and FSM messages immediately no matter where the subscriber is located. It will also foil the delivery receipt by lying and reporting successful delivery regardless.
πŸ‘€ExParrot1337

before you all freak out, the accuracy is pretty good but at the granularity of countries. Still a problem in many circumstances.
πŸ‘€vjeuss


πŸŽ–@malwr
Driver-Based Privilege Escalation and How to Catch This Threat
In this video, I show a driver-based privilege escalation. This can be used to stop protected processes or do other actions requiring kernel access. I will also show you how to detect this using the loldrivers.io feed MISP and Elastic SIEM.

Driver Installation Privilege Escalation and Detection
πŸ—£Infosecsamurai


πŸŽ–@malwr
Analysis of CVE-2023-29336 Win32k Privilege Escalation
πŸ—£wolfcod

Great thanks! Needs to be more of this stuff, would love to learn more about taking a CVE/Patch Tuesday vulnerability to a PoC. Not much around about it, obviously because it's fairly difficult.
πŸ‘€jahwni


πŸŽ–@malwr
Ghidra 10.3.1 released!
πŸ—£ryanmkurtz

Fun fact, if you use Windows 10's built-in LZX compression, you can reduce the program size down from 981MB to 371MB. It's absurd.
πŸ‘€Dwedit


πŸŽ–@malwr
Google Ads: An effective phishing delivery mechanism for over a decade.
πŸ—£Seaerkin2

They got me the other day through sponsored search results. Fake Amazon game link. At least I had 2fa on the account. Was an annoying hour or so while the scammers kept hammering the account.
πŸ‘€routerg0d

Dang. Glad I use an ad blocker routinely now. :O
πŸ‘€alvarkresh

I’ve seen drive by malware attacks served up by ad networks more than once.
πŸ‘€vabello


πŸŽ–@malwr
Team Cymru's S2 Research Team present a short update report providing insight into the operation of Vidar, demonstrating the evolution of its management infrastructure and evidence of steps taken by the threat actors to potentially cover their tracks. https://www.team-cymru.com/post/darth-vidar-the-aesir-strike-back
πŸ—£virusbtn


πŸŽ–@malwr
Excellent blog post on reverse engineering and pwning a Google Home Mini smart speaker.
A must read for anyone interested in embedded device security and vulnerability research.

https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html

#iot #embedded #infosec #cybersecurity
πŸ—£0xor0ne


πŸŽ–@malwr