Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings
πŸ—£nangaparbat

This is why I come to the sub. Thanks for posting!
πŸ‘€One-Fan7214

> Due to the way cellular networks are designed, it is difficult to prevent Delivery Reports from being returned to the originator making it challenging to thwart this covert attack without making fundamental changes to the network architecture.

Bollocks. Our network blocks them by default. Source: guy that built it.

EDIT: And furthermore, enabling SMS Home Routing in non-Transparent mode will protect against timing attacks since the target's home SMS-R will respond to the incoming SRI-SM and FSM messages immediately no matter where the subscriber is located. It will also foil the delivery receipt by lying and reporting successful delivery regardless.
πŸ‘€ExParrot1337

before you all freak out, the accuracy is pretty good but at the granularity of countries. Still a problem in many circumstances.
πŸ‘€vjeuss


πŸŽ–@malwr
Driver-Based Privilege Escalation and How to Catch This Threat
In this video, I show a driver-based privilege escalation. This can be used to stop protected processes or do other actions requiring kernel access. I will also show you how to detect this using the loldrivers.io feed MISP and Elastic SIEM.

Driver Installation Privilege Escalation and Detection
πŸ—£Infosecsamurai


πŸŽ–@malwr
Analysis of CVE-2023-29336 Win32k Privilege Escalation
πŸ—£wolfcod

Great thanks! Needs to be more of this stuff, would love to learn more about taking a CVE/Patch Tuesday vulnerability to a PoC. Not much around about it, obviously because it's fairly difficult.
πŸ‘€jahwni


πŸŽ–@malwr
Ghidra 10.3.1 released!
πŸ—£ryanmkurtz

Fun fact, if you use Windows 10's built-in LZX compression, you can reduce the program size down from 981MB to 371MB. It's absurd.
πŸ‘€Dwedit


πŸŽ–@malwr
Google Ads: An effective phishing delivery mechanism for over a decade.
πŸ—£Seaerkin2

They got me the other day through sponsored search results. Fake Amazon game link. At least I had 2fa on the account. Was an annoying hour or so while the scammers kept hammering the account.
πŸ‘€routerg0d

Dang. Glad I use an ad blocker routinely now. :O
πŸ‘€alvarkresh

I’ve seen drive by malware attacks served up by ad networks more than once.
πŸ‘€vabello


πŸŽ–@malwr
Team Cymru's S2 Research Team present a short update report providing insight into the operation of Vidar, demonstrating the evolution of its management infrastructure and evidence of steps taken by the threat actors to potentially cover their tracks. https://www.team-cymru.com/post/darth-vidar-the-aesir-strike-back
πŸ—£virusbtn


πŸŽ–@malwr
Excellent blog post on reverse engineering and pwning a Google Home Mini smart speaker.
A must read for anyone interested in embedded device security and vulnerability research.

https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html

#iot #embedded #infosec #cybersecurity
πŸ—£0xor0ne


πŸŽ–@malwr
Cado Security researchers look into an attack pattern that could be attributed to the threat actor Diicot (formerly β€œMexals”), targeting SSH servers exposed to the internet with password authentication enabled. https://www.cadosecurity.com/tracking-diicot-an-emerging-romanian-threat-actor/
πŸ—£virusbtn


πŸŽ–@malwr
AhnLab ASEC researchers analyse some cases of the document files used by Kimsuky during May to distribute malicious code. Malicious CHM files were used, with various topics including coins, taxation & contracts. https://asec.ahnlab.com/ko/53426/
πŸ—£virusbtn


πŸŽ–@malwr
Android App Reverse Engineering 101

https://www.ragingrock.com/AndroidAppRE/

#CyberSecurity #malware
πŸ—£0xAsm0d3us


πŸŽ–@malwr