Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Cado Security researchers look into an attack pattern that could be attributed to the threat actor Diicot (formerly β€œMexals”), targeting SSH servers exposed to the internet with password authentication enabled. https://www.cadosecurity.com/tracking-diicot-an-emerging-romanian-threat-actor/
πŸ—£virusbtn


πŸŽ–@malwr
AhnLab ASEC researchers analyse some cases of the document files used by Kimsuky during May to distribute malicious code. Malicious CHM files were used, with various topics including coins, taxation & contracts. https://asec.ahnlab.com/ko/53426/
πŸ—£virusbtn


πŸŽ–@malwr
Android App Reverse Engineering 101

https://www.ragingrock.com/AndroidAppRE/

#CyberSecurity #malware
πŸ—£0xAsm0d3us


πŸŽ–@malwr
eSentire researchers present a report on Resident, a malicious campaign targeting manufacturing, commercial & healthcare organizations. The Resident campaign is linked to Asylum Ambuscade/TA866. https://www.esentire.com/blog/esentire-threat-intelligence-malware-analysis-resident-campaign
πŸ—£virusbtn


πŸŽ–@malwr
Forwarded from CVE Notify
🚨 CVE-2023-29353
Sysinternals Process Monitor for Windows Denial of Service Vulnerability

πŸŽ–@cveNotify
Zscaler ThreatLabz researchers provide detailed insights into the campaigns associated with the RedEnergy stealer-as-a-ransomware malware variant they recently discovered, along with a technical analysis of its stealer & ransomware characteristics. https://www.zscaler.com/blogs/security-research/ransomware-redefined-redenergy-stealer-ransomware-attacks
πŸ—£virusbtn


πŸŽ–@malwr
Fortinet's @cryptax analyses Fluhorse, a Flutter-based Android malware that poses as a legitimate app for an electronic toll system used in Southern Asia. https://www.fortinet.com/blog/threat-research/fortinet-reverses-flutter-based-android-malware-fluhorse
πŸ—£virusbtn


πŸŽ–@malwr
Unit 42 researchers Kristopher Russo, Austin Dever & Amer Elsad profile the Muddled Libra threat group. The group favours targeting large outsourcing firms serving high-value cryptocurrency institutions and individuals. https://unit42.paloaltonetworks.com/muddled-libra/
πŸ—£virusbtn


πŸŽ–@malwr
πŸ”₯1
AhnLab ASEC researchers share the tactics, techniques and procedures (TTPs) utilized by the RedEyes (also known as APT37, ScarCruft and Reaper) group during its attacks in May 2023. https://asec.ahnlab.com/en/54349/
πŸ—£virusbtn


πŸŽ–@malwr
"Exploring Impersonation through the Named Pipe Filesystem Driver"

#infosec #pentest #redteam
https://posts.specterops.io/exploring-impersonation-through-the-named-pipe-filesystem-driver-15f324dfbaf2
πŸ—£CyberWarship


πŸŽ–@malwr
πŸ‘1πŸ”₯1
πŸ˜‚
πŸ—£malwrhunterteam


πŸŽ–@malwr
😁5
Swing VPN Android app with 5M+ installs can DDoS any server received from config file.
I replicated original research and the app still sends server requests every 10 seconds. I reported the app to Google Play, and it was removed within 24 hours.
Research: https://lecromee.github.io/posts/swing_vpn_ddosing_sites/
πŸ—£LukasStefanko


πŸŽ–@malwr
πŸ‘2
Check Point researchers investigated an incident attributed to Camaro Dragon (aka Mustang Panda/LuminousMoth) involving self-propagating malware capable of spreading via USB drives. They provide a technical analysis of the infection chains & components. https://research.checkpoint.com/2023/beyond-the-horizon-traveling-the-world-on-camaro-dragons-usb-flash-drives/
πŸ—£virusbtn


πŸŽ–@malwr