Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Fortinet's @cryptax analyses Fluhorse, a Flutter-based Android malware that poses as a legitimate app for an electronic toll system used in Southern Asia. https://www.fortinet.com/blog/threat-research/fortinet-reverses-flutter-based-android-malware-fluhorse
πŸ—£virusbtn


πŸŽ–@malwr
Unit 42 researchers Kristopher Russo, Austin Dever & Amer Elsad profile the Muddled Libra threat group. The group favours targeting large outsourcing firms serving high-value cryptocurrency institutions and individuals. https://unit42.paloaltonetworks.com/muddled-libra/
πŸ—£virusbtn


πŸŽ–@malwr
πŸ”₯1
AhnLab ASEC researchers share the tactics, techniques and procedures (TTPs) utilized by the RedEyes (also known as APT37, ScarCruft and Reaper) group during its attacks in May 2023. https://asec.ahnlab.com/en/54349/
πŸ—£virusbtn


πŸŽ–@malwr
"Exploring Impersonation through the Named Pipe Filesystem Driver"

#infosec #pentest #redteam
https://posts.specterops.io/exploring-impersonation-through-the-named-pipe-filesystem-driver-15f324dfbaf2
πŸ—£CyberWarship


πŸŽ–@malwr
πŸ‘1πŸ”₯1
πŸ˜‚
πŸ—£malwrhunterteam


πŸŽ–@malwr
😁5
Swing VPN Android app with 5M+ installs can DDoS any server received from config file.
I replicated original research and the app still sends server requests every 10 seconds. I reported the app to Google Play, and it was removed within 24 hours.
Research: https://lecromee.github.io/posts/swing_vpn_ddosing_sites/
πŸ—£LukasStefanko


πŸŽ–@malwr
πŸ‘2
Check Point researchers investigated an incident attributed to Camaro Dragon (aka Mustang Panda/LuminousMoth) involving self-propagating malware capable of spreading via USB drives. They provide a technical analysis of the infection chains & components. https://research.checkpoint.com/2023/beyond-the-horizon-traveling-the-world-on-camaro-dragons-usb-flash-drives/
πŸ—£virusbtn


πŸŽ–@malwr
RE tip of the day: Here is an example of using standard structures in IDA to quickly find the meaning of the MZ-PE header fields used to dynamically resolve imports. Just add IMAGE_EXPORT_DIRECTORY structure and apply it!
#infosec #cybersecurity #malware #reverseengineering
πŸ—£re_and_more


πŸŽ–@malwr
πŸ“Ί Tips for learning RE

How to maximize your time and avoid mind traps when learning how to reverse engineer with #OALABS

https://youtu.be/JzhpTLe8Vg4
πŸ—£herrcore


πŸŽ–@malwr
❀3
Android Root Detection Bypass using Frida (Part 1 – OWASP Uncrackable 1)
https://pentest.co.uk/labs/android-root-detection-bypass-using-frida-1/
πŸ—£androidmalware2


πŸŽ–@malwr
❀2
πŸ‘1
Hacking Auto-GPT and escaping its docker container
πŸ—£albinowax

> The docker-compose.yml file present in the repo mounts itself into the docker

I mean this is just fucking stupid so...
πŸ‘€1esproc

This is the biggest issue with AI in my opinion and why it's not going to take over everyone's jobs just yet. It's too much of a black box
πŸ‘€UnacceptableUse


πŸŽ–@malwr
Process Mockingjay: Echoing RWX In Userland To Achieve Code Execution
πŸ—£thewatcher_

Do industrial attackers not know about ROP compilers? This whole silly arms race about process injection vs EDRs could be ended by simply using an existing free tools. Maybe most do and all the vendors are just fighting everyone who hasn't yet made the jump.
πŸ‘€SirensToGo


πŸŽ–@malwr