Malware News
12.8K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
👍1
Hacking Auto-GPT and escaping its docker container
🗣albinowax

> The docker-compose.yml file present in the repo mounts itself into the docker

I mean this is just fucking stupid so...
👤1esproc

This is the biggest issue with AI in my opinion and why it's not going to take over everyone's jobs just yet. It's too much of a black box
👤UnacceptableUse


🎖@malwr
Process Mockingjay: Echoing RWX In Userland To Achieve Code Execution
🗣thewatcher_

Do industrial attackers not know about ROP compilers? This whole silly arms race about process injection vs EDRs could be ended by simply using an existing free tools. Maybe most do and all the vendors are just fighting everyone who hasn't yet made the jump.
👤SirensToGo


🎖@malwr
New Malware Analysis/RE plugin is now available!🚨
IAT-Tracer is an offline automation plugin for the Tiny-Tracer framework (by @hasherezade) to trace and watch functions directly out of the executable's import table.
https://github.com/YoavLevi/IAT-Tracer

ℹ️ Thanks Levi, for such a nice tool.

🎖@malwr
2
Biden-⁠Harris Administration Announces Cybersecurity Labeling Program for Smart Devices to Protect American Consumers
🗣digicat

A) this will result in another new unnecessary government agency
B) the list of companies voluntarily committing to the program are all massive orgs, smaller agile and innovative orgs won't be able to compete
C) do the basics better, there's no need for this
👤crawdad101

I think this is a great idea but who's going to be in charge of this?

The Gov doesn't have enough people to independently review every single smart device that comes to market. So is it left on companies to self certify that they meet the requirements?

If it's self certification then what happens if a company fraudulently claims they meet the requirements when they don't? Are there penalties?
👤AnApexBread


🎖@malwr
Streamlining Websocket Pentesting with wsrepl
🗣nibblesec

Nice work!
👤ilimanjf

I'm the author of this tool. As the blog post describes, I created it to address my own frustrations during engagements. If you've ever encountered challenges while testing websockets, I'd love to hear your thoughts.
👤execveat


🎖@malwr
VirusTotal Leak Data of 5,600 registered users
Better change those passwords.

Link here)
🗣hawaii_brian

I feel like I see data leaks of passwords all the time. What makes it so common?

How are they supposed to be stored? Hashed and salted?
👤TheAnxiousPianist

"Users’ names and e-mail addresses have been leaked, but passwords haven’t."
I have 2FA enabled but updated my password anyhow, making it longer and more complex.
👤fmtheilig

Community notes about to get real interesting
👤GoodEbening


🎖@malwr
👍1😱1
Detecting Fileless PowerShell operations
I am currently doing an internship where I am pen testing a proprietary incident response/memory forensics tool. I am new to pentesting/forensics in general. One of the things I am thinking about trying is using IEX in PowerShell to download/run things. Does this leave any kind of artifacts?

What would you be checking for in something like this?

I am planning on using atomic red team or caldera. I have noticed that with ART that the PowerShell commands you run are unique to that program and probably would not be a typical PowerShell command so perhaps not the best way to find out what PowerShell is actually doing but it seemed the easiest way to start testing quickly.
🗣Ghostnineone

Depending on the setup of the target organisation, using powershell on the target will leave logs in the "Windows PowerShell.evtx" logs in decoded form, and if more logging are in place, "powershell transcripts" or "sysmon" logs may exist, other than logs, artifacts like Prefetch, ShimCache or AmCache can provide more evidence of powershell execution.
👤OverZeeR

You can usually find PowerShell in the event logs.
👤smc0881


🎖@malwr
1