Malware News pinned Β«Guys with premium telegram account, boost please: https://t.me/malwr?boostΒ»
Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda
π£digicat
π@malwr
π£digicat
π@malwr
Unit 42
Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda
APT Stately Taurus (aka Mustang Panda) conducted cyberespionage against a Southeast Asian government, including data exfiltration from compromised networks.
Persistent Attempts at Cyberespionage Against Southeast Asian Government Target Have Links to Alloy Taurus
π£digicat
π@malwr
π£digicat
π@malwr
Unit 42
Persistent Attempts at Cyberespionage Against Southeast Asian Government Target Have Links to Alloy Taurus
We analyze waves of attacks on a Southeast Asian government linked to Alloy Taurus. By exploiting exchange servers, the attackers established a foothold for long-term espionage.
Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government
π£digicat
π@malwr
π£digicat
π@malwr
Unit 42
Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government
Threat activity targeting a Southeast Asian government could provide insight into the workings of APT Gelsemium. We examine the rare TTPs we observed in two attacks.
kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel
π£digicat
π@malwr
π£digicat
π@malwr
GitHub
GitHub - a13xp0p0v/kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel
A tool for checking the security hardening options of the Linux kernel - a13xp0p0v/kernel-hardening-checker
MaldevAcademyLdr.1: October update saw several interesting modules being released to our users. One of them was our DLL loader that was successfully tested against several EDRs including MDE and Crowdstrike - We promised to release an EXE
π£digicat
π@malwr
π£digicat
π@malwr
GitHub
GitHub - Maldev-Academy/MaldevAcademyLdr.1: RunPE implementation with multiple evasive techniques (1)
RunPE implementation with multiple evasive techniques (1) - Maldev-Academy/MaldevAcademyLdr.1
DHS Issues Recommendations to Harmonize Cyber Incident Reporting for Critical Infrastructure Entities
π£digicat
π@malwr
π£digicat
π@malwr
www.dhs.gov
DHS Issues Recommendations to Harmonize Cyber Incident Reporting for Critical Infrastructure Entities | Homeland Security
DHS outlined a series of actionable recommendations on how the federal government can streamline and harmonize the reporting of cyber incidents to better protect the nationβs critical infrastructure. These recommendations provide a clear path forward forβ¦
β€1
[LIST] List of AV Testing Labs.
https://selabs.uk/reports/2023/
https://www.av-test.org/en/antivirus/home-windows/
https://www.av-comparatives.org/consumer/latest-tests/
https://www.mrg-effitas.com/test-library/
https://avlab.pl/en/recent-results/
https://www.virusbulletin.com/testing/
π£Hermit_007
π@malwr
https://selabs.uk/reports/2023/
https://www.av-test.org/en/antivirus/home-windows/
https://www.av-comparatives.org/consumer/latest-tests/
https://www.mrg-effitas.com/test-library/
https://avlab.pl/en/recent-results/
https://www.virusbulletin.com/testing/
π£Hermit_007
π@malwr
SE Labs
2023 - SE Labs
ImHex v1.31.0 has been released! Including a full command line interface, a .NET Script loader and a built-in tutorial in the form of Achievements
π£WerWolv
π@malwr
π£WerWolv
π@malwr
GitHub
Release Command Line Interface, .NET scripts, Achievements Β· WerWolv/ImHex
Additions
Added a command line interface to ImHex. Huge thanks to @iTrooz
Get started by typing imhex --help
Added initial support for .NET scripts
These scripts are meant to be a cross-platfo...
Added a command line interface to ImHex. Huge thanks to @iTrooz
Get started by typing imhex --help
Added initial support for .NET scripts
These scripts are meant to be a cross-platfo...
π1
Malware News pinned Β«Guys with premium telegram account, boost please: https://t.me/malwr?boostΒ»
From ScreenConnect to Hive Ransomware in 61 hours
In 2022, The DFIR Report observed an increase in the adversarial usage of Remote Management and Monitoring (RMM) tools. When compared to post-exploitation channels that heavily rely on terminals, such β¦
https://thedfirreport.com/2023/09/25/from-screenconnect-to-hive-ransomware-in-61-hours/
π@malwr
In 2022, The DFIR Report observed an increase in the adversarial usage of Remote Management and Monitoring (RMM) tools. When compared to post-exploitation channels that heavily rely on terminals, such β¦
https://thedfirreport.com/2023/09/25/from-screenconnect-to-hive-ransomware-in-61-hours/
π@malwr
The DFIR Report
From ScreenConnect to Hive Ransomware in 61 hours
In 2022, The DFIR Report observed an increase in the adversarial usage of Remote Management and Monitoring (RMM) tools. When compared to post-exploitation channels that heavily rely on terminals, sβ¦