Malware News
12.9K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
5 of the top programming languages for cybersecurity

While far from all roles in security explicitly demand coding skills, it’s challenging to envision a career in this field that wouldn’t derive substantial advantages from at least a basic understanding of fundamental coding principles

https://www.welivesecurity.com/en/secure-coding/5-top-programming-languages-cybersecurity/


🎖@malwr
Malware News pinned «Guys with premium telegram account, boost please: https://t.me/malwr?boost»
Hacking with Havoc C2 - Basic setup, installation, usage, and Windows Defender Bypass
Check out this video posted on Gemini Cyber Security Youtube channel, whereby the setup and installation step-by-step guide is demonstrated in the video. The video also showcases basic usage of the Havoc C2 tool, such as setting up a listener and generating payload for it.

As a bonus, it was also demonstrated how you can bypass the latest Windows Defender by utilising the shellcode format of the Havoc C2 payload (Demon agent) and executing the shellcode using AES encryption with a .DLL loader.

https://www.youtube.com/watch?v=DXJNWiZJGko
🗣cybermepls


🎖@malwr
APT34 Deploys Phishing Attack With New Malware

We observed and tracked the advanced persistent threat (APT) APT34 group with a new malware variant accompanying a phishing attack comparatively similar to the SideTwist backdoor malware. Following the campaign, the group abused a fake license registration form of an African government agency to target a victim in Saudi Arabia.

https://www.trendmicro.com/en_us/research/23/i/apt34-deploys-phishing-attack-with-new-malware.html


🎖@malwr
👍2
2023-09-28 - IcedID (Bokbot) infection with Keyhole VNC and Cobalt Strike

https://www.malware-traffic-analysis.net/2023/09/28/index.html


🎖@malwr
RetrievIR - PowerShell script to assist DFIR teams with the collection of live-system evidence
🗣panscanner

Hey everyone - posting a new tool I've been working on to help blue team operators capture evidence from live systems - most operations are described in the readme, most common use-case is likely running RetrievIR.ps1 from an administrative prompt like 'retrievir.ps1 -tags sans_triage' - this will capture most artifacts described in the KAPE SANS Triage package.

Please let me know if there are any questions/feedback! It is still a WIP but very much functional - I created this because I love KAPE but the enterprise license sometimes holds me back from using it in certain situations. I am also working on the ingestion of tkape configuration files.
👤panscanner


🎖@malwr