Malware News
12.9K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Free SIEM to augment existing SIEM.
Currently we have SIEM (SAAS Solution) that covers all of our servers, switches, routers firewalls.

We do not collect logs for any of our workstations (3000 workstations) and I would like to have something but we do not have any budget to increase our existing SIEM capacity. I just want to have something incase I need to review logs on a workstations.

I was looking at Wazuh but it does not look like it will scale well with that many workstations.

Any recommendations?
๐Ÿ—ฃCritical_Egg_913

I'm going to be different and say, you don't need a siem to handle workstations. Get alerts out of your EDR and then use Velociraptor to query for logs and other events on workstations.
๐Ÿ‘คmustacheride3

I just ran across gravwell.io I'm currently testing it out in a lab but it looks promising. It is free up to 14gb/day
๐Ÿ‘คsemipvt

Graylog. Open Source Splunk.
๐Ÿ‘คSLC_CA


๐ŸŽ–@malwr
MSIFortune - LPE with MSI Installers
A quite long blogpost about several types of LPEs which I found in the msi repair function.

There is a lot of different stuff, much more then Mandiant reveiled a few months ago.

Tested about 1000 msi which was quite time consuming.

https://badoption.eu/blog/2023/10/03/MSIFortune.html
๐Ÿ—ฃPfiatDe


๐ŸŽ–@malwr
๐Ÿ‘1
TargetCompany Ransomware Abuses FUD Obfuscator Packers

In this entry, we detail our analysis of how the TargetCompany ransomware abused an iteration of fully undetectable (FUD) obfuscator engine BatCloak to infect vulnerable systems.

https://www.trendmicro.com/en_us/research/23/h/targetcompany-ransomware-abuses-fud-obfuscator-packers.html


๐ŸŽ–@malwr
๐Ÿ‘1
Remote Code Execution In PyTorch Model Server TorchServe
Remote Code Execution In PyTorch Model Server TorchServe

Oligo's research team has uncovered a chain of critical vulnerabilities, named ShellTorch, including CVE-2023-43654 (CVSS: 9.8) in the PyTorch model server TorchServe.

This flaw allows unauthorized access to #AI models and enables Remote Code Execution (RCE) leaving countless services and end-users at risk.
๐Ÿ—ฃBigBother59


๐ŸŽ–@malwr
๐Ÿ˜ฑ1
2023-10-03 - Pikabot infection with Cobalt Strike

https://www.malware-traffic-analysis.net/2023/10/03/index.html


๐ŸŽ–@malwr
Quishing Triage 101: How to Investigate Suspicious QR Codes in Emails

Quishing, derived from combining โ€œQR codeโ€ and โ€œphishing,โ€ has manifested as a significant cybersecurity threat, particularly noting a discernible surge in incidents since July 2023. This technique leverages QR codes, square barcodes decipherable by mobile device cameras, to mislead users into interacting with malicious digital content. When a user scans a QR code in a...

https://intezer.com/blog/alert-triage/quishing-triage-how-to-investigate-suspicious-qr-codes-in-emails/


๐ŸŽ–@malwr