Letβs Go into the rabbit hole (part 1) β the challenges of dynamically hooking Golang programs
π£guedou
π@malwr
π£guedou
π@malwr
Quarkslab
Letβs Go into the rabbit hole (part 1) β the challenges of dynamically hooking Golang programs - Quarkslab's blog
Golang is the most used programming language for developing cloud technologies. Tools such as Kubernetes, Docker, Containerd and gVisor are written in Go. Despite the fact that the code of these programs is open source, there is no way to analyze and extendβ¦
MSIFortune - LPE with MSI Installers
A quite long blogpost about several types of LPEs which I found in the msi repair function.
There is a lot of different stuff, much more then Mandiant reveiled a few months ago.
Tested about 1000 msi which was quite time consuming.
https://badoption.eu/blog/2023/10/03/MSIFortune.html
π£PfiatDe
π@malwr
A quite long blogpost about several types of LPEs which I found in the msi repair function.
There is a lot of different stuff, much more then Mandiant reveiled a few months ago.
Tested about 1000 msi which was quite time consuming.
https://badoption.eu/blog/2023/10/03/MSIFortune.html
π£PfiatDe
π@malwr
Google Cloud Blog
Escalating Privileges via Third-Party Windows Installers | Mandiant | Google Cloud Blog
π1
TargetCompany Ransomware Abuses FUD Obfuscator Packers
In this entry, we detail our analysis of how the TargetCompany ransomware abused an iteration of fully undetectable (FUD) obfuscator engine BatCloak to infect vulnerable systems.
https://www.trendmicro.com/en_us/research/23/h/targetcompany-ransomware-abuses-fud-obfuscator-packers.html
π@malwr
In this entry, we detail our analysis of how the TargetCompany ransomware abused an iteration of fully undetectable (FUD) obfuscator engine BatCloak to infect vulnerable systems.
https://www.trendmicro.com/en_us/research/23/h/targetcompany-ransomware-abuses-fud-obfuscator-packers.html
π@malwr
Trend Micro
TargetCompany Ransomware Abuses FUD Obfuscator Packers
In this entry, we detail our analysis of how the TargetCompany ransomware abused an iteration of fully undetectable (FUD) obfuscator engine BatCloak to infect vulnerable systems.
π1
Remote Code Execution In PyTorch Model Server TorchServe
Remote Code Execution In PyTorch Model Server TorchServe
Oligo's research team has uncovered a chain of critical vulnerabilities, named ShellTorch, including CVE-2023-43654 (CVSS: 9.8) in the PyTorch model server TorchServe.
This flaw allows unauthorized access to #AI models and enables Remote Code Execution (RCE) leaving countless services and end-users at risk.
π£BigBother59
π@malwr
Remote Code Execution In PyTorch Model Server TorchServe
Oligo's research team has uncovered a chain of critical vulnerabilities, named ShellTorch, including CVE-2023-43654 (CVSS: 9.8) in the PyTorch model server TorchServe.
This flaw allows unauthorized access to #AI models and enables Remote Code Execution (RCE) leaving countless services and end-users at risk.
π£BigBother59
π@malwr
GitHub
GHSA-4mqg-h5jf-j9m7 - GitHub Advisory Database
TorchServe Pre-Auth Remote Code Execution
π±1
Economic Espionage Via Fake Social Media Profiles in the UK: Professional Workers Awareness and Resilience
π£digicat
π@malwr
π£digicat
π@malwr
Ssrn
Economic Espionage Via Fake Social Media Profiles in the UK: Professional Workers Awareness and Resilience
This paper explores the use of fake social media accounts for economic espionage. It focuses solely on the first step of the recruitment process, the link reque
PETEP: Open source tool for Penetration Testing of non-HTTP protocols (TCP, UDP) through graphical UI or code, also supports using Burp/Zaproxy by wrapping the binary traffic into HTTP.
π£vutmajk
π@malwr
π£vutmajk
π@malwr
GitHub
GitHub - Warxim/petep: PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modificationβ¦
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of ap...
2023-10-03 - Pikabot infection with Cobalt Strike
https://www.malware-traffic-analysis.net/2023/10/03/index.html
π@malwr
https://www.malware-traffic-analysis.net/2023/10/03/index.html
π@malwr
What is the dark web?
What is the dark web, and how is it different from the deep web?
https://blog.talosintelligence.com/what-is-the-dark-web/
π@malwr
What is the dark web, and how is it different from the deep web?
https://blog.talosintelligence.com/what-is-the-dark-web/
π@malwr
Cisco Talos Blog
What is the dark web?
What is the dark web, and how is it different from the deep web?
β€1
Quishing Triage 101: How to Investigate Suspicious QR Codes in Emails
Quishing, derived from combining βQR codeβ and βphishing,β has manifested as a significant cybersecurity threat, particularly noting a discernible surge in incidents since July 2023. This technique leverages QR codes, square barcodes decipherable by mobile device cameras, to mislead users into interacting with malicious digital content. When a user scans a QR code in a...
https://intezer.com/blog/alert-triage/quishing-triage-how-to-investigate-suspicious-qr-codes-in-emails/
π@malwr
Quishing, derived from combining βQR codeβ and βphishing,β has manifested as a significant cybersecurity threat, particularly noting a discernible surge in incidents since July 2023. This technique leverages QR codes, square barcodes decipherable by mobile device cameras, to mislead users into interacting with malicious digital content. When a user scans a QR code in a...
https://intezer.com/blog/alert-triage/quishing-triage-how-to-investigate-suspicious-qr-codes-in-emails/
π@malwr
A Practical Approach to SBOM in CI/CD Part III β Tracking SBOMs with Dependency-Track
π£theowni
Do you fill up dependencies manually, or using something like BlackDuck?
π€broadexample
π@malwr
π£theowni
Do you fill up dependencies manually, or using something like BlackDuck?
π€broadexample
π@malwr
Medium
A Practical Approach to SBOM in CI/CD Part III β Tracking SBOMs with Dependency-Track
Crucial part of utilising a full potential of Software Bill of Materials is automation. This article covers automated projects trackingβ¦
Python SAST Security Tools?
So, for my apprenticeship i have to find a new SAST Security Tool to integrate into a pipeline. The only actual boundary is that it has to be open-source. Just so you know, the pipeline runs into a Docker container. It would be better if it easily implementable (in this project we use mainly Docker, maven and pip to install new tools in the container). Another guideline would be to find a tool that analyzes very used languages (like Python or Java). Alternately, can do other stuff but it should be simple enough to me to understand it (maybe policies tester are out of my league? i dunno).
We already use Trivy, Bandit, Semgrep, Safety, Checkov, [and under maven:\] Spotbugs, OWASP DC and Spotless (Techincally also Kubescape and Talisman but we have not fully developed them yet)
Before you ask, yes...i've tried to search on my own (pretty deeply, i think). So this what my precedent tries/alternatives are:
\- Flawfinder (a bit tricky to install and analyze only C/C++)
\- Pysa/Pyrecheck (it's not easy to install, hard to understand, and prints strange errors)
\- Bearer (probably my choice if i don't find a python alternative but...i hate Java)
Sorry for the long message and thanks to all for any advice or answer on the post. Of course i don't expect you to research, that is my job. Just write if anything pops in your mind.
Thx again!
π£Fanta_futuro
Your org is already using much of what is available for your needs so Iβm not sure what OSS are available with your criteria that could offer you more or even in-addition too, but youβve already first hand have seen this yourself.
I know many tools to meet your needs but now weβre moving away from OSS and into SaaS but my guess is you have no budget for that.
Off the cuff what are the odds that the ask could pivot to SCA provided you and everyone else are large consumers of OSS and need to/should maybe look to consider your OSS risk?
Otherwise the only thing I can offer you is this link to GitHub that may be of assistance.
https://github.com/analysis-tools-dev/static-analysis#python
π€Sivyre
π@malwr
So, for my apprenticeship i have to find a new SAST Security Tool to integrate into a pipeline. The only actual boundary is that it has to be open-source. Just so you know, the pipeline runs into a Docker container. It would be better if it easily implementable (in this project we use mainly Docker, maven and pip to install new tools in the container). Another guideline would be to find a tool that analyzes very used languages (like Python or Java). Alternately, can do other stuff but it should be simple enough to me to understand it (maybe policies tester are out of my league? i dunno).
We already use Trivy, Bandit, Semgrep, Safety, Checkov, [and under maven:\] Spotbugs, OWASP DC and Spotless (Techincally also Kubescape and Talisman but we have not fully developed them yet)
Before you ask, yes...i've tried to search on my own (pretty deeply, i think). So this what my precedent tries/alternatives are:
\- Flawfinder (a bit tricky to install and analyze only C/C++)
\- Pysa/Pyrecheck (it's not easy to install, hard to understand, and prints strange errors)
\- Bearer (probably my choice if i don't find a python alternative but...i hate Java)
Sorry for the long message and thanks to all for any advice or answer on the post. Of course i don't expect you to research, that is my job. Just write if anything pops in your mind.
Thx again!
π£Fanta_futuro
Your org is already using much of what is available for your needs so Iβm not sure what OSS are available with your criteria that could offer you more or even in-addition too, but youβve already first hand have seen this yourself.
I know many tools to meet your needs but now weβre moving away from OSS and into SaaS but my guess is you have no budget for that.
Off the cuff what are the odds that the ask could pivot to SCA provided you and everyone else are large consumers of OSS and need to/should maybe look to consider your OSS risk?
Otherwise the only thing I can offer you is this link to GitHub that may be of assistance.
https://github.com/analysis-tools-dev/static-analysis#python
π€Sivyre
π@malwr
Reddit
From the cybersecurity community on Reddit
Explore this post and more from the cybersecurity community
π1
Lazarus μν κ·Έλ£Ήμ Volgmer, Scout μ
μ±μ½λ λΆμ λ³΄κ³ μ - Volgmer, Scout malware analysis report from the Lazarus threat group
π£digicat
π@malwr
π£digicat
π@malwr
ASEC
Lazarus μν κ·Έλ£Ήμ Volgmer, Scout μ
μ±μ½λ λΆμ λ³΄κ³ μ - ASEC
Lazarus μν κ·Έλ£Ήμ Volgmer, Scout μ
μ±μ½λ λΆμ λ³΄κ³ μ ASEC
β€1
Mirai Botnet's New Wave: hailBot,kiraiBot, catDDoS, and Their Fierce Onslaught - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanc
π£digicat
π@malwr
π£digicat
π@malwr
NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
Mirai Botnet's New Wave: hailBot,kiraiBot, catDDoS, and Their Fierce Onslaught - NSFOCUS, Inc., a global network and cyber securityβ¦
Several new Mirai variant families were widely deployed in September 2023, among which hailBot, kiraiBot and catDDoS are the most active.
EvilProxy Phishing Attack - The threat actors leveraged an open redirection vulnerability on the job search platform βindeed.comβ, redirecting victims to malicious phishing pages impersonating Microsoft.
π£digicat
π@malwr
π£digicat
π@malwr
Menlosecurity
EvilProxy Phishing Attack Strikes Indeed - Blog | Menlo Security
Menlo Labs identified a phishing campaign exploiting an open redirection vulnerability on job search platform Indeed.
β€1
Binarly REsearch - Multiple Critical Vulnerabilities in Supermicro BMCs
π£netsec_burn
Aren't we past this stuff yet:
π€derp6996
π@malwr
π£netsec_burn
Aren't we past this stuff yet:
Unfortunately, as usually happens during the disclosure process, the vendor tried to reduce the final impact of the documented vulnerabilities. We believe this to be an extremely wrong position, since end customers will have incorrect information when assessing the severity of a particular update. We encourage system administrators to keep their BMC systems up to date and follow NSA and CISA hardening guidelines.π€derp6996
π@malwr
www.binarly.io
Binarly REsearch Uncovers Major Vulnerabilities in Supermicro BMCs
Uncover Major Vulnerabilities in Supermicro BMCs. Dive into hidden attack surfaces and exploits found by BINARLY REsearch in Supermicro BMC IPMI firmware.