Malware News
12.9K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Earth Lusca Employs New Linux Backdoor, Uses Cobalt Strike for Lateral Movement

While monitoring Earth Lusca, we discovered an intriguing, encrypted file on the threat actor's server โ€” a Linux-based malware, which appears to originate from the open-source Windows backdoor Trochilus, which we've dubbed SprySOCKS due to its swift behavior and SOCKS implementation.

https://www.trendmicro.com/en_us/research/23/i/earth-lusca-employs-new-linux-backdoor.html


๐ŸŽ–@malwr
๐Ÿ“๐Ÿ“๐Ÿ“Forward posts to other groups ๐Ÿ“๐Ÿ“๐Ÿ“
โค2
Malware News pinned ยซ๐Ÿ“๐Ÿ“๐Ÿ“Forward posts to other groups ๐Ÿ“๐Ÿ“๐Ÿ“ยป
Trench Tales: The College Account Takeover That Never Happened

A story of mass-discovery of LDAP Anonymous Binding leading to the account takeover of all members of a college. Explore the methodology, the challenges and the discoveries of this research project.Continue reading

https://securitycafe.ro/2023/10/16/trench-tales-the-college-account-takeover-that-never-happened/


๐ŸŽ–@malwr
Beware: Lumma Stealer Distributed via Discord CDN

This blog discusses how threat actors abuse Discordโ€™s content delivery network (CDN) to host and spread Lumma Stealer, and talks about added capabilities to the information stealing malware.

https://www.trendmicro.com/en_us/research/23/j/beware-lumma-stealer-distributed-via-discord-cdn-.html


๐ŸŽ–@malwr
Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerability

Cisco has identified active exploitation of a previously unknown vulnerability in the Web User Interface (Web UI) feature of Cisco IOS XE software (CVE-2023-20198) when exposed to the internet or untrusted networks.

https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/


๐ŸŽ–@malwr
How to Analyze Malicious Microsoft Office Files

Microsoft Office files (and other file types commonly used for delivering malware, including binary files, documents, scripts, and archives) are supported in Intezer for both on-demand sandboxing and automated alert triage. Phishing attacks are one of the three primary ways attackers get access to organizations according to Verizonโ€™s 2023 Data Breach Investigations Reportโ€ฆ and many...

https://intezer.com/blog/malware-analysis/analyze-malicious-microsoft-office-files/


๐ŸŽ–@malwr
Email Security Best Practices for Phishing Prevention

Trend Micro Research reported a 29% growth in phishing attacks blocked and detected in 2022. Explore the latest phishing trends and email security best practices to enhance your email security and reduce cyber risk.

https://www.trendmicro.com/en_us/ciso/22/k/email-security-best-practices.html


๐ŸŽ–@malwr
The path from VT Intelligence queries to VT Livehunt rules: A CTI analyst approach

https://blog.virustotal.com/2023/10/the-path-from-vt-intelligence-queries.html


๐ŸŽ–@malwr
Snapshot fuzzing direct composition with WTF

Although there is public research on Direct Composition, only a few discuss fuzzing this feature, and none, to our knowledge, that covers snapshot fuzzing.

https://blog.talosintelligence.com/snapshot-fuzzing-direct-composition-with-wtf/


๐ŸŽ–@malwr
2023-10-17 - TA577 Pikabot infection with Cobalt Strike

https://www.malware-traffic-analysis.net/2023/10/17/index.html


๐ŸŽ–@malwr
AI Insights for Scripts, Macros, and More: Revolutionizing Threat Analysis with AI

Intezerโ€™s AI Insights is now available for scripts, macros, phishing emails, command line processes, and more. AI Insights are automatically generated by Intezer for alerts triaged from your connected sources. At Intezer, weโ€™re always pushing the boundaries of whatโ€™s possible in cybersecurity. In the spring, we were thrilled to announce the launch of our first...

https://intezer.com/blog/alert-triage/ai-insights-revolutionizing-threat-analysis/


๐ŸŽ–@malwr