Clever malvertising attack uses Punycode to look like KeePass's official website
https://www.malwarebytes.com/blog/threat-intelligence/2023/10/clever-malvertising-attack-uses-punycode-to-look-like-legitimate-website
🎖@malwr
https://www.malwarebytes.com/blog/threat-intelligence/2023/10/clever-malvertising-attack-uses-punycode-to-look-like-legitimate-website
🎖@malwr
Malwarebytes
Clever malvertising attack uses Punycode to look like KeePass’s official website
Threat actors are known for impersonating popular brands in order to trick users. In a recent malvertising campaign, we observed a malicious...
Hamas Application Infrastructure Reveals Possible Overlap With TAG-63 and Iranian Threat Activity
Insikt Group identified an application disseminated on a Telegram Channel used by members or supporters of the Hamas terrorist organization
https://www.recordedfuture.com/hamas-application-infrastructure-reveals-possible-overlap-tag-63-iranian-threat-activity
🎖@malwr
Insikt Group identified an application disseminated on a Telegram Channel used by members or supporters of the Hamas terrorist organization
https://www.recordedfuture.com/hamas-application-infrastructure-reveals-possible-overlap-tag-63-iranian-threat-activity
🎖@malwr
Recordedfuture
Hamas Application Infrastructure Reveals Possible Overlap With TAG-63 and Iranian Threat Activity | Recorded Future
Insikt Group identified an application disseminated on a Telegram Channel used by members or supporters of the Hamas terrorist organization
“Please do not make it public”: Vulnerabilities in Sogou Keyboard encryption expose keypresses to network eavesdropping
In this report, we analyze the Windows, Android, and iOS versions of Tencent’s Sogou Input Method, the most popular Chinese-language input method in China. Our analysis found serious vulnerabilities in the app’s custom encryption system and how it encrypts sensitive data. These vulnerabilities could allow a network eavesdropper to decrypt sensitive communications sent by the app, including revealing all keystrokes being typed by the user. Following our disclosure of these vulnerabilities, Sogou released updated versions of the app that identified all of the issues we disclosed.
https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/
🎖@malwr
In this report, we analyze the Windows, Android, and iOS versions of Tencent’s Sogou Input Method, the most popular Chinese-language input method in China. Our analysis found serious vulnerabilities in the app’s custom encryption system and how it encrypts sensitive data. These vulnerabilities could allow a network eavesdropper to decrypt sensitive communications sent by the app, including revealing all keystrokes being typed by the user. Following our disclosure of these vulnerabilities, Sogou released updated versions of the app that identified all of the issues we disclosed.
https://citizenlab.ca/2023/08/vulnerabilities-in-sogou-keyboard-encryption/
🎖@malwr
The Citizen Lab
“Please do not make it public”
In this report, we analyze the Windows, Android, and iOS versions of Tencent’s Sogou Input Method, the most popular Chinese-language input method in China. Our analysis found serious vulnerabilities in the app’s custom encryption system and how it encrypts…
Attacks on 5G Infrastructure From User Devices: ASN.1 Vulnerabilities in 5G Cores
In the second part of this series, we will examine how attackers can trigger vulnerabilities by sending control messages masquerading as user traffic to cross over from user plane to control plane.
https://www.trendmicro.com/en_us/research/23/j/asn1-vulnerabilities-in-5g-cores.html
🎖@malwr
In the second part of this series, we will examine how attackers can trigger vulnerabilities by sending control messages masquerading as user traffic to cross over from user plane to control plane.
https://www.trendmicro.com/en_us/research/23/j/asn1-vulnerabilities-in-5g-cores.html
🎖@malwr
Trend Micro
Attacks on 5G Infrastructure From User Devices: ASN.1 Vulnerabilities in 5G Cores
In the second part of this series, we will examine how attackers can trigger vulnerabilities by sending control messages masquerading as user traffic to cross over from user plane to control plane.
One login to rule them all: Should you sign in with Google or Facebook on other websites?
Why use and keep track of a zillion discrete accounts when you can log into so many apps and websites using your Facebook or Google credentials, right? Not so fast. What’s the trade-off?
https://www.welivesecurity.com/en/cybersecurity/one-login-rule-them-all-should-sign-in-google-facebook-other-websites/
🎖@malwr
Why use and keep track of a zillion discrete accounts when you can log into so many apps and websites using your Facebook or Google credentials, right? Not so fast. What’s the trade-off?
https://www.welivesecurity.com/en/cybersecurity/one-login-rule-them-all-should-sign-in-google-facebook-other-websites/
🎖@malwr
Welivesecurity
One login to rule them all: Should you sign in with Google or Facebook on other websites?
Why use a zillion discrete accounts when you can log into so many apps and websites using your Facebook or Google credentials, right? Not so fast. What’s the trade-off?
Here are the pros and cons of the consumer variety of an authentication method called…
Here are the pros and cons of the consumer variety of an authentication method called…
Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan
Cisco Talos assesses with high confidence that YoroTrooper, an espionage-focused threat actor first active in June 2022, likely consists of individuals from Kazakhstan based on their use of Kazakh currency and fluency in Kazakh and Russian.
https://blog.talosintelligence.com/attributing-yorotrooper/
🎖@malwr
Cisco Talos assesses with high confidence that YoroTrooper, an espionage-focused threat actor first active in June 2022, likely consists of individuals from Kazakhstan based on their use of Kazakh currency and fluency in Kazakh and Russian.
https://blog.talosintelligence.com/attributing-yorotrooper/
🎖@malwr
Cisco Talos
Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan
Cisco Talos assesses with high confidence that YoroTrooper, an espionage-focused threat actor first active in June 2022, likely consists of individuals from Kazakhstan based on their use of Kazakh currency and fluency in Kazakh and Russian.
Attacks on web applications spike in third quarter, new Talos IR data shows
We observed the BlackByte ransomware group’s new variant, BlackByte NT, for the first time in addition to the previously seen LockBit ransomware, which continues to be the top observed ransomware family in Talos IR engagements.
https://blog.talosintelligence.com/talos-ir-trends-q3-2023/
🎖@malwr
We observed the BlackByte ransomware group’s new variant, BlackByte NT, for the first time in addition to the previously seen LockBit ransomware, which continues to be the top observed ransomware family in Talos IR engagements.
https://blog.talosintelligence.com/talos-ir-trends-q3-2023/
🎖@malwr
Cisco Talos Blog
Attacks on web applications spike in third quarter, new Talos IR data shows
We observed the BlackByte ransomware group’s new variant, BlackByte NT, for the first time in addition to the previously seen LockBit ransomware, which continues to be the top observed ransomware family in Talos IR engagements.
Malware stories: Deworming the XWorm
XWorm is a multi-purpose malware family, commonly used as RAT. This post contains a detailed analysis and walk-through the reverse-engineering process.
https://cert.pl/en/posts/2023/10/deworming-the-xworm/
🎖@malwr
XWorm is a multi-purpose malware family, commonly used as RAT. This post contains a detailed analysis and walk-through the reverse-engineering process.
https://cert.pl/en/posts/2023/10/deworming-the-xworm/
🎖@malwr
cert.pl
Malware stories: Deworming the XWorm
XWorm is a multi-purpose malware family, commonly used as RAT. This post contains a detailed analysis and walk-through the reverse-engineering process.
How to increase radio range of Flipper Zero yourself beyond 100 meters
https://www.mobile-hacker.com/2023/10/24/how-to-increase-radio-range-of-flipper-zero-yourself-beyond-100-meters/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-increase-radio-range-of-flipper-zero-yourself-beyond-100-meters
🎖@malwr
https://www.mobile-hacker.com/2023/10/24/how-to-increase-radio-range-of-flipper-zero-yourself-beyond-100-meters/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-increase-radio-range-of-flipper-zero-yourself-beyond-100-meters
🎖@malwr
Mobile Hacker
How to increase radio range of Flipper Zero yourself beyond 100 meters Mobile Hacker
Equipped with an integrated module, Flipper Zero is capable of both receiving and transmitting radio frequencies spanning from 300 MHz to 928 MHz. This module enables to capture, store, and replicate remote controls, commonly employed for tasks such as interfacing…
Small Screens, Big Risks: Falcon for Mobile Releases New Innovations to Accelerate Detection and Response for Mobile Threats
Mobile devices have become critical endpoints for accessing enterprise applications, systems and data. Adversaries know this all too well, as evidenced by the growing numbers of attacks that target mobile devices. Verizon’s 2022 Mobile Security Index found almost half (45%) of enterprises had recently suffered a mobile-related compromise involving devices in the last 12 months...
https://www.crowdstrike.com/blog/falcon-for-mobile-releases-innovations/
🎖@malwr
Mobile devices have become critical endpoints for accessing enterprise applications, systems and data. Adversaries know this all too well, as evidenced by the growing numbers of attacks that target mobile devices. Verizon’s 2022 Mobile Security Index found almost half (45%) of enterprises had recently suffered a mobile-related compromise involving devices in the last 12 months...
https://www.crowdstrike.com/blog/falcon-for-mobile-releases-innovations/
🎖@malwr
crowdstrike.com
Falcon for Mobile to Accelerate Detection and Response for Mobile Threats
Falcon for Mobile released innovations aimed at streamlining mobile device enrollment, advancing detection capabilities, and accelerating incident response.
How Well Do You Know Your Attack Surface? Five Tips to Reduce the Risk of Exposure
In an increasingly connected digital landscape, the security of your organization’s data and publicly facing assets is more critical than ever. According to the CrowdStrike 2023 Threat Hunting Report, more than 20% of all interactive intrusions are associated with the exploitation of public-facing applications. As an organization’s attack surface expands and cyberthreats proliferate, it is...
https://www.crowdstrike.com/blog/five-tips-to-shield-from-exposures/
🎖@malwr
In an increasingly connected digital landscape, the security of your organization’s data and publicly facing assets is more critical than ever. According to the CrowdStrike 2023 Threat Hunting Report, more than 20% of all interactive intrusions are associated with the exploitation of public-facing applications. As an organization’s attack surface expands and cyberthreats proliferate, it is...
https://www.crowdstrike.com/blog/five-tips-to-shield-from-exposures/
🎖@malwr
crowdstrike.com
5 Tips to Shield Your Organization from Exposures | CrowdStrike
It’s no secret that the attack surface is expanding at an unprecedented rate. Read this blog to learn our handpicked, top EASM tips to reduce your exposures.
2023-10-23 - 404 TDS URL chain leads to Async RAT variant
https://www.malware-traffic-analysis.net/2023/10/23/index.html
🎖@malwr
https://www.malware-traffic-analysis.net/2023/10/23/index.html
🎖@malwr
2023-10-18 - IcedID Forked Variant with Anubis VNC, Cobalt Strike, etc.
https://www.malware-traffic-analysis.net/2023/10/18/index.html
🎖@malwr
https://www.malware-traffic-analysis.net/2023/10/18/index.html
🎖@malwr
Phishing Investigations: The Fast, Automated Method
Try out Intezer’s capabilities for automating phishing investigations for free. Learn more about our Starter and Complete plans or sign up for free here. At Intezer, we’re committed to enhancing security operations efficiency and effectiveness. Earlier in 2023, we were thrilled to announce the launch of our new features for Automated Phishing Investigations. These capabilities...
https://intezer.com/blog/alert-triage/automated-phishing-investigation/
🎖@malwr
Try out Intezer’s capabilities for automating phishing investigations for free. Learn more about our Starter and Complete plans or sign up for free here. At Intezer, we’re committed to enhancing security operations efficiency and effectiveness. Earlier in 2023, we were thrilled to announce the launch of our new features for Automated Phishing Investigations. These capabilities...
https://intezer.com/blog/alert-triage/automated-phishing-investigation/
🎖@malwr
Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers
ESET Research recommends updating Roundcube Webmail to the latest available version as soon as possible
https://www.welivesecurity.com/en/eset-research/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers/
🎖@malwr
ESET Research recommends updating Roundcube Webmail to the latest available version as soon as possible
https://www.welivesecurity.com/en/eset-research/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers/
🎖@malwr
Welivesecurity
Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers
ESET Research discover campaigns by the Winter Vivern APT group that exploit a zero-day XSS vulnerability in the Roundcube Webmail server and target governmental entities and a think tank in Europe.
Hong Kong residents targeted in malvertising campaigns for WhatsApp, Telegram
https://www.malwarebytes.com/blog/threat-intelligence/2023/10/hong-kong-residents-targeted-in-malvertising-campaigns-for-whatsapp-telegram
🎖@malwr
https://www.malwarebytes.com/blog/threat-intelligence/2023/10/hong-kong-residents-targeted-in-malvertising-campaigns-for-whatsapp-telegram
🎖@malwr
Malwarebytes
Hong Kong residents targeted in malvertising campaigns for WhatsApp, Telegram
Malvertising is a powerful malware or scam delivery mechanism that makes it easy to target specific geographies or even users. A...
Doctor Web’s September 2023 review of virus activity on mobile devices
https://news.drweb.com/show/?i=14767&lng=en&c=5
🎖@malwr
https://news.drweb.com/show/?i=14767&lng=en&c=5
🎖@malwr
Dr.Web
Dr.Web — Doctor Web’s September 2023 review of virus activity on mobile devices
Find out on Doctor Web’s site about the latest virus threats and information security issues.
Finding You: The Network Effect of Telecommunications Vulnerabilities for Location Disclosure
This report provides a comprehensive guide to geolocation-related threats used by 3G, 4G, and 5G network operators. Case studies, references, examples, and evidence are provided to give a complete and contextual understanding of mobile network-based location tracking in order to formulate policies and actions that protect civil society from current and future geolocation surveillance.
https://citizenlab.ca/2023/10/finding-you-teleco-vulnerabilities-for-location-disclosure/
🎖@malwr
This report provides a comprehensive guide to geolocation-related threats used by 3G, 4G, and 5G network operators. Case studies, references, examples, and evidence are provided to give a complete and contextual understanding of mobile network-based location tracking in order to formulate policies and actions that protect civil society from current and future geolocation surveillance.
https://citizenlab.ca/2023/10/finding-you-teleco-vulnerabilities-for-location-disclosure/
🎖@malwr
The Citizen Lab
Finding You
This report provides a comprehensive guide to geolocation-related threats sourced from 3G, 4G, and 5G network operators. Case studies, references, examples, and evidence are provided to give a complete and contextual understanding of mobile network-based…
👍1
2023-10-25 - DarkGate infection from malspam
https://www.malware-traffic-analysis.net/2023/10/25/index.html
🎖@malwr
https://www.malware-traffic-analysis.net/2023/10/25/index.html
🎖@malwr
How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime
This report explores the Kopeechka service and gives a detailed technical analysis of the service’s features and capabilities and how it can help cybercriminals to achieve their goals.
https://www.trendmicro.com/en_us/research/23/j/how-kopeechka--an-automated-social-media-accounts-creation-servi.html
🎖@malwr
This report explores the Kopeechka service and gives a detailed technical analysis of the service’s features and capabilities and how it can help cybercriminals to achieve their goals.
https://www.trendmicro.com/en_us/research/23/j/how-kopeechka--an-automated-social-media-accounts-creation-servi.html
🎖@malwr
Trend Micro
How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime
👍1