Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan
Cisco Talos assesses with high confidence that YoroTrooper, an espionage-focused threat actor first active in June 2022, likely consists of individuals from Kazakhstan based on their use of Kazakh currency and fluency in Kazakh and Russian.
https://blog.talosintelligence.com/attributing-yorotrooper/
🎖@malwr
Cisco Talos assesses with high confidence that YoroTrooper, an espionage-focused threat actor first active in June 2022, likely consists of individuals from Kazakhstan based on their use of Kazakh currency and fluency in Kazakh and Russian.
https://blog.talosintelligence.com/attributing-yorotrooper/
🎖@malwr
Cisco Talos
Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan
Cisco Talos assesses with high confidence that YoroTrooper, an espionage-focused threat actor first active in June 2022, likely consists of individuals from Kazakhstan based on their use of Kazakh currency and fluency in Kazakh and Russian.
Attacks on web applications spike in third quarter, new Talos IR data shows
We observed the BlackByte ransomware group’s new variant, BlackByte NT, for the first time in addition to the previously seen LockBit ransomware, which continues to be the top observed ransomware family in Talos IR engagements.
https://blog.talosintelligence.com/talos-ir-trends-q3-2023/
🎖@malwr
We observed the BlackByte ransomware group’s new variant, BlackByte NT, for the first time in addition to the previously seen LockBit ransomware, which continues to be the top observed ransomware family in Talos IR engagements.
https://blog.talosintelligence.com/talos-ir-trends-q3-2023/
🎖@malwr
Cisco Talos Blog
Attacks on web applications spike in third quarter, new Talos IR data shows
We observed the BlackByte ransomware group’s new variant, BlackByte NT, for the first time in addition to the previously seen LockBit ransomware, which continues to be the top observed ransomware family in Talos IR engagements.
Malware stories: Deworming the XWorm
XWorm is a multi-purpose malware family, commonly used as RAT. This post contains a detailed analysis and walk-through the reverse-engineering process.
https://cert.pl/en/posts/2023/10/deworming-the-xworm/
🎖@malwr
XWorm is a multi-purpose malware family, commonly used as RAT. This post contains a detailed analysis and walk-through the reverse-engineering process.
https://cert.pl/en/posts/2023/10/deworming-the-xworm/
🎖@malwr
cert.pl
Malware stories: Deworming the XWorm
XWorm is a multi-purpose malware family, commonly used as RAT. This post contains a detailed analysis and walk-through the reverse-engineering process.
How to increase radio range of Flipper Zero yourself beyond 100 meters
https://www.mobile-hacker.com/2023/10/24/how-to-increase-radio-range-of-flipper-zero-yourself-beyond-100-meters/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-increase-radio-range-of-flipper-zero-yourself-beyond-100-meters
🎖@malwr
https://www.mobile-hacker.com/2023/10/24/how-to-increase-radio-range-of-flipper-zero-yourself-beyond-100-meters/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-increase-radio-range-of-flipper-zero-yourself-beyond-100-meters
🎖@malwr
Mobile Hacker
How to increase radio range of Flipper Zero yourself beyond 100 meters Mobile Hacker
Equipped with an integrated module, Flipper Zero is capable of both receiving and transmitting radio frequencies spanning from 300 MHz to 928 MHz. This module enables to capture, store, and replicate remote controls, commonly employed for tasks such as interfacing…
Small Screens, Big Risks: Falcon for Mobile Releases New Innovations to Accelerate Detection and Response for Mobile Threats
Mobile devices have become critical endpoints for accessing enterprise applications, systems and data. Adversaries know this all too well, as evidenced by the growing numbers of attacks that target mobile devices. Verizon’s 2022 Mobile Security Index found almost half (45%) of enterprises had recently suffered a mobile-related compromise involving devices in the last 12 months...
https://www.crowdstrike.com/blog/falcon-for-mobile-releases-innovations/
🎖@malwr
Mobile devices have become critical endpoints for accessing enterprise applications, systems and data. Adversaries know this all too well, as evidenced by the growing numbers of attacks that target mobile devices. Verizon’s 2022 Mobile Security Index found almost half (45%) of enterprises had recently suffered a mobile-related compromise involving devices in the last 12 months...
https://www.crowdstrike.com/blog/falcon-for-mobile-releases-innovations/
🎖@malwr
crowdstrike.com
Falcon for Mobile to Accelerate Detection and Response for Mobile Threats
Falcon for Mobile released innovations aimed at streamlining mobile device enrollment, advancing detection capabilities, and accelerating incident response.
How Well Do You Know Your Attack Surface? Five Tips to Reduce the Risk of Exposure
In an increasingly connected digital landscape, the security of your organization’s data and publicly facing assets is more critical than ever. According to the CrowdStrike 2023 Threat Hunting Report, more than 20% of all interactive intrusions are associated with the exploitation of public-facing applications. As an organization’s attack surface expands and cyberthreats proliferate, it is...
https://www.crowdstrike.com/blog/five-tips-to-shield-from-exposures/
🎖@malwr
In an increasingly connected digital landscape, the security of your organization’s data and publicly facing assets is more critical than ever. According to the CrowdStrike 2023 Threat Hunting Report, more than 20% of all interactive intrusions are associated with the exploitation of public-facing applications. As an organization’s attack surface expands and cyberthreats proliferate, it is...
https://www.crowdstrike.com/blog/five-tips-to-shield-from-exposures/
🎖@malwr
crowdstrike.com
5 Tips to Shield Your Organization from Exposures | CrowdStrike
It’s no secret that the attack surface is expanding at an unprecedented rate. Read this blog to learn our handpicked, top EASM tips to reduce your exposures.
2023-10-23 - 404 TDS URL chain leads to Async RAT variant
https://www.malware-traffic-analysis.net/2023/10/23/index.html
🎖@malwr
https://www.malware-traffic-analysis.net/2023/10/23/index.html
🎖@malwr
2023-10-18 - IcedID Forked Variant with Anubis VNC, Cobalt Strike, etc.
https://www.malware-traffic-analysis.net/2023/10/18/index.html
🎖@malwr
https://www.malware-traffic-analysis.net/2023/10/18/index.html
🎖@malwr
Phishing Investigations: The Fast, Automated Method
Try out Intezer’s capabilities for automating phishing investigations for free. Learn more about our Starter and Complete plans or sign up for free here. At Intezer, we’re committed to enhancing security operations efficiency and effectiveness. Earlier in 2023, we were thrilled to announce the launch of our new features for Automated Phishing Investigations. These capabilities...
https://intezer.com/blog/alert-triage/automated-phishing-investigation/
🎖@malwr
Try out Intezer’s capabilities for automating phishing investigations for free. Learn more about our Starter and Complete plans or sign up for free here. At Intezer, we’re committed to enhancing security operations efficiency and effectiveness. Earlier in 2023, we were thrilled to announce the launch of our new features for Automated Phishing Investigations. These capabilities...
https://intezer.com/blog/alert-triage/automated-phishing-investigation/
🎖@malwr
Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers
ESET Research recommends updating Roundcube Webmail to the latest available version as soon as possible
https://www.welivesecurity.com/en/eset-research/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers/
🎖@malwr
ESET Research recommends updating Roundcube Webmail to the latest available version as soon as possible
https://www.welivesecurity.com/en/eset-research/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers/
🎖@malwr
Welivesecurity
Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers
ESET Research discover campaigns by the Winter Vivern APT group that exploit a zero-day XSS vulnerability in the Roundcube Webmail server and target governmental entities and a think tank in Europe.
Hong Kong residents targeted in malvertising campaigns for WhatsApp, Telegram
https://www.malwarebytes.com/blog/threat-intelligence/2023/10/hong-kong-residents-targeted-in-malvertising-campaigns-for-whatsapp-telegram
🎖@malwr
https://www.malwarebytes.com/blog/threat-intelligence/2023/10/hong-kong-residents-targeted-in-malvertising-campaigns-for-whatsapp-telegram
🎖@malwr
Malwarebytes
Hong Kong residents targeted in malvertising campaigns for WhatsApp, Telegram
Malvertising is a powerful malware or scam delivery mechanism that makes it easy to target specific geographies or even users. A...
Doctor Web’s September 2023 review of virus activity on mobile devices
https://news.drweb.com/show/?i=14767&lng=en&c=5
🎖@malwr
https://news.drweb.com/show/?i=14767&lng=en&c=5
🎖@malwr
Dr.Web
Dr.Web — Doctor Web’s September 2023 review of virus activity on mobile devices
Find out on Doctor Web’s site about the latest virus threats and information security issues.
Finding You: The Network Effect of Telecommunications Vulnerabilities for Location Disclosure
This report provides a comprehensive guide to geolocation-related threats used by 3G, 4G, and 5G network operators. Case studies, references, examples, and evidence are provided to give a complete and contextual understanding of mobile network-based location tracking in order to formulate policies and actions that protect civil society from current and future geolocation surveillance.
https://citizenlab.ca/2023/10/finding-you-teleco-vulnerabilities-for-location-disclosure/
🎖@malwr
This report provides a comprehensive guide to geolocation-related threats used by 3G, 4G, and 5G network operators. Case studies, references, examples, and evidence are provided to give a complete and contextual understanding of mobile network-based location tracking in order to formulate policies and actions that protect civil society from current and future geolocation surveillance.
https://citizenlab.ca/2023/10/finding-you-teleco-vulnerabilities-for-location-disclosure/
🎖@malwr
The Citizen Lab
Finding You
This report provides a comprehensive guide to geolocation-related threats sourced from 3G, 4G, and 5G network operators. Case studies, references, examples, and evidence are provided to give a complete and contextual understanding of mobile network-based…
👍1
2023-10-25 - DarkGate infection from malspam
https://www.malware-traffic-analysis.net/2023/10/25/index.html
🎖@malwr
https://www.malware-traffic-analysis.net/2023/10/25/index.html
🎖@malwr
How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime
This report explores the Kopeechka service and gives a detailed technical analysis of the service’s features and capabilities and how it can help cybercriminals to achieve their goals.
https://www.trendmicro.com/en_us/research/23/j/how-kopeechka--an-automated-social-media-accounts-creation-servi.html
🎖@malwr
This report explores the Kopeechka service and gives a detailed technical analysis of the service’s features and capabilities and how it can help cybercriminals to achieve their goals.
https://www.trendmicro.com/en_us/research/23/j/how-kopeechka--an-automated-social-media-accounts-creation-servi.html
🎖@malwr
Trend Micro
How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime
👍1
Charting New Terrain: The Shift to Resilience and Proximity in Cyber Risk
Draft deadlines are a necessary but sometimes unfortunate book editing reality.
https://www.recordedfuture.com/charting-new-terrain-shift-resilience-proximity-cyber-risk
🎖@malwr
Draft deadlines are a necessary but sometimes unfortunate book editing reality.
https://www.recordedfuture.com/charting-new-terrain-shift-resilience-proximity-cyber-risk
🎖@malwr
ESET APT Activity Report Q2–Q3 2023
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 and Q3 2023
https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-q3-2023/
🎖@malwr
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 and Q3 2023
https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-q3-2023/
🎖@malwr
Welivesecurity
ESET APT Activity Report Q2–Q3 2023
This issue of the ESET APT Activity Report features an overview of the activities of selected APT groups as analyzed by ESET Research between April and September 2023.
Netsupport Intrusion Results in Domain Compromise
NetSupport Manager is one of the oldest third-party remote access tools still currently on the market with over 33 years of history. This is the first time we will report …
https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/
🎖@malwr
NetSupport Manager is one of the oldest third-party remote access tools still currently on the market with over 33 years of history. This is the first time we will report …
https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/
🎖@malwr
The DFIR Report
NetSupport Intrusion Results in Domain Compromise - The DFIR Report
NetSupport Manager is one of the oldest third-party remote access tools still currently on the market with over 33 years of history. This is the first time we will report on a NetSupport RAT intrusion, but malicious use of this tool dates back to at least…
'Accidental' malvertising via Dynamic Search Ads delivers malware frenzy
https://www.malwarebytes.com/blog/threat-intelligence/2023/10/malvertising-via-dynamic-search-ads-delivers-malware-bonanza
🎖@malwr
https://www.malwarebytes.com/blog/threat-intelligence/2023/10/malvertising-via-dynamic-search-ads-delivers-malware-bonanza
🎖@malwr
Malwarebytes
Malvertising via Dynamic Search Ads delivers malware bonanza
Most, if not all malvertising incidents result from a threat actor either injecting code within an existing ad, or intentionally creating...
From Albania to the Middle East: The Scarred Manticore is Listening
https://research.checkpoint.com/2023/from-albania-to-the-middle-east-the-scarred-manticore-is-listening/
🎖@malwr
https://research.checkpoint.com/2023/from-albania-to-the-middle-east-the-scarred-manticore-is-listening/
🎖@malwr
Check Point Research
From Albania to the Middle East: The Scarred Manticore is Listening - Check Point Research
Key Findings Introduction Check Point Research, in collaboration with Sygnia’s Incident Response Team, has been tracking and responding to the activities of Scarred Manticore, an Iranian nation-state threat actor that primarily targets government and telecommunication…