Malware News
12.9K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Finding You: The Network Effect of Telecommunications Vulnerabilities for Location Disclosure

This report provides a comprehensive guide to geolocation-related threats used by 3G, 4G, and 5G network operators. Case studies, references, examples, and evidence are provided to give a complete and contextual understanding of mobile network-based location tracking in order to formulate policies and actions that protect civil society from current and future geolocation surveillance.

https://citizenlab.ca/2023/10/finding-you-teleco-vulnerabilities-for-location-disclosure/


🎖@malwr
👍1
2023-10-25 - DarkGate infection from malspam

https://www.malware-traffic-analysis.net/2023/10/25/index.html


🎖@malwr
How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime

This report explores the Kopeechka service and gives a detailed technical analysis of the service’s features and capabilities and how it can help cybercriminals to achieve their goals.

https://www.trendmicro.com/en_us/research/23/j/how-kopeechka--an-automated-social-media-accounts-creation-servi.html


🎖@malwr
👍1
Charting New Terrain: The Shift to Resilience and Proximity in Cyber Risk

Draft deadlines are a necessary but sometimes unfortunate book editing reality.

https://www.recordedfuture.com/charting-new-terrain-shift-resilience-proximity-cyber-risk


🎖@malwr
Arid Viper disguising mobile spyware as updates for non-malicious Android applications

Since April 2022, Cisco Talos has been tracking a malicious campaign operated by the espionage-motivated Arid Viper advanced persistent threat (APT) group targeting Arabic-speaking Android users.

https://blog.talosintelligence.com/arid-viper-mobile-spyware/


🎖@malwr
How to Analyze Malicious PDF Files

PDF files are supported in Intezer for both on-demand sandboxing and automated alert triage, as well as all other file types commonly used for delivering malware, like binary files or Microsoft Office formats. Portable Document Format (PDF) files are a cross-platform file format that supports links, images, and fonts. The flexibility of the PDF format makes...

https://intezer.com/blog/incident-response/analyze-malicious-pdf-files/


🎖@malwr
Detect Phishing Emails by Inspecting Email Headers, Attachments, and URLs

Emails were created as a method to pass messages between users, and now they are used by individuals and organizations all around the globe, by both big and small companies across all industries. But emails also have a dark side – phishing emails that are used by threat actors to gain access to victims’ systems. ...

https://intezer.com/blog/incident-response/automate-analysis-phishing-email-files/


🎖@malwr