Malware News
12.9K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime

This report explores the Kopeechka service and gives a detailed technical analysis of the serviceโ€™s features and capabilities and how it can help cybercriminals to achieve their goals.

https://www.trendmicro.com/en_us/research/23/j/how-kopeechka--an-automated-social-media-accounts-creation-servi.html


๐ŸŽ–@malwr
๐Ÿ‘1
Charting New Terrain: The Shift to Resilience and Proximity in Cyber Risk

Draft deadlines are a necessary but sometimes unfortunate book editing reality.

https://www.recordedfuture.com/charting-new-terrain-shift-resilience-proximity-cyber-risk


๐ŸŽ–@malwr
Arid Viper disguising mobile spyware as updates for non-malicious Android applications

Since April 2022, Cisco Talos has been tracking a malicious campaign operated by the espionage-motivated Arid Viper advanced persistent threat (APT) group targeting Arabic-speaking Android users.

https://blog.talosintelligence.com/arid-viper-mobile-spyware/


๐ŸŽ–@malwr
How to Analyze Malicious PDF Files

PDF files are supported in Intezer for both on-demand sandboxing and automated alert triage, as well as all other file types commonly used for delivering malware, like binary files or Microsoft Office formats. Portable Document Format (PDF) files are a cross-platform file format that supports links, images, and fonts. The flexibility of the PDF format makes...

https://intezer.com/blog/incident-response/analyze-malicious-pdf-files/


๐ŸŽ–@malwr
2023-10-31 - IcedID (Bokbot) infection

https://www.malware-traffic-analysis.net/2023/10/31/index.html


๐ŸŽ–@malwr
Detect Phishing Emails by Inspecting Email Headers, Attachments, and URLs

Emails were created as a method to pass messages between users, and now they are used by individuals and organizations all around the globe, by both big and small companies across all industries. But emails also have a dark side โ€“ phishing emails that are used by threat actors to gain access to victimsโ€™ systems. ...

https://intezer.com/blog/incident-response/automate-analysis-phishing-email-files/


๐ŸŽ–@malwr