Malware News
12.9K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
How to Analyze Malicious PDF Files

PDF files are supported in Intezer for both on-demand sandboxing and automated alert triage, as well as all other file types commonly used for delivering malware, like binary files or Microsoft Office formats. Portable Document Format (PDF) files are a cross-platform file format that supports links, images, and fonts. The flexibility of the PDF format makes...

https://intezer.com/blog/incident-response/analyze-malicious-pdf-files/


๐ŸŽ–@malwr
2023-10-31 - IcedID (Bokbot) infection

https://www.malware-traffic-analysis.net/2023/10/31/index.html


๐ŸŽ–@malwr
Detect Phishing Emails by Inspecting Email Headers, Attachments, and URLs

Emails were created as a method to pass messages between users, and now they are used by individuals and organizations all around the globe, by both big and small companies across all industries. But emails also have a dark side โ€“ phishing emails that are used by threat actors to gain access to victimsโ€™ systems. ...

https://intezer.com/blog/incident-response/automate-analysis-phishing-email-files/


๐ŸŽ–@malwr
Charting Chinaโ€™s Climb as a Leading Global Cyber Power

Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years.

https://www.recordedfuture.com/charting-chinas-climb-leading-global-cyber-power


๐ŸŽ–@malwr
Joker DPR and the Information War

Insikt Groupยฎ reveals new research on Joker DPR, a pro-Russian hacktivist group influencing the Ukraine crisis. Learn about their tactics, impact, and possible ties to the Russian state.

https://www.recordedfuture.com/joker-dpr-and-the-information-war


๐ŸŽ–@malwr
๐Ÿ‘1
Threat Actors Leverage File-Sharing Service and Reverse Proxies for Credential Harvesting

We analyzed a phishing campaign involving malicious emails containing a link to a file-sharing solution, which further leads to a PDF document with a secondary link designed to steal login info and session cookies.

https://www.trendmicro.com/en_us/research/23/k/threat-actors-leverage-file-sharing-service-and-reverse-proxies.html


๐ŸŽ–@malwr