Malware News
12.9K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Azure Serial Console Attack and Defense - Part 2

This is the second installment of the Azure Serial Console blog, which provides insights to improve defenders’ preparedness when investigating Azure Serial Console activity on Azure Linux virtual machines. While the first blog post discussed various tracing activities, such as using Azure activity and Sysmon logs on Windows virtual machines to trace serial console activity, this blog outlines how to enable logging for Azure Linux virtual machines using Sysmon for Linux to capture and how to send these events to a log analytics workspace.

https://msrc.microsoft.com/blog/2023/12/azure-serial-console-attack-and-defense-part-2/


🎖@malwr
Operation HamsaUpdate: A Sophisticated Campaign Delivering Wipers Puts Israeli Infrastructure at Risk

On December 19th, the Israel National Cyber Directorate released an urgent alert warning regarding a phishing campaign actively targeting Israeli customers using F5’s network devices. We’ve labeled this campaign Operation HamsaUpdate. It features the deployment of a newly developed wiper malware that targets both Windows and Linux servers. The campaign leverages a convincingly written email...

https://intezer.com/blog/research/stealth-wiper-israeli-infrastructure/


🎖@malwr
🤔1
Intellexa and Cytrox: From fixer-upper to Intel Agency-grade spyware

Talos revealed that rebooting an iOS or Android device may not remove the Predator spyware produced by Intellexa. Intellexa knows if their customers intend to perform surveillance operations on foreign soil.

https://blog.talosintelligence.com/intellexa-and-cytrox-intel-agency-grade-spyware/


🎖@malwr
Ransomware’s Christmas Carol

Around mid-year, Lab52 published a report on ransomware that included both geopolitical and cyber intelligence content. The report includes the analysis of different sources of information and showcasing some of our cyberintelligence findings in this regard. However, the activity of this type of malware prompts Lab52 to closely track the various recorded cases. Therefore, taking...

https://lab52.io/blog/ransomware-2023/


🎖@malwr
🎖@malwr
5
Hunting for Cobalt Strike in PCAP

In this video I analyze a pcap file from Triage with network traffic from Cobalt Strike Beacon using CapLoader. The video cannot be played in your browser. The pcap file and Cobalt Strike malware config can be downloaded from Recorded Future's Triage sandbox. Cobalt Strike Beacon configs can also be...

https://www.netresec.com/?page=Blog&month=2024-01&post=Hunting-for-Cobalt-Strike-in-PCAP


🎖@malwr
The Artemis security scanner

Artemis is an open-source security vulnerability scanner developed by CERT PL. It is built to look for website misconfigurations and vulnerabilities on a large number of sites. It automatically prepares reports that can be sent to the affected institutions. Thanks to its modular architecture, it can be used to combine the results of various other tools in a single dashboard.

https://cert.pl/en/posts/2024/01/artemis-security-scanner/


🎖@malwr
Private Eyes: China’s Embrace of Open-Source Military Intelligence

Using advanced technology, the People's Liberation Army (PLA) leverages open-source intelligence (OSINT) for military advantage.

https://www.recordedfuture.com/blog/private-eyes-chinas-embrace-open-source-military-intelligence


🎖@malwr
North Korea’s Cyber Strategy

Insikt Group analysis reveals that North Korea uses a cyber strategy centered around aggressive data collection and financial theft to primarily target Asia.

https://www.recordedfuture.com/blog/north-koreas-cyber-strategy


🎖@malwr