.NET Hooking β Harmonizing Managed Territory
https://research.checkpoint.com/2024/net-hooking-harmonizing-managed-territory/
π@malwr
https://research.checkpoint.com/2024/net-hooking-harmonizing-managed-territory/
π@malwr
Check Point Research
.NET Hooking - Harmonizing Managed Territory - Check Point Research
Research by: Jiri Vinopal Key Points Introduction For a malware researcher, analyst, or reverse engineer, the ability to alter the functionality of certain parts of code is a crucial step, often necessary to reach a meaningful result during the analysis process.β¦
Charting Chinaβs Climb as a Leading Global Cyber Power
Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years.
https://www.recordedfuture.com/charting-chinas-climb-leading-global-cyber-power
π@malwr
Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years.
https://www.recordedfuture.com/charting-chinas-climb-leading-global-cyber-power
π@malwr
How to detect Flipper Zero and Bluetooth advertisement attacks using Android app
https://www.mobile-hacker.com/2024/01/09/how-to-detect-flipper-zero-and-bluetooth-advertisement-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-detect-flipper-zero-and-bluetooth-advertisement-attacks
π@malwr
https://www.mobile-hacker.com/2024/01/09/how-to-detect-flipper-zero-and-bluetooth-advertisement-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-detect-flipper-zero-and-bluetooth-advertisement-attacks
π@malwr
Mobile Hacker
How to detect Flipper Zero and Bluetooth advertisement attacks using Android app Mobile Hacker
In October 2023, was in Flipper Zeroβs unofficial Xtreme firmware implemented functionality that would perform Denial of Service attack (DoS) that resulted in freezing and crashing any iPhones running the latest iOS 17. This bug was fixed in December 2023β¦
New decryptor for Babuk Tortilla ransomware variant released
Cisco Talos obtained executable code capable of decrypting files affected by the Babuk Tortilla ransomware variant, allowing Talos to extract and share the private decryption key used by the threat actor.
https://blog.talosintelligence.com/decryptor-babuk-tortilla/
π@malwr
Cisco Talos obtained executable code capable of decrypting files affected by the Babuk Tortilla ransomware variant, allowing Talos to extract and share the private decryption key used by the threat actor.
https://blog.talosintelligence.com/decryptor-babuk-tortilla/
π@malwr
Cisco Talos Blog
New decryptor for Babuk Tortilla ransomware variant released
Cisco Talos obtained executable code capable of decrypting files affected by the Babuk Tortilla ransomware variant, allowing Talos to extract and share the private decryption key used by the threat actor.
Rust for Security and Correctness in the embedded world
https://research.nccgroup.com/2024/01/09/rust-for-security-and-correctness-in-the-embedded-world/
π@malwr
https://research.nccgroup.com/2024/01/09/rust-for-security-and-correctness-in-the-embedded-world/
π@malwr
NCC Group Research Blog
Rust for Security and Correctness in the embedded world
Increasingly large companies are utilising Rust in their systems, either existing or new. Most uses focus on how it can help in managed environments, such as within a system with a rβ¦
The January 2024 Security Update Review
https://www.thezdi.com/blog/2024/1/9/the-january-2024-security-update-review
π@malwr
https://www.thezdi.com/blog/2024/1/9/the-january-2024-security-update-review
π@malwr
Zero Day Initiative
Zero Day Initiative β The January 2024 Security Update Review
Welcome to the first patch Tuesday of 2024. As expected, Microsoft and Adobe have released their latest security patches. Take a break from your other activities and join us as we review the details of their latest advisories. If youβd rather watch the videoβ¦
2024-01-09 - Async RAT infection
https://www.malware-traffic-analysis.net/2024/01/09/index.html
π@malwr
https://www.malware-traffic-analysis.net/2024/01/09/index.html
π@malwr
2024-01-08 - GootLoader infection
https://www.malware-traffic-analysis.net/2024/01/08/index.html
π@malwr
https://www.malware-traffic-analysis.net/2024/01/08/index.html
π@malwr
Examining the Activities of the Turla APT Group
We examine the campaigns of the cyberespionage group known as Turla over the years, with a special focus on the key MITRE techniques and the corresponding IDs associated with the threat actor group.
https://www.trendmicro.com/en_us/research/23/i/examining-the-activities-of-the-turla-group.html
π@malwr
We examine the campaigns of the cyberespionage group known as Turla over the years, with a special focus on the key MITRE techniques and the corresponding IDs associated with the threat actor group.
https://www.trendmicro.com/en_us/research/23/i/examining-the-activities-of-the-turla-group.html
π@malwr
Trend Micro
Examining the Activities of the Turla APT Group
We examine the campaigns of the cyberespionage group known as Turla over the years, with a special focus on the key MITRE techniques and the corresponding IDs associated with the threat actor group.
Atomic Stealer rings in the new year with updated version
https://www.malwarebytes.com/blog/threat-intelligence/2024/01/atomic-stealer-rings-in-the-new-year-with-updated-version
π@malwr
https://www.malwarebytes.com/blog/threat-intelligence/2024/01/atomic-stealer-rings-in-the-new-year-with-updated-version
π@malwr
Malwarebytes
Atomic Stealer rings in the new year with updated version
Mac users should be aware of an active distribution campaign via malicious ads delivering Atomic Stealer. The latest iteration of the malware is stealthy thanks to added encryption and obfuscation of its code.
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
Volexity has uncovered active in-the-wild exploitation of two vulnerabilities allowing unauthenticated remote code execution in Ivanti Connect Secure VPN devices. An official security advisory and kno...
https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/
π@malwr
Volexity has uncovered active in-the-wild exploitation of two vulnerabilities allowing unauthenticated remote code execution in Ivanti Connect Secure VPN devices. An official security advisory and kno...
https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/
π@malwr
Volexity
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
Volexity has uncovered active in-the-wild exploitation of two vulnerabilities allowing unauthenticated remote code execution in Ivanti Connect Secure VPN appliances. An official security advisory and knowledge base article have been released by Ivanti thatβ¦
Attack of the copycats: How fake messaging apps and app mods could bite you
WhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Donβt get taken for a ride.
https://www.welivesecurity.com/en/mobile-security/attack-copycats-fake-messaging-apps-app-mods/
π@malwr
WhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Donβt get taken for a ride.
https://www.welivesecurity.com/en/mobile-security/attack-copycats-fake-messaging-apps-app-mods/
π@malwr
Welivesecurity
Attack of the copycats: How impostor apps and fake app mods could bite you
WhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution.Here's how to avoid getting taken for a ride.
Flying Under the Radar: Abusing GitHub for Malicious Infrastructure
Discover how GitHub is increasingly exploited for cyberattacks in our latest report.
https://www.recordedfuture.com/flying-under-the-radar-abusing-github-malicious-infrastructure
π@malwr
Discover how GitHub is increasingly exploited for cyberattacks in our latest report.
https://www.recordedfuture.com/flying-under-the-radar-abusing-github-malicious-infrastructure
π@malwr
Recordedfuture
Flying Under the Radar: Abusing GitHub for Malicious Infrastructure | Recorded Future
Discover how GitHub is increasingly exploited for cyberattacks in our latest report.
Black Basta-Affiliated Water Curupiraβs Pikabot Spam Campaign
https://www.trendmicro.com/en_us/research/24/a/a-look-into-pikabot-spam-wave-campaign.html
π@malwr
https://www.trendmicro.com/en_us/research/24/a/a-look-into-pikabot-spam-wave-campaign.html
π@malwr
Trend Micro
Black Basta-Affiliated Water Curupiraβs Pikabot Spam Campaign
A threat actor we track under the Intrusion set Water Curupira (known to employ the Black Basta ransomware) has been actively using Pikabot. a loader malware with similarities to Qakbot, in spam campaigns throughout 2023.
Trend Micro Defends FIFA World Cup from Cyber Threats
Trend Micro collaborates with INTERPOL to defend FIFA World Cup by preventing attacks & mitigating risks to fight against the rising threat of cybercrime.
https://www.trendmicro.com/en_us/research/24/a/trend-micro-defends-fifa-world-cup-from-cyber-threats.html
π@malwr
Trend Micro collaborates with INTERPOL to defend FIFA World Cup by preventing attacks & mitigating risks to fight against the rising threat of cybercrime.
https://www.trendmicro.com/en_us/research/24/a/trend-micro-defends-fifa-world-cup-from-cyber-threats.html
π@malwr
Trend Micro
Trend Micro Defends FIFA World Cup from Cyber Threats
Trend Micro collaborates with INTERPOL to defend FIFA World Cup by preventing attacks & mitigating risks to fight against the rising threat of cybercrime.
CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign
This blog delves into the Phemedrone Stealer campaign's exploitation of CVE-2023-36025, the Windows Defender SmartScreen Bypass vulnerability, for its defense evasion and investigates the malware's payload.
https://www.trendmicro.com/en_us/research/24/a/cve-2023-36025-exploited-for-defense-evasion-in-phemedrone-steal.html
π@malwr
This blog delves into the Phemedrone Stealer campaign's exploitation of CVE-2023-36025, the Windows Defender SmartScreen Bypass vulnerability, for its defense evasion and investigates the malware's payload.
https://www.trendmicro.com/en_us/research/24/a/cve-2023-36025-exploited-for-defense-evasion-in-phemedrone-steal.html
π@malwr
Trend Micro
CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign
This blog delves into the Phemedrone Stealer campaign's exploitation of CVE-2023-36025, the Windows Defender SmartScreen Bypass vulnerability, for its defense evasion and investigates the malware's payload.
Advanced root detection & bypass techniques
https://8ksec.io/advanced-root-detection-bypass-techniques/?utm_source=rss&utm_medium=rss&utm_campaign=advanced-root-detection-bypass-techniques
π@malwr
https://8ksec.io/advanced-root-detection-bypass-techniques/?utm_source=rss&utm_medium=rss&utm_campaign=advanced-root-detection-bypass-techniques
π@malwr
8kSec
Frida Part 5: Root Detection Bypass | 8kSec
Learn advanced root detection techniques on Android and practical methods to bypass them using Frida. Covers common detection libraries and evasion strategies.
ARM64 Reversing And Exploitation Part 7 β Bypassing ASLR and NX
https://8ksec.io/arm64-reversing-and-exploitation-part-7-bypassing-aslr-and-nx/?utm_source=rss&utm_medium=rss&utm_campaign=arm64-reversing-and-exploitation-part-7-bypassing-aslr-and-nx
π@malwr
https://8ksec.io/arm64-reversing-and-exploitation-part-7-bypassing-aslr-and-nx/?utm_source=rss&utm_medium=rss&utm_campaign=arm64-reversing-and-exploitation-part-7-bypassing-aslr-and-nx
π@malwr
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
ARM64 Reversing And Exploitation Part 7 β Bypassing ASLR and NX
Learn ARM64 Binary Exploitation and get around ASLR and NX constraints in our Part 7 of the ARM64 Reversing and Exploitation Series. Read more !
Mobile Malware Analysis Part 2 β MasterFred
https://8ksec.io/mobile-malware-analysis-part-2-masterfred/?utm_source=rss&utm_medium=rss&utm_campaign=mobile-malware-analysis-part-2-masterfred
π@malwr
https://8ksec.io/mobile-malware-analysis-part-2-masterfred/?utm_source=rss&utm_medium=rss&utm_campaign=mobile-malware-analysis-part-2-masterfred
π@malwr
Hidden crypto miner in pirated software makes cybercriminals rich at the expense of their victims
https://news.drweb.com/show/?i=14792&lng=en&c=5
π@malwr
https://news.drweb.com/show/?i=14792&lng=en&c=5
π@malwr
Dr.Web
Hidden crypto miner in pirated software makes cybercriminals rich at the expense of their victims
Doctor Web is reporting on an increase in cases of cryptocurrency-mining trojans being found hidden in pirated software that is available in Telegram and on some Internet sites.
GitLab warns zero-click vulnerability could lead to account takeovers
https://www.malwarebytes.com/blog/news/2024/01/gitlab-warns-zero-click-vulnerability-could-lead-to-account-takeovers
π@malwr
https://www.malwarebytes.com/blog/news/2024/01/gitlab-warns-zero-click-vulnerability-could-lead-to-account-takeovers
π@malwr
ThreatDown by Malwarebytes
GitLab warns zero-click vulnerability could lead to account takeovers
GitLab has warned about a critical vulnerability that allows an attacker to change passwords without user interaction.