Malware News
13K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
.NET Malware 101: Analyzing the .NET Executable File Structure

Welcome to our deep dive into the world of .NET malware reverse engineering. As a security researcher or analyst, youโ€™re likely aware that the .NET framework, famed for its ability to enable rapid and robust application development, is a double-edged sword. The same features that make it attractive to legitimate developers also make it a...

https://intezer.com/blog/incident-response/intro-to-malware-net-executable-file/


๐ŸŽ–@malwr
โค1
CVE-2024-21412: DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign

In addition to our Water Hydra APT zero day analysis, the Zero Day Initiative (ZDI) observed a DarkGate campaign which we discovered in mid-January 2024 where DarkGate operators exploited CVE-2024-21412.

https://www.trendmicro.com/en_us/research/24/c/cve-2024-21412--darkgate-operators-exploit-microsoft-windows-sma.html


๐ŸŽ–@malwr
๐Ÿ‘1
Threat actors leverage document publishing sites for ongoing credential and session token theft

Talos IR has responded to several recent incidents in which threat actors used legitimate digital document publishing sites such as Publuu and Marq to host phishing documents as part of ongoing credential and session harvesting attacks.

https://blog.talosintelligence.com/threat-actors-leveraging-document-publishing-sites/


๐ŸŽ–@malwr
The Anatomy of an ALPHA SPIDER Ransomware Attack

ALPHA SPIDER is the adversary behind the development and operation of the Alphv ransomware as a service (RaaS). Over the last year, ALPHA SPIDER affiliates have been leveraging a variety of novel techniques as part of their ransomware operations. CrowdStrike Services has observed techniques such as the usage of NTFS Alternate Data Streams for hiding...

https://www.crowdstrike.com/blog/anatomy-of-alpha-spider-ransomware/


๐ŸŽ–@malwr
๐Ÿ‘2
2024-03-06: Pikabot infection leads to Meduza Stealer

https://www.malware-traffic-analysis.net/2024/03/06/index.html


๐ŸŽ–@malwr
2024-03-14: AsyncRAT and XWorm infection

https://www.malware-traffic-analysis.net/2024/03/14/index.html


๐ŸŽ–@malwr
The LockBit story: Why the ransomware affiliate model can turn takedowns into disruptions

Talos explores the recent law enforcement takedown of LockBit, a prolific ransomware group that claimed to resume their operations 7 days later.

https://blog.talosintelligence.com/ransomware-affiliate-model/


๐ŸŽ–@malwr
๐Ÿ‘1
Hello everybody. I'm sorry for inconvenience. To keep our channel up, I have to pay for server and services. For that, we need financial support. If channel members could kindly donate in BTC, I will not post any ads in the channel.

Sincerely,
@SirMalware


๐ŸŽ–@malwr
๐Ÿ‘7
Healthcare still a prime target for cybercrime gangs โ€“ Week in security with Tony Anscombe

Healthcare organizations remain firmly in attackers' crosshairs, representing 20 percent of all victims of ransomware attacks among critical infrastructure entities in the US in 2023

https://www.welivesecurity.com/en/videos/healthcare-target-cybercrime-week-security-tony-anscombe/


๐ŸŽ–@malwr
Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks

Since early 2022, we have been monitoring an APT campaign that targets several government entities worldwide, with a strong focus in Southeast Asia, but also seen targeting Europe, America, and Africa.

https://www.trendmicro.com/en_us/research/24/c/earth-krahang.html


๐ŸŽ–@malwr
Jenkins Args4j CVE-2024-23897: Files Exposed, Code at Risk

Jenkins, a popular open-source automation server, was discovered to be affected by a file read vulnerability, CVE-2024-23897.

https://www.trendmicro.com/en_us/research/24/c/cve-2024-23897.html


๐ŸŽ–@malwr
๐Ÿ‘1
LockBit Attempts to Stay Afloat With a New Version

This research is the result of our collaboration with the National Crime Agency in the United Kingdom, who took action against LockBit as part of Operation Cronos, an international effort resulting in the undermining of its operations.

https://www.trendmicro.com/en_us/research/24/b/lockbit-attempts-to-stay-afloat-with-a-new-version.html


๐ŸŽ–@malwr
Adversarial Intelligence: Red Teaming Malicious Use Cases for AI

Recorded Future tested four malicious use cases for artificial intelligence (AI) to illustrate โ€œthe art of the possibleโ€ for threat actor use.

https://www.recordedfuture.com/adversarial-intelligence-red-teaming-malicious-use-cases-ai


๐ŸŽ–@malwr
๐Ÿ”ฅ2
Analyzing AsyncRAT's Code Injection into aspnet_compiler.exe Across Multiple Incident Response Cases

This blog entry delves into MxDR's unraveling of the AsyncRAT infection chain across multiple cases, shedding light on the misuse of aspnet_compiler.exe, a legitimate Microsoft process originally designed for precompiling ASP.NET web applications.

https://www.trendmicro.com/en_us/research/23/l/analyzing-asyncrat-code-injection-into-aspnetcompiler-exe.html


๐ŸŽ–@malwr
๐Ÿ”ฅ1