Malware News
13K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Jenkins Args4j CVE-2024-23897: Files Exposed, Code at Risk

Jenkins, a popular open-source automation server, was discovered to be affected by a file read vulnerability, CVE-2024-23897.

https://www.trendmicro.com/en_us/research/24/c/cve-2024-23897.html


๐ŸŽ–@malwr
๐Ÿ‘1
LockBit Attempts to Stay Afloat With a New Version

This research is the result of our collaboration with the National Crime Agency in the United Kingdom, who took action against LockBit as part of Operation Cronos, an international effort resulting in the undermining of its operations.

https://www.trendmicro.com/en_us/research/24/b/lockbit-attempts-to-stay-afloat-with-a-new-version.html


๐ŸŽ–@malwr
Adversarial Intelligence: Red Teaming Malicious Use Cases for AI

Recorded Future tested four malicious use cases for artificial intelligence (AI) to illustrate โ€œthe art of the possibleโ€ for threat actor use.

https://www.recordedfuture.com/adversarial-intelligence-red-teaming-malicious-use-cases-ai


๐ŸŽ–@malwr
๐Ÿ”ฅ2
Analyzing AsyncRAT's Code Injection into aspnet_compiler.exe Across Multiple Incident Response Cases

This blog entry delves into MxDR's unraveling of the AsyncRAT infection chain across multiple cases, shedding light on the misuse of aspnet_compiler.exe, a legitimate Microsoft process originally designed for precompiling ASP.NET web applications.

https://www.trendmicro.com/en_us/research/23/l/analyzing-asyncrat-code-injection-into-aspnetcompiler-exe.html


๐ŸŽ–@malwr
๐Ÿ”ฅ1
TeamCity Vulnerability Exploits Lead to Jasmin Ransomware, Other Malware Types

CVE-2024-27198 and CVE-2024-27199 are vulnerabilities within the TeamCity On-Premises platform that can allow attackers to gain administrative control over affected systems.

https://www.trendmicro.com/en_us/research/24/c/teamcity-vulnerability-exploits-lead-to-jasmin-ransomware.html


๐ŸŽ–@malwr
๐Ÿ‘2
Dissecting a complex vulnerability and achieving arbitrary code execution in Ichitaro Word

Research conducted by Cisco Talos last year has uncovered multiple vulnerabilities that were rated as low-severity despite their ability to allow for full arbitrary code execution. This article examines the exploitation process step-by-step.

https://blog.talosintelligence.com/exploiting-low-severity-vulnerability-using-a-frame-pointer-overwrite/


๐ŸŽ–@malwr
Attributing I-SOON: Private Contractor Linked to Multiple Chinese State-sponsored Groups

Insikt Group uncovers ties between I-SOON and multiple Chinese state-sponsored cyber groups like RedAlpha and RedHotel.

https://www.recordedfuture.com/attributing-i-soon-private-contractor-linked-chinese-state-sponsored-groups


๐ŸŽ–@malwr
๐Ÿ”ฅ1
โค1
What is the primary purpose of Command and Control (C&C) servers in relation to malware?
Final Results
4%
To encrypt user data
2%
To block access to websites
4%
To increase internet speed
91%
To remotely control infected devices
New details on TinyTurlaโ€™s post-compromise activity reveal full kill chain

We now have new information on the entire kill chain this actor uses, including the tactics, techniques and procedures (TTPs) utilized to steal valuable information from their victims and propagate through their infected enterprises.

https://blog.talosintelligence.com/tinyturla-full-kill-chain/


๐ŸŽ–@malwr
Vulnerabilities in CDeX software

CERT Poland has received a report about three vulnerabilities (from CVE-2024-2463 to CVE-2024-2465) found in CDeX software.

https://cert.pl/en/posts/2024/03/CVE-2024-2463/


๐ŸŽ–@malwr
Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script

This blog entry discusses the Agenda ransomware group's use of its latest Rust variant to propagate to VMWare vCenter and ESXi servers.

https://www.trendmicro.com/en_us/research/24/c/agenda-ransomware-propagates-to-vcenters-and-esxi-via-custom-pow.html


๐ŸŽ–@malwr
๐Ÿ‘1
Borrower beware: Common loan scams and how to avoid them

Personal loan scams prey on your financial vulnerability and might even trap you in a vicious circle of debt. Hereโ€™s how to avoid being scammed when considering a loan.

https://www.welivesecurity.com/en/scams/borrower-beware-common-loan-scams/


๐ŸŽ–@malwr
Do you like to read security related tweets here? To read these tweets you should have twitter app.
Final Results
46%
I have twitter and I want to read these posts
54%
I don't have twitter and I can't read these posts
Violent Extremists Dox Executives, Enabling Physical Threats

Domestic violent extremists are increasingly doxing senior U.S. leaders โ€” publishing their personally identifiable information without their consent and with malicious intent.

https://www.recordedfuture.com/violent-extremists-dox-executives-enabling-physical-threats


๐ŸŽ–@malwr
๐Ÿ‘1