Malware News
13K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
Quick Forensics Analysis of Apache logs - SANS Internet Storm Center
Quick Forensics Analysis of Apache logs, Author: Xavier Mertens

https://isc.sans.edu/diary/30792


๐ŸŽ–@malwr
๐Ÿ‘1
In-the-Wild Windows LPE 0-days: Insights & Detection Strategies โ€” Elastic Security Labs
This article will evaluate detection methods for Windows local privilege escalation techniques based on dynamic behaviors analysis using Elastic Defend features.

https://www.elastic.co/security-labs/itw-windows-lpe-0days-insights-and-detection-strategies


๐ŸŽ–@malwr
Advanced CyberChef Techniques for Configuration Extraction - Detailed Walkthrough and Examples
Advanced CyberChef techniques using Registers, Regex and Flow Control

https://embee-research.ghost.io/advanced-cyberchef-operations-netsupport/


๐ŸŽ–@malwr
Android Malware Vultur Expands Its Wingspan โ€“ Fox-IT International blog
Authored by Joshua Kamp Executive summary The authors behind Android banking malware Vultur have been spotted adding new technical features, which allow the malware operator to further remotely interact with the victim's mobile device. Vultur has also started masquerading more of its malicious activity by encrypting its C2 communication, using multiple encrypted payloads that areโ€ฆ

https://blog.fox-it.com/2024/03/28/android-malware-vultur-expands-its-wingspan/


๐ŸŽ–@malwr
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ‘3
[Nullcon Berlin 2024] The complexity of reversing Flutter applications

Flutter is a cross-platform application development platform. With the same codebase, developers write and compile native applications for Android,...

https://filestore.fortinet.com/fortiguard/research/nullcon.pdf

๐ŸŽ–@malwr
Keylogging in the Windows kernel with undocumented data structures // eversinc33


https://eversinc33.com/posts/kernel-mode-keylogging/


๐ŸŽ–@malwr
โค1
Forwarded from CVE Notify
๐Ÿšจ CVE-2024-3094
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0.
Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

๐ŸŽ–@cveNotify
๐Ÿ˜ฑ2๐Ÿ‘1

Debugging Stop 0xCE โ€“ DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS | Machines Can Think

DRIVER_UNLOADED_WITHOUT_CANCELLING_PENDING_OPERATIONS (ce)A driver unloaded without cancelling timers, DPCs, worker threads, etc.The broken driver's name is displayed on the screen and saved inKiBugCheckDriver.Arguments:Arg1: fffff805c5bc8597, memory referencedArg2: 0000000000000010, value 0 = read operation, 1 = write operationArg3: fffff805c5bc8597, If non-zero, the instruction address which referenced the bad memory address.Arg4: 0000000000000000, Mm internal code. The bugcheck parameters areโ€ฆ

https://bsodtutorials.wordpress.com/2024/03/26/debugging-stop-0xce-driver_unloaded_without_cancelling_pending_operations/


๐ŸŽ–@malwr
From OneNote to RansomNote: An Ice Cold Intrusion

Key Takeaways We provide a range of services, one of which is our Threat Feed, specializing in monitoring Command and Control frameworks like Cobalt Strike, Metasploit, Sliver, Viper, Mythic, Havoc, โ€ฆ

https://thedfirreport.com/2024/04/01/from-onenote-to-ransomnote-an-ice-cold-intrusion/


๐ŸŽ–@malwr
๐Ÿ˜1
Return Oriented Programming โ€“ ret2win โ€“ ROP Emporium โ€“ RingBuffer's Blog
A detail guide on how to capture the flag using return oriented programming buffer overflow challenge on ROP Emporium.

https://vandanpathak.com/kernels-and-buffers/return-oriented-programming-ret2win-rop-emporium/


๐ŸŽ–@malwr