Malware News
14.1K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
A CI/CD artifact repository shows a build job that fetched a third-party dependency from an attacker-controlled location. You need to determine scope and impact. Which immediate steps yield both containment and forensic value?
Final Results
86%
Revoke credentials, snapshot logs and artifacts, preserve the environment varriables for analysis.
0%
Delete the repo and inform developers to re-push.
11%
Change all developer SSH keys.
3%
Reconfigure the runner to use a different VM image.
❀1
Open source SOC2 compliance scanner - Alternative to $20k/year tools


https://github.com/guardian-nexus/auditkit


πŸŽ–@malwr
πŸ‘3
πŸ‘5
During analysis of an Android banking trojan, you notice it requests the Accessibility Service. What is the most likely purpose?
Final Results
80%
To capture screen taps and keystrokes
8%
To disable Play Store protections
7%
To bypass network encryption
5%
To spoof device geolocation
πŸ‘4πŸ‘Œ1
While analyzing a malicious MSI installer, you see custom actions triggered during installation. What should you examine first?
Final Results
68%
Embedded scripts in the MSI tables
4%
MSI icon resources
12%
Installer digital signature
17%
Default installation path
❀1
πŸ‘6
A phishing attachment executes an HTA script that loads PowerShell via COM. How do you capture the executed commands?
Final Results
11%
Only capture network traffic
21%
Disassemble the HTA file statically
8%
Search browser history for executed URLs
61%
Enable PowerShell script block logging before executing the sample
❀2
Forwarded from CVE Notify
🚨 CVE-2025-55182
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

πŸŽ–@cveNotify
❀6πŸ‘1
Please open Telegram to view this post
VIEW IN TELEGRAM