Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 10 / 16
308 résultats taggé Malware  ✕
Atomic Stealer | Threat Actor Spawns Second Variant of macOS Malware Sold on Telegram https://www.sentinelone.com/blog/atomic-stealer-threat-actor-spawns-second-variant-of-macos-malware-sold-on-telegram/
04/05/2023 21:16:28
QRCode
archive.org
thumbnail

A macOS infostealer being sold on Telegram, Atomic Stealer has a second variant that appears primed to target users directly on YouTube.

sentinelone EN 2023 macos infostealer Telegram Atomic-Stealer Malware YouTube
'RustBucket' malware targets macOS https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/
21/04/2023 17:30:05
QRCode
archive.org
thumbnail

Learn how APT group, BlueNoroff, targets Apple with malware variant to compromise macOS devices.

jamf EN 2023 macOS BlueNoroff RustBucket malware analysis
Apple’s high security mode blocked NSO spyware, researchers say | TechCrunch https://techcrunch.com/2023/04/18/apple-lockdown-mode-iphone-nso-pegasus/
19/04/2023 08:42:58
QRCode
archive.org
thumbnail

Apple has fixed the three exploits used to deploy the Pegasus spyware, which did not require any interaction from the target.

techcrunch EN 2023 apple citizen-lab ios iphone malware nso nso-group spyware LockdownMode
QBot banker delivered through business correspondence https://securelist.com/qbot-banker-business-correspondence/109535/
17/04/2023 22:18:33
QRCode
archive.org
thumbnail

In early April, we detected a significant increase in attacks that use banking Trojans of the QBot family. The malware would be delivered through e-mails that were based on real business letters the attackers had gotten access to.

securelist EN 2023 Malware QakBot Thematic-phishing Trojan-Banker analysis
The (Not so) Secret War on Discord https://www.cyberark.com/resources/threat-research-blog/the-not-so-secret-war-on-discord
16/04/2023 11:44:17
QRCode
archive.org
thumbnail

CyberArk Labs discovered a new malware called Vare that is distributed over the popular chatting service, Discord. Vare has been used to target new malware operators by using social engineering tactics on them. Additionally, we have found that Vare uses Discord’s infrastructure as a backbone for its operations. This malware is linked to a new group called “Kurdistan 4455” based out of southern Turkey and is still early in its forming stage.

cyberark EN 2023 Discord Vare malware Kurdistan4455 Turkey
Mac Malware MacStealer Spreads as Fake P2E Apps https://www.trendmicro.com/en_us/research/23/c/mac-malware-macstealer-spreads-as-fake-p2-e-apps.html
05/04/2023 21:03:16
QRCode
archive.org
thumbnail

We detected Mac malware MacStealer spreading via websites, social media, and messaging platforms Twitter, Discord, and Telegram. Cybercriminals lure victims to download it by plagiarizing legitimate play-to-earn (P2E) apps’ images and offering jobs as beta testers.

trendmicro EN 2023 MacStealer malware macos report Telegram Twitter P2E Mac
New OpcJacker Malware Distributed via Fake VPN Malvertising https://www.trendmicro.com/en_us/research/23/c/new-opcjacker-malware-distributed-via-fake-vpn-malvertising.html
29/03/2023 21:26:28
QRCode
archive.org
thumbnail

We discovered a new malware, which we named “OpcJacker” (due to its opcode configuration design and its cryptocurrency hijacking ability), that has been distributed in the wild since the second half of 2022.

trendmicro EN 2023 malware endpoints research articles news reports OpcJacker VPN Malvertising
BlackMamba ChatGPT Polymorphic Malware | A Case of Scareware or a Wake-up Call for Cyber Security? https://www.sentinelone.com/blog/blackmamba-chatgpt-polymorphic-malware-a-case-of-scareware-or-a-wake-up-call-for-cyber-security/
20/03/2023 20:54:34
QRCode
archive.org
thumbnail

The rise of publicly-accessible Al models like ChatGPT has produced some interesting attempts to create malware. How seriously should defenders take them?

sentinelone EN 2023 ChatGPT BlackMamba Malware Polymorphic
Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem
17/03/2023 21:06:14
QRCode
archive.org
thumbnail

A suspected Chinese actor used a zero-day vulnerability in FortiOS and custom malware for espionage.

mandiant EN 2023 zero-day FortiOS China malware Suspected
Ransomware Attacks Have Entered a ‘Heinous’ New Phase https://www.wired.com/story/ransomware-tactics-cancer-photos-student-records/
14/03/2023 22:58:12
QRCode
archive.org
thumbnail

With victims refusing to pay, cybercriminal gangs are now releasing stolen photos of cancer patients and sensitive student records.

wired EN 2023 ransomware security crime malware Heinous
Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting https://www.trendmicro.com/en_us/research/23/c/iron-tiger-sysupdate-adds-linux-targeting.html
01/03/2023 21:10:36
QRCode
archive.org
thumbnail

We detail the update that advanced persistent threat (APT) group Iron Tiger made on the custom malware family SysUpdate. In this version, we also found components that enable the malware to compromise Linux systems.

trendmicro malware cyber-crime apt IronTiger SysUpdate analysis
Hard-to-spot Mac crypto-mining threat, XMRig, hits Pirate Bay https://www.computerworld.com/article/3689149/hard-to-spot-mac-crypto-mining-threat-xmrig-hits-pirate-bay.html
27/02/2023 21:14:56
QRCode
archive.org
thumbnail

Jamf Threat Labs has spotted a family of Mac malware, XMRig, that spreads through pirated versions of Final Cut Pro, Photoshop and Logic Pro X.

computerworld EN 2023 apple macos jamf XMRig malware pirated FinalCutPro
When Low-Tech Hacks Cause High-Impact Breaches https://krebsonsecurity.com/2023/02/when-low-tech-hacks-cause-high-impact-breaches/
27/02/2023 11:52:55
QRCode
archive.org

Web hosting giant GoDaddy made headlines this month when it disclosed that a multi-year breach allowed intruders to steal company source code, siphon customer and employee login credentials, and foist malware on customer websites. Media coverage understandably focused on GoDaddy's…

krebsonsecurity EN 2023 GoDaddy Hacks intruders employee malware
Beware of macOS cryptojacking malware. https://www.jamf.com/blog/cryptojacking-macos-malware-discovered-by-jamf-threat-labs/
24/02/2023 23:10:33
QRCode
archive.org
thumbnail

You may have heard about the cryptojacking malware on macOS. Read about a new one spotted by Jamf Threat Labs.

jamf EN 2023 macOS cryptojacking malware
New MortalKombat ransomware and Laplas Clipper malware threats deployed in financially motivated campaign https://blog.talosintelligence.com/new-mortalkombat-ransomware-and-laplas-clipper-malware-threats/
14/02/2023 21:38:22
QRCode
archive.org
thumbnail

Since December 2022, Cisco Talos has been observing an unidentified actor deploying two relatively new threats, the recently discovered MortalKombat ransomware and a GO variant of the Laplas Clipper malware, to steal cryptocurrency from victims.

talosintelligence EN 2023 MortalKombat ransomware Laplas Clipper malware threats
HTML Smuggling: The Hidden Threat in Your Inbox https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/html-smuggling-the-hidden-threat-in-your-inbox/
09/02/2023 18:21:15
QRCode
archive.org
thumbnail

Last October, Trustwave SpiderLabs blogged about the use and prevalence of HTML email attachments to deliver malware and phishing for credentials.

trustwave EN 2023 HTML Threat SpiderLabs email phishing malware
Enigma Stealer Targets Cryptocurrency Industry with Fake Jobs https://www.trendmicro.com/en_us/research/23/b/enigma-stealer-targets-cryptocurrency-industry-with-fake-jobs.html
09/02/2023 18:11:58
QRCode
archive.org
thumbnail

We discovered an active campaign targeting Eastern Europeans in the cryptocurrency industry using fake job lures.

trendmicro EN 2023 malware endpoints research Cryptocurrency campaign Fake Jobs
Onenote Malware: Classification and Personal Notes https://marcoramilli.com/2023/02/04/onenote-malware-classification-and-personal-notes/
06/02/2023 18:59:12
QRCode
archive.org
thumbnail

During the past 4 months Microsoft Onenote file format has been (ab)used as Malware carrier by different criminal groups. While the main infection vector is still on eMail side - so nothing really relevant to write on - the used techniques, the templates and the implemented code to inoculate Malware changed a lot. So it…

marcoramilli EN 2023 OneNote abused technical Malware
OneNote Documents Increasingly Used to Deliver Malware https://www.proofpoint.com/us/blog/threat-insight/onenote-documents-increasingly-used-to-deliver-malware
01/02/2023 22:06:17
QRCode
archive.org
thumbnail

Key Findings:

  • The use of Microsoft OneNote documents to deliver malware via email is increasing.
  • Multiple cybercriminal threat actors are using OneNote documents to deliver malware.
  • While some campaigns are targeted at specific industries, most are broadly targeted and include thousands of messages.
  • In order to detonate the payload, an end-user must interact with the OneNote document.
  • Campaigns have impacted organizations globally, including North America and Europe.
  • TA577 returned from a month-long hiatus in activity and began using OneNote to deliver Qbot at the end of January 2023.
proofpoint EN 2023 OneNote Documents Malware AsyncRAT IoCs Redline AgentTesla DOUBLEBACK
HeadCrab: A Novel State-of-the-Art Redis Malware in a Global Campaign https://blog.aquasec.com/headcrab-attacks-servers-worldwide-with-novel-state-of-art-redis-malware
01/02/2023 21:42:57
QRCode
archive.org
thumbnail

HeadCrab: A Novel State-of-the-Art Redis Malware in a Global Campaign
Aqua Nautilus researchers discovered a new elusive and severe threat that has been infiltrating and residing on servers worldwide since early September 2021. Known as HeadCrab, this advanced threat actor utilizes a state-of-the-art, custom-made malware that is undetectable by agentless and traditional anti-virus solutions to compromise a large number of Redis servers. The HeadCrab botnet has taken control of at least 1,200 servers.

This blog will delve into the details of the HeadCrab attack, examining its methods of operation, techniques used to evade detection, and steps organizations can take to safeguard their systems.

aquasec EN 2023 State-of-the-Art Redis Malware HeadCrab
page 10 / 16
4956 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn