Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 10 / 19
377 résultats taggé analysis  ✕
Objective-See's Blog https://objective-see.org/blog/blog_0x77.html
02/01/2024 15:28:28
QRCode
archive.org
thumbnail

A comprehensive analysis of the year's new malware

objective-see EN 2024 retrospective macos malware year analysis
The ticking time bomb of Microsoft Exchange Server 2013 https://medium.com/doublepulsar/the-ticking-time-bomb-of-microsoft-exchange-server-2013-d0850b80465b
23/12/2023 12:36:11
QRCode
archive.org

I monitor (in an amateur, clueless way) ransomware groups in my spare time, to see what intelligence can be gained from looking at victim orgs and what went wrong.

Basically, I’m a giant big dork with too much free time.

I’ve discovered two organisations with ransomware incidents, where the entry point appears to have been Exchange Server 2013 with Outlook Web Access enabled, where all available security updates were applied.

doublepulsar EN 2023 analysis ransomware Microsoft-Exchange Exchange-Server2013 risk
Android Banking Trojan Chameleon can now bypass any Biometric Authentication https://www.threatfabric.com/blogs/android-banking-trojan-chameleon-is-back-in-action
22/12/2023 19:17:05
QRCode
archive.org
thumbnail

ThreatFabric discovers a new variant of the Chameleon banking trojan distributed via Zombinder with features to bypass any biometric authentication.

threatfabric EN 2023 Android Banking Trojan Chameleon analysis
The Curious Case of Predatory Sparrow https://sites.google.com/darkcell.se/www/sparrows
19/12/2023 14:39:10
QRCode
archive.org
thumbnail

Reconstructing the Attack from a 4th party collector’s point of view
Hamid Kashfi

[Update: December 18th, 2023]: On 18th December, Predator Sparrows launched a second
attack against the fuel distribution system in Iran, similar to their previous operation in 2021.
Since 2021, Iranian officials or third-party security vendors have not published any analysis or
technical details about the original attack, which is not unusual. Their screenshots from the
latest attacks provide some clues that only confirm our previous work, indicating connections to
the “Yaas Arghavani” company, a VSAT and POS service provider for the fuel distribution
system. The following is an old draft from December 2021, which I wrote for peer eyes rather
than public view. The original draft focused on the first attack against the fuel distribution
system. Still, some remarks remain valid and relevant to the recent attack on 18 Dec 2023, as
little has changed regarding how the system works. The same infrastructure, same suppliers,
and same 3rd party vendors, so we are likely just talking about a different attack vector and
entry point from the previous case. I will probably draft a new note about the recent attack from
scratch soon and when more details are gathered rather than updating the old speculative work.

darkcell.se EN 2023 Predatory-Sparrow Attack Iran Yaas-Arghavani analysis distribution system
Rhadamanthys v0.5.0 - a deep dive into the stealer’s components https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/
18/12/2023 11:04:16
QRCode
archive.org
thumbnail
  • The Rhadamanthys stealer is a multi-layer malware, sold on the black market, and frequently updated. Recently the author released a new major version, 0.5.0.
  • In the new version, the malware expands its stealing capabilities and also introduces some general-purpose spying functions.
  • A new plugin system makes the malware expandable for specific distributor needs.
  • The custom executable formats, used for modules, are unchanged since our last publication (XS1 and XS2 formats are still in distribution).
  • Check Point Research (CPR) provides a comprehensive review of the agent modules, presenting their capabilities and implementation, with a focus on how the stealer components are loaded and how they work.
checkpoint EN 2023 Rhadamanthys stealer malware analysis
CVE-2023-50164 https://attackerkb.com/topics/pe3CCtOE81/cve-2023-50164/rapid7-analysis
15/12/2023 21:27:06
QRCode
archive.org
thumbnail

Apache Struts is a popular Java web application framework. On December 7, 2023 Apache published an advisory for CVE-2023-50164, a Struts parameter pollution vu…

attackerkb EN 2023 CVE-2023-50164 Apache Struts CVE-2023-50164 analysis
Scanning Danger: Unmasking the Threats of Quishing https://www.trellix.com/about/newsroom/stories/research/scanning-danger-unmasking-the-threats-of-quishing/
08/12/2023 14:18:12
QRCode
archive.org
thumbnail

In this blog, we explore the modus operandi of threat actors utilizing QR code attacks, by examining recent and widespread quishing campaigns detected by Trellix.

trellix EN 2023 Quishing QRCode QR analysis attacks
Star Blizzard increases sophistication and evasion in ongoing attacks https://www.microsoft.com/en-us/security/blog/2023/12/07/star-blizzard-increases-sophistication-and-evasion-in-ongoing-attacks/
08/12/2023 09:48:24
QRCode
archive.org
thumbnail

Microsoft Threat Intelligence continues to track and disrupt malicious activity attributed to a Russian state-sponsored actor we track as Star Blizzard, who has improved their detection evasion capabilities since 2022 while remaining focused on email credential theft against targets.

microsoft EN 2023 Threat Intelligence Star-Blizzard attacks analysis
What it means — CitrixBleed ransomware group woes grow as over 60 credit unions, hospitals, financial services and more breached in US. | by Kevin Beaumont | Dec, 2023 | DoublePulsar https://doublepulsar.com/what-it-means-citrixbleed-ransom-group-woes-grow-as-over-60-credit-unions-hospitals-47766a091d4f
04/12/2023 20:05:44
QRCode
archive.org

Credit union technology firm Trellance own Ongoing Operations LLC, and provide a platform called Fedcomp — used by double digit number of other credit unions across the United States. This Fedcomp…

doublepulsar EN 2023 CitrixBleed analysis
Cyber Threats affecting "International Geneva" https://geneva.cyberpeace.ngo/
01/12/2023 11:38:04
QRCode
archive.org
thumbnail

In the heart of International Geneva, a diverse ecosystem thrives, housing 38 international organizations (IOs), 432 non-governmental organizations (NGOs), and several hundred associations active at an international level, all united by a shared mission: to make the world a place of peace and justice. NGOs are the unsung heroes, addressing armed conflicts, natural disasters, and humanitarian crises, championing human rights, and advancing the Sustainable Development Goals (SDGs). Like many other organizations, NGOs heavily rely on technology, which is critical for projecting their activities globally in real time. Yet, in today’s digital landscape, this reality brings its own set of challenges.

cyberpeace EN CH 2023 Geneva threats analysis NGOs organizations Switzerland
Into the Trash: Analyzing LitterDrifter https://research.checkpoint.com/2023/malware-spotlight-into-the-trash-analyzing-litterdrifter/
27/11/2023 10:33:16
QRCode
archive.org
thumbnail

Gamaredon, also known as Primitive Bear, ACTINIUM, and Shuckworm, is a unique player in the Russian espionage ecosystem that targets a wide variety of almost exclusively Ukrainian entities. While researchers often struggle to uncover evidence of Russian espionage activities, Gamaredon is notably conspicuous. The group behind it conducts large-scale campaigns while still primarily focusing on regional targets. The Security Service of Ukraine (SSU) identified the Gamaredon personnel as Russian Federal Security Service (FSB) officers.

checkpoint 2023 EN LitterDrifter Ukraine analysis
Understanding the Phobos affiliate structure and activity https://blog.talosintelligence.com/understanding-the-phobos-affiliate-structure/
22/11/2023 09:28:09
QRCode
archive.org
thumbnail

Cisco Talos identified the most prolific Phobos variants, TTPs and affiliate structure, based on their activity and analysis of over 1,000 samples from VirusTotal dating back to 2019. We assess with moderate confidence Eking, Eight, Elbie, Devos and Faust are the most common variants

talosintelligence EN 2023 analysis phobos ransomware
ClearFake Malware Analysis | malware-analysis https://rmceoin.github.io/malware-analysis/clearfake/
22/11/2023 09:16:28
QRCode
archive.org

There are several malicious fake updates campaigns being run across thousands of compromised websites. Here I will walk through one with a pattern that doesn’t match with others I’ve been tracking. This campaign appears to have started around July 19th, 2023. Based on a search on PublicWWW of the injection base64 there are at least 434 infected sites.

I’m calling this one ClearFake until I see a previously used name for it. The name is a reference to the majority of the Javascript being used without obfuscation. I say majority because base64 is used three times. That’s it. All the variable names are in the clear, no obfuscation on them.

One noticeable difference from SocGholish is that there appears to be no tracking of visits by IP or cookies. As an analyst you can you go back to the compromised site over and over coming from the same IP and not clearing your browser cache. This also means the site owner is more likely to see the infection as well.

rmceoin EN 2023 fake updates campaigns browsers ClearFake analysis
MAR-10478915-1.v1 Citrix Bleed https://www.cisa.gov/news-events/analysis-reports/ar23-325a
21/11/2023 20:32:29
QRCode
archive.org

This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.

This document is marked TLP:CLEAR--Recipients may share this information without restriction. Sources may use TLP:CLEAR when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be shared without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.cisa.gov/tlp.

cisa EN 2023 CitrixBleed analysis IoCs
Redline Dropped Through MSIX Package https://isc.sans.edu/diary/Redline+Dropped+Through+MSIX+Package/30404/?is=e4f6b16c6de31130985364bb824bcb39ef6b2c4e902e4e553f0ec11bdbefc118
17/11/2023 08:39:15
QRCode
archive.org

Redline Dropped Through MSIX Package, Author&colon

isc.sans.edu SANS 2023 EN Redline MSIX Package analysis
C3RB3R Ransomware | Ongoing Exploitation of CVE-2023-22518 Targets Unpatched Confluence Servers  - SentinelOne https://www.sentinelone.com/blog/c3rb3r-ransomware-ongoing-exploitation-of-cve-2023-22518-targets-unpatched-confluence-servers/
14/11/2023 23:00:48
QRCode
archive.org
thumbnail

Learn how threat actors are exploiting Confluence CVE-2023-22518 to deploy Cerber ransomware on Linux and Windows hosts.

sentinelone EN 2023 analysis CVE-2023-22518 Cerber Confluence
Nothing new, still broken, insecure by default since then: Python's e-mail libraries and certificate verification https://www.pentagrid.ch/en/blog/python-mail-libraries-certificate-verification/
14/11/2023 11:15:01
QRCode
archive.org
thumbnail

Python’s e-mail libraries smtplib, imaplib, and poplib do not verify server certificates unless a proper SSL context is passed to the API. This leads to security problems.

pentagrid EN Python e-mail libraries smtplib imaplib poplib SSL insecure analysis
Jamf Threat Labs Discovers Malware from BlueNoroff https://www.jamf.com/blog/bluenoroff-strikes-again-with-new-macos-malware/
07/11/2023 18:49:27
QRCode
archive.org
thumbnail

Newly discovered later-stage malware from BlueNoroff APT group targets macOS with characteristics similar to their RustBucket campaign.

jamf EN 2023 Malware macOS BlueNoroff RustBucket analysis
Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion-encryption-and-destruction/
02/11/2023 11:23:35
QRCode
archive.org
thumbnail

Microsoft has been tracking activity related to the financially motivated threat actor Octo Tempest, whose evolving campaigns represent a growing concern for many organizations across multiple industries.

microsoft EN 2023 analysis OctoTempest campaigns tactics
CVE-2023-46604 https://attackerkb.com/topics/IHsgZDE3tS/cve-2023-46604/rapid7-analysis
01/11/2023 18:53:18
QRCode
archive.org
thumbnail

Apache ActiveMQ is a message broker service, designed to act as a communication bridge between disparate services. Developed in Java, it can broker multiple pr…

attackerkb EN 2023 analysis CVE-2023-46604 Apache ActiveMQ
page 10 / 19
4482 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio