Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 12 / 20
382 résultats taggé Analysis  ✕
CVE-2023-36844 And Friends: RCE In Juniper Devices https://labs.watchtowr.com/cve-2023-36844-and-friends-rce-in-juniper-firewalls/
26/08/2023 12:55:18
QRCode
archive.org
thumbnail

As part of our Continuous Automated Red Teaming and Attack Surface Management technology - the watchTowr Platform - we're incredibly proud of our ability to discover nested, exploitable vulnerabilities across huge attack surfaces.

Through our rapid PoC process, we enable our clients to understand if they are vulnerable to emerging

labs.watchtowr EN 2023 CVE-2023-36844 Juniper RCE analysis
Lazarus Group exploits ManageEngine vulnerability to deploy QuiteRAT https://blog.talosintelligence.com/lazarus-quiterat/
25/08/2023 08:39:04
QRCode
archive.org
thumbnail

This is the third documented campaign attributed to this actor in less than a year, with the actor reusing the same infrastructure throughout these operations.

talosintelligence EN 2023 analysis ManageEngine CVE-2022-47966
Unpacking the Threats Within: The Hidden Dangers of .zip Domains https://decoded.avast.io/matejkrcma/unpacking-the-threats-within-the-hidden-dangers-of-zip-domains/
01/08/2023 10:38:08
QRCode
archive.org
thumbnail

Let's have a look at the threats brought by introduction of .zip TLD

avast EN 2023 TLD analysis
Into the tank with Nitrogen https://news.sophos.com/en-us/2023/07/26/into-the-tank-with-nitrogen/
31/07/2023 15:09:05
QRCode
archive.org
thumbnail

The element originally known as “foul air” stinks up computers as a new initial-access campaign exhibiting some uncommon techniques

sophos analysis EN 2023 Nitrogen Malvertising initial-access
Malicious Batch File (*.bat) Disguised as a Document Viewer Being Distributed (Kimsuky) https://asec.ahnlab.com/en/55219/
31/07/2023 15:00:48
QRCode
archive.org
thumbnail

AhnLab Security Emergency response Center (ASEC) has confirmed the distribution of malware in the form of a batch file (*.bat). This malware is designed to download various scripts based on the anti-malware process, including AhnLab products, installed in the user’s environment. Based on the function names used by the malware and the downloaded URL parameters, it is suspected to have been distributed by the Kimsuky group.

asec.ahnlab malware analysis batch file Kimsuky Document Viewer
Unmasking the Meduza Stealer: Comprehensive Analysis & Countermeasures https://www.uptycs.com/blog/what-is-meduza-stealer-and-how-does-it-work
07/07/2023 13:55:01
QRCode
archive.org
thumbnail

Read Uptycs' analysis of the newly discovered Meduza Stealer malware targeting Windows users, revealing capabilities, potential impact & mitigation steps.

Uptycs EN 2023 meduza Stealer Windows analysis
BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection - https://www.sentinelone.com/blog/bluenoroff-how-dprks-macos-rustbucket-seeks-to-evade-analysis-and-detection/
05/07/2023 21:58:26
QRCode
archive.org
thumbnail

Threat actors are using increasingly sophisticated forms of evasion and anti-analysis as they respond to increased attention to macOS security in the enterprise.

sentinelone EN 2023 BlueNoroff DPRK macOS RustBucket Evade analysis
Clop Ransomware: History, Timeline, And Adversary Simulation https://fourcore.io/blogs/clop-ransomware-history-adversary-simulation
05/07/2023 10:30:44
QRCode
archive.org
thumbnail

The infamous Clop ransomware, mainly known as Cl0p, targets various industries and organizations, extorting data for a huge amount of ransom. It advances actively with new emerging campaigns. This blog walks through the Clop timeline, Mitre TTPs and their emulation.

fourcore EN 2023 Cl0p History Timeline TTP ransomware analysis
Malware Execution Method Using DNS TXT Record https://asec.ahnlab.com/en/54916/
30/06/2023 09:08:33
QRCode
archive.org
thumbnail

AhnLab Security Emergency response Center (ASEC) has confirmed instances where DNS TXT records were being utilized during the execution process of malware.

This is considered meaningful from various perspectives, including analysis and detection as this method has not been widely utilized as a means of executing malware.

ASEC EN 2023 DNS TXT malware analysis
Meduza Stealer or The Return of The Infamous Aurora Stealer https://russianpanda.com/2023/06/28/Meduza-Stealer-or-The-Return-of-The-Infamous-Aurora-Stealer/
29/06/2023 15:15:53
QRCode
archive.org

Meduza Stealer malware analysis

russianpanda EN 2023 analysis meduza Aurora Stealer malware
Tracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examination https://medium.com/@callyso0414/tracing-ransomware-threat-actors-through-stylometric-analysis-and-chat-log-examination-23f0f84abba8
28/06/2023 21:24:41
QRCode
archive.org
thumbnail

I stumbled upon an intriguing concept presented by Will Thomas (BushidoToken) in his blog post titled “Unmasking Ransomware Using Stylometric Analysis: Shadow, 8BASE, Rancoz.” This concept revolves around utilizing stylometry to identify potential modifications in new ransomware variants based on existing popular strains. If you’re interested, you can read the blog post here. (Notably, Will Thomas also appeared on Dark Net Diaries, discussing his tracking of the Revil ransomware.)

callyso0414 YUCA medium EN 2023 ransomware logs log chats Stylometric Analysis
PindOS: New JavaScript Dropper Delivering Bumblebee and IcedID https://www.deepinstinct.com/blog/pindos-new-javascript-dropper-delivering-bumblebee-and-icedid
26/06/2023 18:59:02
QRCode
archive.org
thumbnail

Deep Instinct’s Threat Research Lab recently noticed a new strain of a JavaScript-based dropper that is delivering Bumblebee and IcedID. The dropper contains comments in Russian and employs the unique user-agent string “PindOS”, which may be a reference to current (and past) anti-American sentiment in Russia.

Bumblebee is a malware loader first discovered in March 2022. It was associated with Conti group and was being used as a replacement for BazarLoader. It acts as a primary vector for multiple types of other malware, including ransomware.

IcedID is a modular banking malware designed to steal financial information. It has been seen in the wild since at least 2017 and has recently been observed shifting some of its focus to malware delivery.

deepinstinct EN 2023 JavaScript Dropper PindOS Bumblebee analysis
IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits https://unit42.paloaltonetworks.com/mirai-variant-targets-iot-exploits/
22/06/2023 20:12:15
QRCode
archive.org
thumbnail

Since March 2023, Unit 42 researchers have observed threat actors leveraging several IoT vulnerabilities to spread a variant of the Mirai botnet.

unit42 EN 2023 Mirai analysis IoT
Cadet Blizzard emerges as a novel and distinct Russian threat actor | Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2023/06/14/cadet-blizzard-emerges-as-a-novel-and-distinct-russian-threat-actor/
14/06/2023 22:05:17
QRCode
archive.org
thumbnail

Microsoft attributes several campaigns to a distinct Russian state-sponsored threat actor tracked as Cadet Blizzard (DEV-0586), including the WhisperGate destructive attack, Ukrainian website defacements, and the hack-and-leak front “Free Civilian”.

microsoft EN 2023 CadetBlizzard DEV-0586 Russia analysis
The Phantom Menace: Brute Ratel remains rare and targeted https://news.sophos.com/en-us/2023/05/18/the-phantom-menace-brute-ratel-remains-rare-and-targeted/
14/06/2023 21:42:55
QRCode
archive.org
thumbnail

The commercial attack tool’s use by bad actors has faded after an initial flurry, while Cobalt Strike remains the go-to post-exploitation tool for many.

sophos EN 2023 BruteRatel faded analysis
Analysis of CVE-2023-27997 and Clarifications on Volt Typhoon Campaign https://www.fortinet.com/blog/psirt-blogs/analysis-of-cve-2023-27997-and-clarifications-on-volt-typhoon-campaign
13/06/2023 07:31:34
QRCode
archive.org
thumbnail

Affected Platforms: FortiOS
Impacted Users: Targeted at government, manufacturing, and critical infrastructure
Impact: Data loss and OS and file corruption
Severity Level: Critical

Today, Fortinet published a CVSS Critical PSIRT Advisory (FG-IR-23-097 / CVE-2023-27997) along with several other SSL-VPN related fixes. This blog adds context to that advisory, providing our customers with additional details to help them make informed, risk-based decisions, and provides our perspective relative to recent events involving malicious actor activity.

fortinet EN 2023 patch CVE-2023-27997 analysis VoltTyphoon Clarifications
Xortigate, or CVE-2023-27997 - The Rumoured RCE That Was https://labs.watchtowr.com/xortigate-or-cve-2023-27997/
13/06/2023 07:21:59
QRCode
archive.org
thumbnail

When Lexfo Security teased a critical pre-authentication RCE bug in FortiGate devices on Saturday 10th, many people speculated on the practical impact of the bug. Would this be a true, sky-is-falling level vulnerability like the recent CVE-2022-42475? Or was it some edge-case hole, requiring some unusual and exotic requisite before any exposure? Others even went further, questioning the legitimacy of the bug itself. Details were scarce and guesswork was rife.

labs.watchtowr EN 2023 Xortigate XOR RCE CVE-2023-27997 FortiGate analysis
Analysis of CVE-2023-29336 Win32k Privilege Escalation https://www.numencyber.com/cve-2023-29336-win32k-analysis/
08/06/2023 22:55:34
QRCode
archive.org
thumbnail

Analyzing CVE-2023-29336 Win32k vulnerability, its exploitation, and mitigation measures in the context of evolving security practices.

numencyber EN 2023 Analysis CVE-2023-29336 Win32k Privilege Escalation
Trustwave Action Response: Zero Day Exploitation of MOVEit (CVE-2023-34362) https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/trustwave-action-response-zero-day-exploitation-of-moveit-cve-2023-34362/
06/06/2023 19:42:58
QRCode
archive.org
thumbnail

On May 31, threat actors were discovered targeting a critical zero day in MOVEit Transfer software resulting in escalated privileges and unauthorized data access. The vulnerability being exploited is an SQL injection and has since been patched. Resources links, including one for the patch, are at the bottom of this post.

trustwave EN 2023 0-day MOVEit CVE-2023-34362 analysis
GobRAT malware written in Go language targeting Linux routers https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
05/06/2023 21:54:15
QRCode
archive.org
thumbnail

JPCERT/CC has confirmed attacks that infected routers in Japan with malware around February 2023. This blog article explains the details of the attack confirmed by JPCERT/CC and GobRAT malware, which was used in the attack. ### Attack flow up to...

jpcert EN 20233 GobRAT malware analysis Linux routers Go
page 12 / 20
4746 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio