Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 13 / 20
382 résultats taggé Analysis  ✕
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft
03/06/2023 18:10:00
QRCode
archive.org
thumbnail

Analysis of a zero-day vulnerability in MOVEit Transfer, and containment and hardening guidance.

mandiant EN 2023 0-day MOVEit Transfer Vulnerability analysis
Zero Day Initiative — CVE-2023-24941: Microsoft Network File System Remote Code Execution https://www.zerodayinitiative.com/blog/2023/5/31/cve-2023-24941-microsoft-network-file-system-remote-code-execution
01/06/2023 20:18:21
QRCode
archive.org
thumbnail

In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Quinton Crist, Guy Lederfein, and Lucas Miller of the Trend Micro Research Team detail a recently patched remote code execution vulnerability in the Microsoft Network File Service (NFS). This bug was originally dis

zerodayinitiative EN 2023 NFS CVE-2023-2494 RCE analysis
Mercenary mayhem: A technical analysis of Intellexa's PREDATOR spyware https://blog.talosintelligence.com/mercenary-intellexa-predator/
28/05/2023 13:46:37
QRCode
archive.org
thumbnail

We would like to thank The Citizen Lab for their cooperation, support and inputs into this research.

  • Commercial spyware use is on the rise, with actors leveraging these sophisticated tools to conduct surveillance operations against a growing number of targets. Cisco Talos has new details of a commercial spyware product sold by the spyware firm Intellexa (formerly known as Cytrox).
  • Our research specifically looks at two components of this mobile spyware suite known as “ALIEN” and “PREDATOR,” which compose the backbone of the spyware implant. Our findings include an in-depth walkthrough of the infection chain, including the implants’ various information-stealing capabilities.
  • A deep dive into both spyware components indicates that ALIEN is more than just a loader for PREDATOR and actively sets up the low-level capabilities needed for PREDATOR to spy on its victims.
  • We assess with high confidence that the spyware has two additional components — tcore (main component) and kmem (privilege escalation mechanic) — but we were unable to obtain and analyze these modules.
  • If readers suspect their system(s) may have been compromised by commercial spyware, please consider notifying Talos’ research team at talos-mercenary-spyware-help@external.cisco.com to assist in furthering the community’s knowledge of these threats.
talosintelligence EN 2023 PREDATOR spyware Intellexa ALIEN analysis Android
Akira Ransomware is “bringin’ 1988 back” https://news.sophos.com/en-us/2023/05/09/akira-ransomware-is-bringin-88-back/
12/05/2023 10:55:46
QRCode
archive.org
thumbnail

A new recently observed ransomware family dubbed Akira uses a retro aesthetic on their victim site very reminiscent of the 1980s green screen consoles and possibly takes its namesake from the popular 1988 anime film of the same name.

sophos EN 2023 Akira ransomware analysis
infosec company owned completely by 4chan user https://maia.crimew.gay/posts/optimeyes-leak/
12/05/2023 08:53:22
QRCode
archive.org
thumbnail

yesterday evening an anonymous 4chan user dumped a leak on the /g/ technology board, claiming to have completely owned risk visualization company optimeyes:

nyancrimew 4chan optimeyes EN 2023 security infosec jenkins analysis maia-arson-crimew
New phishing-as-a-service tool “Greatness” already seen in the wild https://blog.talosintelligence.com/new-phishing-as-a-service-tool-greatness-already-seen-in-the-wild/
11/05/2023 22:01:18
QRCode
archive.org
thumbnail
  • A previously unreported phishing-as-a-service (PaaS) offering named “Greatness” has been used in several phishing campaigns since at least mid-2022. Greatness incorporates features seen in some of the most advanced PaaS offerings, such as multi-factor authentication (MFA) bypass, IP filtering and integration with Telegram bots.
  • Greatness, for now, is only focused on Microsoft 365 phishing pages, providing its affiliates with an attachment and link builder that creates highly convincing decoy and login pages. It contains features such as having the victim’s email address pre-filled and displaying their appropriate company logo and background image, extracted from the target organization’s real Microsoft 365 login page. This makes Greatness particularly well-suited for phishing business users.
  • An analysis of the domains targeted in several ongoing and past campaigns revealed the victims were almost exclusively companies in the U.S., U.K., Australia, South Africa, and Canada, and the most commonly targeted sectors were manufacturing, health care and technology. The exact distribution of victims in each country and sector varies slightly between campaigns.
  • To use Greatness, affiliates must deploy and configure a provided phishing kit with an API key that allows even unskilled threat actors to easily take advantage of the service’s more advanced features. The phishing kit and API work as a proxy to the Microsoft 365 authentication system, performing a “man-in-the-middle” attack and stealing the victim’s authentication credentials or cookies.
talosintelligence EN 2023 Greatness Phishing phishing-kits analysis
The malware threat landscape: NodeStealer, DuckTail, and more https://engineering.fb.com/2023/05/03/security/malware-nodestealer-ducktail/
05/05/2023 10:43:38
QRCode
archive.org
thumbnail

We’re sharing our latest research and analysis into malware campaigns that are targeting online businesses — including newer malware posing as AI tools.

meta EN 2023 NodeStealer DuckTail research analysis campaigns malware
Magecart threat actor rolls out convincing modal forms https://www.malwarebytes.com/blog/threat-intelligence/2023/04/kritec-art
28/04/2023 14:48:41
QRCode
archive.org
thumbnail

To ensnare new victims, criminals will often devise schemes that attempt to look as realistic as possible. Having said that, it is not every day that we see the fraudulent copy exceed the original piece.

While following up on an ongoing Magecart credit card skimmer campaign, we were almost fooled by a payment form that looked so well done we thought it was real. The threat actor used original logos from the compromised store and customized a web element known as a modal to perfectly hijack the checkout page.

malwarebytes EN 2023 Magecart forms analysis
Analysis of Pre-Auth RCE in Sophos Web Appliance (CVE-2023-1671) https://vulncheck.com/blog/cve-2023-1671-analysis
22/04/2023 20:04:20
QRCode
archive.org
thumbnail

CVE-2023-1671 is a pre-authenticated command injection in Sophos Web Appliance. In this blog post, VulnCheck researchers analyze the vulnerability and develop a proof of concept (PoC) for it.

vulncheck EN 2023 analysis vulnerability Sophos CVE-2023-1671 pre-authenticated command injection
'RustBucket' malware targets macOS https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/
21/04/2023 17:30:05
QRCode
archive.org
thumbnail

Learn how APT group, BlueNoroff, targets Apple with malware variant to compromise macOS devices.

jamf EN 2023 macOS BlueNoroff RustBucket malware analysis
3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise
20/04/2023 14:04:45
QRCode
archive.org
thumbnail

A software supply chain attack led to another software supply chain attack.

mandiant EN 2023 3CX analysis Supply-Chain-Attack
in2al5d p3in4er is Almost Completely Undetectable https://blog.morphisec.com/in2al5d-p3in4er
19/04/2023 10:52:34
QRCode
archive.org
thumbnail

in2al5d p3in4er is a highly evasive new loader that has a detection ratio of 0 on VirusTotal. We explain how it works, and how to prevent it.

morphisec EN 2023 analysis malware-analysis in2al5d p3in4er Undetectable
LockBit for Mac | How Real is the Risk of macOS Ransomware? https://www.sentinelone.com/blog/lockbit-for-mac-how-real-is-the-risk-of-macos-ransomware/
19/04/2023 08:50:03
QRCode
archive.org
thumbnail

Discovery of a macOS variant of LockBit has caused alarm, but how serious a threat is it? We explore the malware and the threat of ransomware on Apple Macs.

sentinelone EN 2023 macOS LockBit analysis
QBot banker delivered through business correspondence https://securelist.com/qbot-banker-business-correspondence/109535/
17/04/2023 22:18:33
QRCode
archive.org
thumbnail

In early April, we detected a significant increase in attacks that use banking Trojans of the QBot family. The malware would be delivered through e-mails that were based on real business letters the attackers had gotten access to.

securelist EN 2023 Malware QakBot Thematic-phishing Trojan-Banker analysis
Analyzing an arm64 mach-O version of LockBit https://objective-see.org/blog/blog_0x75.html
17/04/2023 21:39:29
QRCode
archive.org
thumbnail

The relevance of this macOS specimen is well articulated in their tweet:

“Lockbit ransomware group has created their first MacOS-based payload. We believe this is the first time a large ransomware threat group has developed a payload for Apple products.” vx-underground

Ok, so even though it’s the weekend, we have what appears to be a new macOS malware specimen from one of the more notorious ransomware gangs! Coupled with the fact that this may be, (as noted by @VXUnderground), “the first time a large ransomware threat group has developed a payload for Apple products” …I was intrigued to decided to dig right in!

objective-see EN 2023 LockBit macOS analysis
Vice Society: A Tale of Victim Data Exfiltration via PowerShell, aka Stealing off the Land https://unit42.paloaltonetworks.com/vice-society-ransomware-powershell/
14/04/2023 21:50:12
QRCode
archive.org
thumbnail

The Vice Society ransomware gang exfiltrated victim network data using a custom Microsoft PowerShell script. We dissect how each function of it works.

unit42 EN 2023 report analysis ViceSociety PowerShell
Nokoyawa ransomware attacks with Windows zero-day https://securelist.com/nokoyawa-ransomware-attacks-with-windows-zero-day/109483/
12/04/2023 10:01:11
QRCode
archive.org
thumbnail

in February 2023, Kaspersky technologies detected a number of attempts to execute similar elevation-of-privilege exploits on Microsoft Windows servers belonging to small and medium-sized businesses in the Middle East, in North America, and previously in Asia regions. These exploits were very similar to already known Common Log File System (CLFS) driver exploits that we analyzed previously, but we decided to double check and it was worth it – one of the exploits turned out to be a zero-day, supporting different versions and builds of Windows, including Windows 11. The exploit was highly obfuscated with more than 80% of the its code being “junk” elegantly compiled into the binary, but we quickly fully reverse-engineered it and reported our findings to Microsoft. Microsoft assigned CVE-2023-28252 to the Common Log File System elevation-of-privilege vulnerability, and a patch was released on April 11, 2023, as part of April Patch Tuesday.

securelist EN 2023 Nokoyawa zero-day Kaspersky CVE-2023-28252 analysis ransomware CLFS
Queuejumper: Critical Unauthorized RCE Vulnerability In MSMQ Service https://research.checkpoint.com/2023/queuejumper-critical-unauthorized-rce-vulnerability-in-msmq-service/
12/04/2023 01:01:43
QRCode
archive.org

Check Point Research recently discovered three vulnerabilities in the “Microsoft Message Queuing” service, commonly known as MSMQ. These vulnerabilities were disclosed to Microsoft and patched in the April Patch Tuesday update. The most severe of these, dubbed QueueJumper by CPR (CVE-2023-21554), is a critical vulnerability that could allow unauthorized attackers to remotely execute arbitrary code in the context of the Windows service process mqsvc.exe.

checkpoint EN 2023 analysis RCE Queuejumper CVE-2023-21554 MSMQ Service Critical PatchTuesday
Balada Injector: Synopsis of a Massive Ongoing WordPress Malware Campaign https://blog.sucuri.net/2023/04/balada-injector-synopsis-of-a-massive-ongoing-wordpress-malware-campaign.html
10/04/2023 21:07:18
QRCode
archive.org
thumbnail

A synopsis of the massive ongoing WordPress malware campaign: Balada Injector, including common techniques, functionalities, and vulnerability exploits used in attacks.

sucuri EN 2023 Wordpress campaigns Balada Injector analysis exploits
MERCURY and DEV-1084: Destructive attack on hybrid environment - Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2023/04/07/mercury-and-dev-1084-destructive-attack-on-hybrid-environment/
10/04/2023 18:46:22
QRCode
archive.org
thumbnail

Microsoft detected a unique operation where threat actors carried out destructive actions in both on-premises and cloud environments.

microsoft EN 2023 MERCURY DEV-1084 analysis cloud hybrid environment Iran TTPs operation
page 13 / 20
4746 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio