Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 13 / 16
308 résultats taggé Malware  ✕
POLONIUM targets Israel with Creepy malware https://www.welivesecurity.com/2022/10/11/polonium-targets-israel-creepy-malware/
13/10/2022 10:07:59
QRCode
archive.org
thumbnail

ESET researchers analyzed previously undocumented custom backdoors and cyberespionage tools deployed in Israel by the POLONIUM APT group.

welivesecurity EN 2022 research POLONIUM Israel malware APT
MSSQL, meet Maggie. A novel backdoor for Microsoft SQL… https://medium.com/@DCSO_CyTec/mssql-meet-maggie-898773df3b01
05/10/2022 23:20:17
QRCode
archive.org
thumbnail

Continuing our monitoring of signed binaries, DCSO CyTec recently found a novel backdoor malware targeting Microsoft SQL servers. The malware comes in form of an “Extended Stored Procedure” DLL, a…

DCSO_CyTec EN 2022 Medium Maggie backdoor malware MicrosoftSQL servers
MAR-10365227-3.v1 China Chopper Webshells https://www.cisa.gov/uscert/ncas/analysis-reports/ar22-277c
05/10/2022 22:55:17
QRCode
archive.org

CISA analyzed 15 files associated with China Chopper malware. The files are modified Offline Address Book (OAB) Virtual Directory (VD) configuration files for Microsoft Exchange servers. The files have been modified with a variant of the China Chopper webshell. The webshells allow an attacker to remotely access the server and execute arbitrary code on the system(s).referenced in this bulletin or otherwise.

uscert csirt cert en 2022 CISA China Chopper malware Analysis
MAR-10365227-2.v1 HyperBro https://www.cisa.gov/uscert/ncas/analysis-reports/ar22-277b
05/10/2022 22:41:44
QRCode
archive.org

CISA analyzed 4 files associated with HyperBro malware. The files creates a backdoor program that is capable of uploading and downloading files to and from the system. The RAT is also capable of logging keystrokes and executing commands on the system.

uscert csirt cert CISA HyperBro malware Analysis RAT EN 2022
Bumblebee: increasing its capacity and evolving its TTPs https://research.checkpoint.com/2022/bumblebee-increasing-its-capacity-and-evolving-its-ttps/
04/10/2022 19:49:59
QRCode
archive.org
thumbnail

The spring of 2022 saw a spike in activity of Bumblebee loader, a recent threat that has garnered a lot of attention due to its many links to several well-known malware families.

checkpoint EN 2022 Bumblebee loader malware Analysis
Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors | Mandiant https://www.mandiant.com/resources/blog/esxi-hypervisors-malware-persistence
03/10/2022 20:11:54
QRCode
archive.org
thumbnail

Earlier this year, Mandiant identified a novel malware ecosystem impacting VMware ESXi, Linux vCenter servers, and Windows virtual machines that enables a threat actor to take the following actions:

1) Maintain persistent administrative access to the hypervisor
2) Send commands to the hypervisor that will be routed to the guest VM for execution
3) Transfer files between the ESXi hypervisor and guest machines running beneath it
4) Tamper with logging services on the hypervisor

mandiant EN 2022 esxi hypervisors malware BadVIB(E)s 0-day
Lazarus hackers abuse Dell driver bug using new FudModule rootkit https://www.bleepingcomputer.com/news/security/lazarus-hackers-abuse-dell-driver-bug-using-new-fudmodule-rootkit/
02/10/2022 12:36:22
QRCode
archive.org
thumbnail

The notorious North Korean hacking group 'Lazarus' was seen installing a Windows rootkit that abuses a Dell hardware driver in a Bring Your Own Vulnerable Driver attack.

bleepingcomputer EN 2022 CVE-2021-21551 BYOVD Dell Driver Lazarus-Group Malware North-Korea Rootkit
Mystery Hackers Are ‘Hyperjacking’ Targets for Insidious Spying https://www.wired.com/story/hyperjacking-vmware-mandiant/
01/10/2022 01:07:10
QRCode
archive.org
thumbnail

For decades, security researchers warned about techniques for hijacking virtualization software. Now one group has put them into practice.

wired 2022 EN hacking virtualization Hyperjacking malware Blue-Pill Mandiant
Chaos is a Go-based Swiss army knife of malware https://blog.lumen.com/chaos-is-a-go-based-swiss-army-knife-of-malware/
01/10/2022 01:03:28
QRCode
archive.org
thumbnail

Black Lotus Labs, the threat intelligence arm of Lumen Technologies, recently uncovered a multifunctional Go-based malware developed for Windows and Linux

lumen EN 2022 Chaos Go malware Windows Linux IoCs
NullMixer drops Redline Stealer, SmokeLoader and other malware | Securelist https://securelist.com/nullmixer-oodles-of-trojans-in-a-single-dropper/107498/
28/09/2022 15:28:47
QRCode
archive.org
thumbnail

NullMixer is a dropper delivering a number of Trojans, such as RedLine Stealer, SmokeLoader, Satacom, and others.

securelist EN 2022 NullMixer dropper Malware Malware-Descriptions Malware-Technologies Trojan Trojan-Dropper Trojan-stealer
MAR-10400779-1.v1 – Zimbra 1 https://www.cisa.gov/uscert/ncas/analysis-reports/ar22-270a
28/09/2022 15:27:59
QRCode
archive.org

CISA received seven files for analysis. Six Java Server Pages (JSP) webshells and a Bourne Again SHell (bash) file. Five JSP webshell files are designed to parse inbound requests for commands for execution, download files, and upload files. One JSP webshell file contains a form with input fields that prompts the attacker to enter the command in the input box and click "run" to execute. The command output will be displayed in a JSP page. The bash file is designed to perform ldapsearch queries and store the output into a newly created directory.

uscert csirt cert EN 2022 Malware Analysis Report AR22-270A Zimbra
New Malware Campaign Targets Zoom Users https://blog.cyble.com/2022/09/19/new-malware-campaign-targets-zoom-users/
26/09/2022 09:49:59
QRCode
archive.org
thumbnail

Cyble Research and Intelligence Labs analyzes a new malware campaign targeting Zoom users.

cyble EN 2022 Malware Zoom Vidar Stealer
The Evolution of the Chromeloader Malware - VMware Security Blog - VMware https://blogs.vmware.com/security/2022/09/the-evolution-of-the-chromeloader-malware.html
21/09/2022 23:39:47
QRCode
archive.org

The VMware Carbon Black MDR team goes in depth on the latest variants of the Chromeloader malware and how to detect them.

vmware EN 2022 Chromeloader malware IoCs Analysis
Lampion Trojan Utilizes New Delivery through Cloud-Based Sharing https://cofense.com/blog/lampion-trojan-utilizes-new-delivery-through-cloud-based-sharing
12/09/2022 14:05:35
QRCode
archive.org
thumbnail

Analysts at the Cofense Phishing Defense Center (PDC) have recently analyzed an email asking users to download a “Proof of Payment” as well as other documents. While it is important to never click on the link(s) or download the attachment(s) of any suspicious email, if the recipient interacts with the link, it downloaded the malware Lampion.

cofense EN 2022 Phishing Lampion malware IoCs
Shikitega - New stealthy malware targeting Linux https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux
07/09/2022 11:11:43
QRCode
archive.org
thumbnail

AT&T Alien Labs has discovered a new malware targeting endpoints and IoT devices that are running Linux operating systems. Shikitega is delivered in a multistage infection chain where each module responds to a part of the payload and downloads and executes the next one. An attacker can gain full control of the system, in addition to the cryptocurrency miner that will be executed and set to persist.

cybersecurity.att.com AT&T-Alien-Labs Shikitega EN 2022 Linux malware Analysis
PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks https://www.sentinelone.com/labs/pypi-phishing-campaign-juiceledger-threat-actor-pivots-from-fake-apps-to-supply-chain-attacks/
03/09/2022 11:24:16
QRCode
archive.org
thumbnail

A new threat actor is spreading infostealer malware through targeted attacks on developers and fraudulent cryptotrading applications.

sentinelone EN 2022 PyPI JuiceLedger infostealer malware ANALYSIS
North Korean hackers use signed macOS malware to target IT job seekers https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-signed-macos-malware-to-target-it-job-seekers/
18/08/2022 08:54:14
QRCode
archive.org
thumbnail

North Korean hackers from the Lazarus group have been using a signed malicious executable for macOS to impersonate Coinbase and lure in employees in the financial technology sector.

bleepingcomputer EN 2022 Coinbase CryptoCurrency Lazarus-Group North-Korea macOS malware
Two more malicious Python packages in the PyPI https://securelist.com/two-more-malicious-python-packages-in-the-pypi/107218/
16/08/2022 19:41:05
QRCode
archive.org

We used our internal automated system for monitoring open-source repositories and discovered two other malicious Python packages in the PyPI.

securelist 2022 EN PyPI Credentials-theft Data-theft Malware Open-source Python Trojan
Last Week on My Mac: Is your Mac still secure from malware? https://eclecticlight.co/2022/08/07/last-week-on-my-mac-is-your-mac-still-secure-from-malware/
07/08/2022 11:16:02
QRCode
archive.org
thumbnail

If you’re still running macOS Mojave or earlier, now is the time to take action to ensure your Mac maintains protection against malware.

eclecticlight 2022 EN macOS malware protection
Raccoon Stealer v2: The Latest Generation of the Raccoon Family https://www.zscaler.com/blogs/security-research/raccoon-stealer-v2-latest-generation-raccoon-family
02/08/2022 08:02:58
QRCode
archive.org
thumbnail

Raccoon is a malware family that has been sold as malware-as-a-service on underground forums since early 2019. In early July 2022, a new variant of this malware was released. The new variant, popularly known as Raccoon Stealer v2, is written in C unlike previous versions which were mainly written in C++.

zscaler EN 2022 Raccoon malware malware-as-a-service Stealer
page 13 / 16
4957 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn