Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 15 / 16
304 résultats taggé Malware  ✕
When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure https://www.microsoft.com/security/blog/2021/07/22/when-coin-miners-evolve-part-1-exposing-lemonduck-and-lemoncat-modern-mining-malware-infrastructure/
24/04/2022 10:58:21
QRCode
archive.org
thumbnail

In this two-part blog series, we expose a modern malware infrastructure and provide guidance for protecting against the wide range of threats it enables. Part 1 covers the evolution of the threat, how it spreads, and how it impacts organizations. Part 2 is a deep dive on the attacker behavior and will provide investigation guidance.

microsoft 2021 LemonDuck lemoncat EN malware botnet infrastructure
Russia’s Sandworm hackers attempted a third blackout in Ukraine https://arstechnica.com/information-technology/2022/04/russias-sandworm-hackers-attempted-a-third-blackout-in-ukraine/
13/04/2022 09:00:34
QRCode
archive.org
thumbnail

The attack was the first in five years to use Sandworm's Industroyer malware.

Sandworm Industroyer arstechnica 2022 EN cyberwar Ukraine blackout malware ICS
Storm Cloud on the Horizon: GIMMICK Malware Strikes at macOS https://www.volexity.com/blog/2022/03/22/storm-cloud-on-the-horizon-gimmick-malware-strikes-at-macos/
24/03/2022 09:04:44
QRCode
archive.org
thumbnail
GIMMICK macos EN 2022 StormCloud volexity China malware
Raccoon Stealer: “Trash panda” abuses Telegram https://decoded.avast.io/vladimirmartyanov/raccoon-stealer-trash-panda-abuses-telegram/
14/03/2022 00:34:57
QRCode
archive.org
thumbnail

We recently came across a stealer, called Raccoon Stealer, a name given to it by its author. Raccoon Stealer uses the Telegram infrastructure to store and update actual C&C addresses.  Raccoon Stealer is a password stealer capable of stealing not just passwords, but various types of data, including: Cookies, saved logins and forms data from […]

avast stealer EN 2022 RaccoonStealer Telegram research malware passwordstealer
China-backed APT41 compromised ‘at least’ six US state governments https://techcrunch.com/2022/03/08/apt41-state-governments/
09/03/2022 08:47:52
QRCode
archive.org
thumbnail

The prolific China APT41 hacking group, known for carrying out espionage in parallel with financially motivated operations, has compromised multiple U.S. state government networks, according to cybersecurity giant Mandiant. The group — seemingly undeterred by U.S. indictments against five APT41 members in 2020 — conducted a months-long campaign during which it targeted and successfully breached […]

china cyberwarfare java log4j log4shell malware mandiant russia sql ukraine US APT41 web-application zero-day
Malware now using stolen NVIDIA code signing certificates https://www.bleepingcomputer.com/news/security/malware-now-using-stolen-nvidia-code-signing-certificates/
06/03/2022 10:28:17
QRCode
archive.org
thumbnail

Threat actors are using stolen NVIDIA code signing certificates to sign malware to appear trustworthy and allow malicious drivers to be loaded in Windows.

This week, NVIDIA confirmed that they suffered a cyberattack that allowed threat actors to steal employee credentials and proprietary data.

bleepingcomputer Nvidia certificates malware EN 2022 code signing
Phishing attacks target countries aiding Ukrainian refugees https://www.bleepingcomputer.com/news/security/phishing-attacks-target-countries-aiding-ukrainian-refugees/
02/03/2022 14:41:10
QRCode
archive.org
thumbnail

A spear-phishing campaign likely coordinated by a state-backed threat actor has been targeting European government personnel providing logistics support to Ukrainian refugees.

Belarus Europe Ghostwriter Malware Phishing TA445 Ukraine UNC1151 bleepingcomputer EN 2022 refugees
Face à un incident de cybersécurité, Nvidia soupçonné d'avoir répliqué - ZDNet https://www.zdnet.fr/actualites/face-a-un-incident-de-cybersecurite-nvidia-soupconne-d-avoir-replique-39938077.htm
02/03/2022 09:49:06
QRCode
archive.org
thumbnail

La société confirme des informations indiquant que ses développeurs ont été confrontés à deux jours de pannes.

zdnetfr 2022 FR hackback malware LAPSUS$ Nvidia
Nvidia Confirms Company Data Was Stolen in Hack https://www.pcmag.com/news/nvidia-confirms-company-data-was-stolen-in-hack
02/03/2022 09:48:07
QRCode
archive.org
thumbnail

Meanwhile, the hackers behind the breach are now releasing some of the stolen files on the web.

PCMag Nvidia EN 2022 hackback malware LAPSUS$
Destructive Malware Targeting Organizations in Ukraine https://www.cisa.gov/uscert/ncas/alerts/aa22-057a
01/03/2022 23:07:31
QRCode
archive.org

Actions to Take Today: • Set antivirus and antimalware programs to conduct regular scans. • Enable strong spam filters to prevent phishing emails from reaching end users. • Filter network traffic. • Update software. • Require multifactor authentication. Leading up to Russia’s unprovoked attack against Ukraine, threat actors deployed destructive malware against organizations in Ukraine to destroy computer systems and render them inoperable. 

uscert csirt cert CISA EN 2022 alert WhisperGate HermeticWiper malware
Attacchi informatici, c'è un nuovo malware di uno dei più importanti gruppi di cybercriminali russi https://www.wired.it/article/malware-cyclops-blink-russia/
26/02/2022 01:20:09
QRCode
archive.org
thumbnail

È stato rilevato delle agenzie di sicurezza informatica di Stati Uniti e Regno Unito: anche se non è ancora chiaro a che scopo sia stato utilizzato, i recenti attacchi in Ucraina spingono gli esperti a rimanere vigili

russia ucraina malware IT 2022 wiredit CyclopsBlink Cyclops cybercriminali
TrickBot malware operation shuts down, devs move to BazarBackdoor https://www.bleepingcomputer.com/news/security/trickbot-malware-operation-shuts-down-devs-move-to-bazarbackdoor/
26/02/2022 01:11:47
QRCode
archive.org
thumbnail

The TrickBot malware operation has shut down after its core developers move to the Conti ransomware gang to focus development on the stealthy BazarBackdoor and Anchor malware families.

BazarBackdoor Conti Malware Ransomware TrickBot 2002 EN bleepingcomputer
HermeticWiper | New Destructive Malware Used In Cyber Attacks on Ukraine https://www.sentinelone.com/labs/hermetic-wiper-ukraine-under-attack/
25/02/2022 08:42:00
QRCode
archive.org
thumbnail

A new malware is attacking Ukrainian organizations and erasing Windows devices. In this early analysis, we provide technical details, IOCS and hunting rules.

sentinelone 2022 EN HermeticWiper datawiping malware cyberwar Russia Ukraine
Second data wiper attack hits Ukraine computer networks https://therecord.media/second-data-wiper-attack-hits-ukraine-computer-networks/
24/02/2022 09:32:01
QRCode
archive.org

Two cybersecurity firms with a strong business presence in Ukraine—ESET and Broadcom’s Symantec—have reported tonight that computer networks in the country have been hit with a new data-wiping attack.

The attack is taking place as Russian military troops have crossed the border and invaded Ukraine’s territory in what Russian President Putin has described as a “peacekeeping” mission.

therecord 2022 ESET Symantec datawiping malware Ukraine Russia EN cyberwar DDoS
Chrome Zero-Day Under Active Attack: Patch ASAP | Threatpost https://threatpost.com/google-chrome-zero-day-under-attack/178428/
16/02/2022 20:38:31
QRCode
archive.org
thumbnail

The year's 1st Chrome zero-day can lead to all sorts of misery, ranging from data corruption to the execution of arbitrary code on vulnerable systems.

malware threatpost EN 2022 Chrome 0-day CVE-2022-0609
New Emotet Infection Method https://unit42.paloaltonetworks.com/new-emotet-infection-method/
16/02/2022 19:57:47
QRCode
archive.org
thumbnail

As early as Dec. 21, 2021, Unit 42 observed a new infection method for the highly prevalent malware family Emotet. Emotet is high-volume malware that often changes and modifies its attack patterns. This latest modification of the Emotet attack follows suit.

paloaltonetworks emotet 2022 EN IoC malware
Linux-Targeted Malware Increases by 35% in 2021 https://www.crowdstrike.com/blog/linux-targeted-malware-increased-by-35-percent-in-2021/
15/02/2022 20:57:36
QRCode
archive.org
thumbnail

CrowdStrike has observed that malware targeting Linux-based systems increased by 35% in 2021. XorDDoS, Mirai and Mozi were the most common malware families.

CrowdStrike 2021 EN Linux XorDDoS Mirai Mozi malware
Minaccia Malware prende di mira il settore dell'aviazione e dell'industria aerospaziale https://www.ictsecuritymagazine.com/notizie/minaccia-malware-prende-di-mira-il-settore-dellaviazione-e-dellindustria-aerospaziale/
15/02/2022 11:40:44
QRCode
archive.org
thumbnail

I ricercatori di Proofpoint hanno rilevato TA2541, un attore di minaccia persistente che da anni prende di mira i settori di aviazione, industria

TA2541 IT APT RAT Malware aviazione ictsecuritymagazine
PrivateLoader to Anubis Loader. By: Jason Reaves and Joshua Platt https://medium.com/walmartglobaltech/privateloader-to-anubis-loader-55d066a2653e
15/02/2022 11:33:10
QRCode
archive.org
thumbnail

Intel471 released a report[1] on a loader system being leveraged for distribution of various crimeware malware families: The report mentioned an administrator panel located on the main command and…

PrivateLoader Anubis malware crimeware EZCubePanel
PrivateLoader: The first step in many malware schemes https://intel471.com/blog/privateloader-malware
15/02/2022 11:31:39
QRCode
archive.org
thumbnail

A full technical breakdown of a prolific pay-per-install service.

Intel471 PrivateLoader malware pay-per-install PPI
page 15 / 16
4746 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio