Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 150 / 214
4270 résultats taggé EN  ✕
PindOS: New JavaScript Dropper Delivering Bumblebee and IcedID https://www.deepinstinct.com/blog/pindos-new-javascript-dropper-delivering-bumblebee-and-icedid
26/06/2023 18:59:02
QRCode
archive.org
thumbnail

Deep Instinct’s Threat Research Lab recently noticed a new strain of a JavaScript-based dropper that is delivering Bumblebee and IcedID. The dropper contains comments in Russian and employs the unique user-agent string “PindOS”, which may be a reference to current (and past) anti-American sentiment in Russia.

Bumblebee is a malware loader first discovered in March 2022. It was associated with Conti group and was being used as a replacement for BazarLoader. It acts as a primary vector for multiple types of other malware, including ransomware.

IcedID is a modular banking malware designed to steal financial information. It has been seen in the wild since at least 2017 and has recently been observed shifting some of its focus to malware delivery.

deepinstinct EN 2023 JavaScript Dropper PindOS Bumblebee analysis
PyPI Attackers Still At It: Malicious Packages Drop Trojans and Info-stealers https://blog.sonatype.com/pypi-attackers-still-at-it-malicious-packages-drop-trojans-and-info-stealers
23/06/2023 09:51:46
QRCode
archive.org
thumbnail

Sonatype's malicious open source and malware detection systems found hundreds of malicious PyPI packages.

sonatype EN 2023 PyPI malware Supply-Chain-Attack
Emerging Threat! Exposing JOKERSPY https://www.elastic.co/fr/security-labs/inital-research-of-jokerspy
22/06/2023 21:36:02
QRCode
archive.org
thumbnail

Explore JOKERSPY, a recently discovered campaign that targets financial institutions with Python backdoors. This article covers reconnaissance, attack patterns, and methods of identifying JOKERSPY in your network.

elastic.co EN 2023 JOKERSPY macOS Python backdoor
Fragments of Cross-Platform Backdoor Hint at Larger Mac OS Attack https://www.bitdefender.com/blog/labs/fragments-of-cross-platform-backdoor-hint-at-larger-mac-os-attack/
22/06/2023 21:18:20
QRCode
archive.org

During routine detection maintenance, our Mac researchers stumbled upon a small set of files with backdoor capabilities that seem to form part of a more complex malware toolkit. The following analysis is incomplete, as we are trying to identify the puzzle pieces that are still missing.

bitdefender EN 2023 macOS malware Cross-Platform Backdoor
IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits https://unit42.paloaltonetworks.com/mirai-variant-targets-iot-exploits/
22/06/2023 20:12:15
QRCode
archive.org
thumbnail

Since March 2023, Unit 42 researchers have observed threat actors leveraging several IoT vulnerabilities to spread a variant of the Mirai botnet.

unit42 EN 2023 Mirai analysis IoT
Dissecting TriangleDB, a Triangulation spyware implant https://securelist.com/triangledb-triangulation-implant/110050/
21/06/2023 13:40:21
QRCode
archive.org
thumbnail

In researching Operation Triangulation, we set ourselves the goal to retrieve as many parts of the exploitation chain as possible. As of now, we have finished analyzing the spyware implant and are ready to share the details.
#2023 #APT #Apple #EN #Malware-Descriptions #Spyware #Targeted-attacks #Triangulation #iOS #malware #securelist

Apple Triangulation iOS 2023 Malware-Descriptions malware EN Spyware securelist APT Targeted-attacks
Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389 https://www.fortinet.com/blog/threat-research/condi-ddos-botnet-spreads-via-tp-links-cve-2023-1389
21/06/2023 08:33:09
QRCode
archive.org
thumbnail

FortiGuard Labs encountered recent samples of a DDoS-as-a-service botnet calling itself Condi. It attempted to spread by exploiting TP-Link Archer AX21 (AX1800) routers vulnerable to CVE-2023-1389, which was disclosed in mid-March of this year. Read more.

fortinet EN 2023 research botnet DDoS Condi TP-Link CVE-2023-1389
BlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activities | Recorded Future https://www.recordedfuture.com/bluedelta-exploits-ukrainian-government-roundcube-mail-servers
20/06/2023 19:49:45
QRCode
archive.org
thumbnail

Recorded Future's Insikt Group, in partnership with Ukraine's Computer Emergency Response Team (CERT-UA), has uncovered a campaign targeting high-profile entities in Ukraine that was cross-correlated with a spearphishing campaign uncovered by Recorded Future’s Network Traffic Intelligence. The campaign leveraged news about Russia’s war against Ukraine to encourage recipients to open emails, which immediately compromised vulnerable Roundcube servers (an open-source webmail software), using CVE-2020-35730, without engaging with the attachment. We found that the campaign overlaps with historic BlueDelta activity exploiting the Microsoft Outlook zero-day vulnerability CVE-2023-23397 in 2022.

recordedfuture EN 2023 Russia-Ukraine-war Ukraine Roundcube CVE-2023-23397 CVE-2020-35730
Unpacking RDStealer: An Exfiltration Malware Targeting RDP Workloads https://www.bitdefender.com/blog/businessinsights/unpacking-rdstealer-an-exfiltration-malware-targeting-rdp-workloads/
20/06/2023 15:14:28
QRCode
archive.org

In June 2023, Bitdefender Labs published a research paper about espionage operation in East Asia. This operation was ongoing since at least the beginning of 2022, showing a high level of sophistication typically associated with state-sponsored groups. Despite trying various methods, we have been unable to attribute these attacks to a specific threat actor, but the target aligns with the interest of China-based threat actors.

bitdefender EN 2023 RDStealer China RDP Exfiltration Malware
chonked pt.2: exploiting cve-2023-33476 for remote code execution https://blog.coffinsec.com/0day/2023/06/19/minidlna-cve-2023-33476-exploits.html
20/06/2023 10:55:31
QRCode
archive.org

second part in a two-part series going over heap overflow in MiniDLNA (CVE-2023-33476). this post provides a walkthrough of steps taken to write an exploit for this vulnerability in order to achieve remote code execution and pop a shell.

coffinsec EN 2023 MiniDLNA vulnerability CVE-2023-33476 rce
ASUS urges customers to patch critical router vulnerabilities https://www.bleepingcomputer.com/news/security/asus-urges-customers-to-patch-critical-router-vulnerabilities/
19/06/2023 20:33:34
QRCode
archive.org
thumbnail

ASUS has released new firmware with cumulative security updates that address vulnerabilities in multiple router models, warning customers to immediately update their devices or restrict WAN access until they're secured.

bleepingcomputer EN 2023 ASUS Patch Router Security-Update CVE-2022-26376 CVE-2018-1160
KeePassXC Vulnerability CVE-2023-35866 allows attackers to change the master password and second-factor authentication settings https://securityonline.info/keepassxc-vulnerability-cve-2023-35866-allows-attackers-to-change-the-master-password-and-second-factor-authentication-settings/
19/06/2023 20:29:04
QRCode
archive.org
thumbnail

The core of CVE-2023-35866 lies in disturbing ease of access. A local attacker, within an authenticated KeePassXC Database session

securityonline EN 2023 KeePassXC Vulnerability CVE-2023-35866
Anonymous Sudan: Who are the hackers behind Microsoft’s cloud outages? https://www.itpro.com/security/hacking/anonymous-sudan-who-are-the-hackers-behind-microsofts-cloud-outages
19/06/2023 13:48:30
QRCode
archive.org
thumbnail

The highly aggressive ‘hacktivist’ group is thought to have links to the pro-Russian Killnet hacker collective

itpro EN 2023 Anonymous-Sudan aggressive pro-Russian collective
XSS Vulnerabilities in Azure Led to Unauthorized Access to User Sessions - SecurityWeek https://www.securityweek.com/xss-vulnerabilities-in-azure-led-to-unauthorized-access-to-user-sessions/
18/06/2023 21:53:18
QRCode
archive.org
thumbnail

Microsoft addressed two XSS vulnerabilities in Azure Bastion and Azure Container Registry (ACR) leading to unauthorized access to sessions.

securityweek EN 2023 XSS Azure Bastion ACR unauthorized access
Hijacking S3 Buckets: New Attack Technique https://checkmarx.com/blog/hijacking-s3-buckets-new-attack-technique-exploited-in-the-wild-by-supply-chain-attackers/
18/06/2023 12:34:45
QRCode
archive.org
thumbnail

Without altering a single line of code, attackers poisoned the NPM package “bignum” by hijacking the S3 bucket serving binaries necessary for its function and replacing them with malicious ones

checkmarx EN 2023 Hijacking S3 Buckets NPM Supply-Chain-Attack
Microsoft says early June disruptions to Outlook, cloud platform, were cyberattacks https://apnews.com/article/microsoft-outage-ddos-attack-hackers-outlook-onedrive-7a23f92ab3cc2b7f0c590c7d08cf03fe
18/06/2023 00:45:22
QRCode
archive.org
thumbnail

Microsoft says the early June disruptions to its Microsoft’s flagship office suite — including the Outlook email apps — were denial-of-service attacks by a shadowy new hacktivist group. In a blog post published Friday evening after The Associated Press sought clarification on the sporadic but serious outages, Microsoft confirmed that that they were DDoS attacks by a group calling itself Anonymous Sudan, which some security researchers believe is Russia-affiliated. The software giant offered few details on the attack. It did not comment on how many customers were affected.

apnews EN 2023 Microsoft Outlook denial-of-service attacks DoS DDoS
A simple bug exposed access to thousands of smart security alarm systems https://techcrunch.com/2023/06/16/eaton-secureconnect-security-alarm-vulnerability/
17/06/2023 20:08:32
QRCode
archive.org
thumbnail

The vulnerability — now fixed — was discovered in a cloud-based system that allows customers to remotely manage their security alarm systems.

techcrunch EN 2023 security cybersecurity home-security-systems smart security alarm systems IoT vulnerability
A Shady Chinese Firm’s Encryption Chips Got Inside NATO and NASA https://www.wired.com/story/hualan-encryption-chips-entity-list-china/
17/06/2023 13:06:40
QRCode
archive.org
thumbnail

The US government warns encryption chipmaker Hualan has suspicious ties to China’s military. Yet US agencies still use one of its subsidiary’s chips, raising fears of a backdoor.

wired EN 2023 US China chipmaker cybersecurity china encryption national-security Supply-Chain backdoor
‘Several’ US federal agencies affected by MOVEit breach https://therecord.media/several-us-federal-agencies-affected-by-moveit-breach
16/06/2023 09:34:27
QRCode
archive.org

Top U.S. cybersecurity officials confirmed Thursday that several federal agencies have been impacted by cyberattacks on the widely used MOVEit file transfer tool.

Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly told reporters that her team and the FBI are working to provide assistance to federal agencies that used MOVEit, which is being exploited by the Russia-based Clop ransomware gang in a widespread breach that appears to have compromised dozens of entities.

“We’ve been working closely with Progress Software [which makes MOVEit], the FBI and our federal partners to understand its prevalence within federal agencies,” she said. Earlier in the day, CNN first reported that several government agencies were compromised in the hacks. Easterly said that CISA is providing support to “several agencies that have experienced intrusions of their MOVEit applications.”

therecord EN 2023 MOVEit cl0p US federal agencies affected
Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally
16/06/2023 00:57:42
QRCode
archive.org
thumbnail

Mandiant is investigating a Barracuda ESG appliance zero-day vulnerability being exploited in the wild.

mandiant EN 2023 Barracuda ESG Zero-Day CVE-2023-2868 China
page 150 / 214
4879 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn