Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 16 / 20
382 résultats taggé Analysis  ✕
Meddler-in-the-Middle Phishing Attacks Explained MitM https://unit42.paloaltonetworks.com/meddler-phishing-attacks/
22/12/2022 22:47:44
QRCode
archive.org
thumbnail

Meddler-in-the-Middle (MitM) phishing attacks show how threat actors find ways to get around traditional defenses and advice.

unit42 EN 2022 MitM phishing Meddler-in-the-Middle explanation analysis
CVE-2022-41040 and CVE-2022-41082 – zero-days in MS Exchange https://securelist.com/cve-2022-41040-and-cve-2022-41082-zero-days-in-ms-exchange/108364/
20/12/2022 17:56:09
QRCode
archive.org
thumbnail

At the end of September, GTSC reported the finding of two 0-day vulnerabilities in Microsoft Exchange Server, CVE-2022-41040 and CVE-2022-41082. The cybersecurity community dubbed the pair of vulnerabilities ProxyNotShell.

securelist EN 2022 DLL-hijacking Malware-Descriptions Microsoft-Exchange Trojan Vulnerabilities-and-exploits Zero-day CVE-2022-41040 CVE-2022-41082 analysis
GoTrim: Go-based Botnet Actively Brute Forces WordPress Websites https://www.fortinet.com/blog/threat-research/gotrim-go-based-botnet-actively-brute-forces-wordpress-websites
19/12/2022 11:05:36
QRCode
archive.org
thumbnail

FortiGuard Labs encountered an unreported CMS scanner and brute forcer written in the Go programming language. Read our analysis of the malware and how this active botnet scans and compromises websites.

fortinet EN 2022 analysis malware scanner Wordpress go brute-force-attack FortiGuards-Labs Threat-Research botnet
Mallox Ransomware showing signs of Increased Activity https://blog.cyble.com/2022/12/08/mallox-ransomware-showing-signs-of-increased-activity/
13/12/2022 21:04:34
QRCode
archive.org
thumbnail

“TargetCompany” is a type of ransomware that was first identified in June 2021. The researchers named it TargetCompany ransomware because it adds the targeted company name as a file extension to the encrypted files. In September 2022, researchers identified a TargetCompany ransomware variant targeting Microsoft SQL servers and adding the “Fargo” extension to the encrypted files. TargetCompany ransomware is also known to add a “Mallox” extension after encrypting the files.

cyble en 2022 mallox Ransomware analysis
Pulling the Curtains on Azov Ransomware: Not a Skidsware but Polymorphic Wiper - Check Point Research https://research.checkpoint.com/2022/pulling-the-curtains-on-azov-ransomware-not-a-skidsware-but-polymorphic-wiper/
12/12/2022 21:34:32
QRCode
archive.org
thumbnail
  • Check Point Research (CPR) provides under-the-hood details of its analysis of the infamous Azov Ransomware
  • Investigation shows that Azov is capable of modifying certain 64-bit executables to execute its own code
  • Azov is designed to inflict impeccable damage to the infected machine it runs on
  • CPR sees over 17K of Azov-related samples submitted to VirusTotal
checkpoint EN 2022 Azov analysis Ransomware
Hitching a ride with Mustang Panda https://decoded.avast.io/threatintel/apt-treasure-trove-avast-suspects-chinese-apt-group-mustang-panda-is-collecting-data-from-burmese-government-agencies-and-opposition-groups/
10/12/2022 10:39:35
QRCode
archive.org
thumbnail

Avast discovered a distribution point where a malware toolset is hosted, but also serves as temporary storage for the gigabytes of data being exfiltrated on a daily basis, including documents, recordings, and webmail dumps including scans of passports from Asian, American and European citizens and diplomats applying for Burmese visas, from Burmese human rights activists and Burmese government institutions.

avast EN 2022 MustangPanda exfiltrated analysis
New MuddyWater Threat: Old Kitten; New Tricks https://www.deepinstinct.com/blog/new-muddywater-threat-old-kitten-new-tricks
10/12/2022 09:59:21
QRCode
archive.org
thumbnail

MuddyWater, also known as Static Kitten and Mercury, is a cyber espionage group that’s most likely a subordinate element within Iran's Ministry of Intelligence and Security (MOIS).

Since at least 2017 MuddyWater has targeted a range of government and private organizations across sectors, including telecommunications, local government, defense, and oil and natural gas organizations, in the Middle East, Asia, Africa, Europe, and North America.

deepinstinct MuddyWater EN 2022 analysis malspam StaticKitten Mercury
Blowing Cobalt Strike Out of the Water With Memory Analysis https://unit42.paloaltonetworks.com/cobalt-strike-memory-analysis/
06/12/2022 06:51:47
QRCode
archive.org
thumbnail

Unit 42 researchers examine several malware samples that incorporate Cobalt Strike components, and discuss some of the ways that we catch these samples by analyzing artifacts from the deltas in process memory at key points of execution. We will also discuss the evasion tactics used by these threats, and other issues that make their analysis problematic.

unit42 EN 2022 CobaltStrike analysis paloaltonetworks
Preparing for a Russian cyber offensive against Ukraine this winter https://blogs.microsoft.com/on-the-issues/2022/12/03/preparing-russian-cyber-offensive-ukraine/
03/12/2022 20:22:37
QRCode
archive.org
thumbnail

As we report more fully below, in the wake of Russian battlefield losses to Ukraine this fall, Moscow has intensified its multi-pronged hybrid technology approach to pressure the sources of Kyiv’s military and political support, domestic and foreign. This approach has included destructive missile and cyber strikes on civilian infrastructure in Ukraine, cyberattacks on Ukrainian and now foreign-based supply chains, and cyber-enabled influence operations[1]—intended to undermine US, EU, and NATO political support for Ukraine, and to shake the confidence and determination of Ukrainian citizens.

Microsoft EN 2022 iridium russia-ukraine-war Russia cyberoffensive analysis winter
CashRewindo: How to age domains for an investment scam like fine scotch https://blog.confiant.com/cashrewindo-how-to-age-domains-for-an-investment-scam-like-fine-scotch-a48d22788c84
30/11/2022 09:57:13
QRCode
archive.org

Years-old domains, compromised JS libraries and worldwide-localized content among tactics of this sophisticated attacker.

confiant EN 2022 Medium CashRewindo investment scam analysis
ViperSoftX: Hiding in System Logs and Spreading VenomSoftX - Avast Threat Labs https://decoded.avast.io/janrubin/vipersoftx-hiding-in-system-logs-and-spreading-venomsoftx/
23/11/2022 22:48:29
QRCode
archive.org

ViperSoftX is a multi-stage stealer that exhibits interesting hiding capabilities. Other than stealing cryptocurrencies, it also spreads the VenomSoftX browser extension, which performs man-in-the-browser attacks.

avast 2022 EN ViperSoftX multi-stage stealer analysis browser extension man-in-the-browser
Aurora: a rising stealer flying under the radar https://blog.sekoia.io/aurora-a-rising-stealer-flying-under-the-radar/
21/11/2022 20:56:10
QRCode
archive.org
thumbnail

Since September 2022, Aurora malware is advertised as an infostealer and several traffers teams announced they added it to their malware toolset.

sekoia 2022 EN infostealer malware technical analysis IoCs Malware-as-a-Service
Technical Analysis of the RedLine Stealer https://cloudsek.com/technical-analysis-of-the-redline-stealer/
19/11/2022 23:14:10
QRCode
archive.org
thumbnail

RedLine is an information stealer which operates on a MaaS (malware-as-a-service) model. This stealer is available on underground forums, and priced according to users' needs.

cloudsek EN 2022 stealer RedLine MaaS technical analysis IoCs
AXLocker, Octocrypt, and Alice: Leading a new wave of Ransomware Campaigns https://blog.cyble.com/2022/11/18/axlocker-octocrypt-and-alice-leading-a-new-wave-of-ransomware-campaigns/
19/11/2022 23:12:11
QRCode
archive.org
thumbnail

Cyble analyzes a new wave of ransomware attacks being led by AXLocker, Octocrypt, and Alice ransomware and how they target Discord tokens.

cyble 2022 EN AXLocker Octocrypt Alice analysis ransomware Discord IoCs
New RapperBot Campaign – We Know What You Bruting for this Time https://www.fortinet.com/blog/threat-research/new-rapperbot-campaign-ddos-attacks
16/11/2022 20:24:13
QRCode
archive.org
thumbnail

FortiGuard Labs provides an analysis on RapperBot focusing on comparing samples for different campaigns, including one aiming to launch Distributed Denial of Service (DDoS) attacks. Read our blog to learn more about the differences observed in this campaign vs previous RapperBot and similar campaigns in the past.

fortinet EN 2022 RapperBot DDoS-attacks DDoS analysis IoCs
BumbleBee Zeros in on Meterpreter https://thedfirreport.com/2022/11/14/bumblebee-zeros-in-on-meterpreter/
14/11/2022 21:31:34
QRCode
archive.org
thumbnail

In this intrusion from May 2022, the threat actors used BumbleBee as the initial access vector from a Contact Forms campaign. We have previously reported on two BumbleBee intrusions (1, 2), and this report is a continuation of a series of reports uncovering multiple TTPs seen by BumbleBee post exploitation operators.

The intrusion began with the delivery of an ISO file that contained an LNK and a DLL. The threat actors leveraged BumbleBee to load a Meterpreter agent and Cobalt Strike Beacons. They then performed reconnaissance, used two different UAC bypass techniques, dumped credentials, escalated privileges using a ZeroLogon exploit, and moved laterally through the environment.

thedfirreport EN 2022 bumblebee case analysis
Exploring ZIP Mark-of-the-Web Bypass Vulnerability (CVE-2022-41049) https://breakdev.org/zip-motw-bug-analysis/
12/11/2022 22:36:48
QRCode
archive.org
thumbnail

Windows ZIP extraction bug (CVE-2022-41049) lets attackers craft ZIP files, which evade warnings on attempts to execute packaged files, even if ZIP file was downloaded from the Internet.

breakdev EN 2022 CVE-2022-41049 Windows Mark-of-the-Web Bypass Vulnerability analysis
PNG Steganography Hides Backdoor https://decoded.avast.io/martinchlumecky/png-steganography/
12/11/2022 22:35:11
QRCode
archive.org
thumbnail

Our deep analysis of the Worok toolset (previously described by ESET Research) reveals the final stage, hidden in a PNG file, that steals data and provides a multifunctional backdoor using the DropBox repository and API.

avast EN 2022 PNG backdoor Worok analysis toolset Steganography
Massive ois[.]is Black Hat Redirect Malware Campaign https://blog.sucuri.net/2022/11/massive-ois-is-black-hat-redirect-malware-campaign.html
12/11/2022 22:31:02
QRCode
archive.org
thumbnail

Learn how attackers are redirecting WordPress website visitors to fake Q&A sites via ois[.]is. Nearly 15,000 websites affected by this malware so far.

sucuri EN 2022 campaign WordPress malware Malicious SEO Analysis ois.is
The Case of Cloud9 Chrome Botnet https://www.zimperium.com/blog/the-case-of-cloud9-chrome-botnet/
08/11/2022 15:54:50
QRCode
archive.org
thumbnail

The Zimperium zLabs team recently discovered a malicious browser extension, originally called Cloud9, which not only steals the information available during the browser session but can also install malware on a user's device and subsequently assume control of the entire device. In this blog, we will take a deeper look into this malicious browser extension.

zimperium EN 2022 browser extension Cloud9 malicious stealer malware Analysis
page 16 / 20
4748 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio