Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 17 / 41
817 résultats taggé 2022  ✕
Credential Gathering From Third-Party Software https://unit42.paloaltonetworks.com/credential-gathering-third-party-software/
19/09/2022 23:44:41
QRCode
archive.org
thumbnail

Users often store passwords in third-party software for convenience – but credential gathering techniques can target this behavior.

unit42 EN 2022 passwords Analysis credential gathering techniques
Malvertising on Microsoft Edge's News Feed pushes tech support scams https://www.malwarebytes.com/blog/threat-intelligence/2022/09/microsoft-edges-news-feed-pushes-tech-support-scam
19/09/2022 23:34:16
QRCode
archive.org
thumbnail

We uncovered a campaign on the Microsoft Edge home page where malicious ads are luring victims into tech support scams.

malwarebytes EN 2022 Microsoft Edge Analysis campaign scams IoCs Feed News browser
Ermittlungserfolg gegen Ransomware-Gruppierung https://www.zh.ch/de/news-uebersicht/medienmitteilungen/2022/09/220916_ransomware.html#-792208150
19/09/2022 23:29:54
QRCode
archive.org
thumbnail

In the context of an internationally coordinated operation against a ransomware group, the Zurich Public Prosecutor’s Office is leading criminal proceedings against an accused person. At the same time, cyber investigators of the Zurich Cantonal Police have been intensively analysing the data storage devices seized from that person in the past months. This analysis has revealed numerous private keys. They enable the aggrieved companies to recover their encrypted data.

zh Zurich EN 2022 DE LockerGoga ramsomware decryptor
GTA 6 gameplay leaks online in 90 videos https://www.theverge.com/2022/9/18/23359156/gta-6-leak-gameplay-footage-90-videos
19/09/2022 21:52:21
QRCode
archive.org
thumbnail

A massive GTA VI leak appears to line up with previous reports.

theverge EN 2022 GTA leak DataBreach gameplay Rockstar
Security update https://www.uber.com/newsroom/security-update
19/09/2022 21:50:57
QRCode
archive.org
thumbnail

Updates on security incident

uber 2022 En leak announce Lapsus$ attribution Rockstar
Get root on macOS 12.3.1: proof-of-concepts for Linus Henze’s CoreTrust and DriverKit bugs (CVE-2022-26766, CVE-2022-26763) https://worthdoingbadly.com/coretrust/
16/09/2022 09:07:26
QRCode
archive.org

Here are two proof-of-concepts for CVE-2022-26766 (CoreTrust allows any root certificate) and CVE-2022-26763 (IOPCIDevice::_MemoryAccess not checking bounds at all), two issues discovered by @LinusHenze and patched in macOS 12.4 / iOS 15.5.

worthdoingbadly PoC EN 2022 CVE-2022-26766 CVE-2022-26763 patched macOS iOS LinusHenze
Uber Investigating Breach of Its Computer Systems https://www.nytimes.com/2022/09/15/technology/uber-hacking-breach.html
16/09/2022 08:40:35
QRCode
archive.org

The company said on Thursday that it was looking into the scope of the apparent hack.

nytimes EN 2022 Uber breach investigation
Iran’s cyberwar goes global https://www.economist.com/middle-east-and-africa/2022/09/14/irans-cyberwar-goes-global
15/09/2022 21:38:58
QRCode
archive.org
thumbnail

Its targets include not only Israel but at least one NATO member

economist EN 2022 cyber-assault cyber-attacks cyberwar geopolitics
Webworm: Espionage Attackers Testing and Using Older Modified RATs https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/webworm-espionage-rats
15/09/2022 21:17:57
QRCode
archive.org
thumbnail

The attackers are working on a number of malware threats, some of which have been used in attacks while others are in pre-deployment or testing stages.
Symantec, by Broadcom Software, has gained insight into the current activities of a group we call Webworm. The group has developed customized versions of three older remote access Trojans (RATs), including Trochilus, Gh0st RAT, and 9002 RAT. At least one of the indicators of compromise (IOCs) observed by Symantec was used in an attack against an IT service provider operating in multiple Asian countries, while others appear to be in pre-deployment or testing stages.

symantec-enterprise-blogs.security EN 2022 Gh0st RAT 9002 older Trojans Trochilus
RedLine spreads through ads for cheats and cracks on YouTube https://securelist.com/self-spreading-stealer-attacks-gamers-via-youtube/107407/
15/09/2022 21:14:03
QRCode
archive.org
thumbnail

An unusual malicious bundle (a collection of malicious programs distributed in the form of a single installation file, self-extracting archive or other file with installer-type functionality) recently caught our eye. Its main payload is the widespread RedLine stealer. Discovered in March 2020, RedLine is currently one of the most common Trojans used to steal passwords and credentials from browsers, FTP clients and desktop messengers. It is openly available on underground hacker forums for just a few hundred dollars, a relatively small price tag for malware.

securelist EN 2022 RedLine YouTube stealer
Undermining Microsoft Teams Security by Mining Tokens https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens
15/09/2022 17:40:33
QRCode
archive.org
thumbnail

In August 2022, the Vectra Protect team identified an attack path that enables malicious actors with file system access to steal credentials for any Microsoft Teams user who is signed in.

Vectra EN 2022 token teams Microsoft credentials steal
How Human Traffickers Force Victims Into Cyberscamming https://www.propublica.org/article/human-traffickers-force-victims-into-cyberscamming
14/09/2022 18:13:28
QRCode
archive.org
thumbnail

Traffickers in Southeast Asia force thousands of people into perpetrating cyberscams that defraud Americans out of millions of dollars. Here’s how they do it.

Propublica EN 2022 traffickers scams victims
Charming Kitten: “Can We Have A Meeting?” https://blog.certfa.com/posts/charming-kitten-can-we-wave-a-meeting/
14/09/2022 14:37:07
QRCode
archive.org
thumbnail

Our recent investigation at Certfa Lab, the APT42 has been running multiple phishing campaigns since late 2021 and some of them are ongoing and still active.

certfa EN 2022 Charming-Kitten APT Iran Phishing Espionage-Operations Sophisticated-Attacks investigation
Breach of software maker used to backdoor as many as 200,000 servers https://arstechnica.com/information-technology/2022/09/breach-of-software-maker-used-to-backdoor-as-many-as-200000-servers/
14/09/2022 11:45:37
QRCode
archive.org
thumbnail

Hack of FishPig distribution server used to install Rekoobe on customer systems.

arstechnica EN 2022 FishPig Rekoobe
New Wave of Espionage Activity Targets Asian Governments https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/espionage-asia-governments
13/09/2022 20:06:10
QRCode
archive.org
thumbnail

Governments and state-owned organizations are the latest targets of a well-established threat actor.
A distinct group of espionage attackers who were formerly associated with the ShadowPad remote access Trojan (RAT) has adopted a new, diverse toolset to mount an ongoing campaign against a range of government and state-owned organizations in a number of Asian countries. The attacks, which have been underway since at least early 2021, appear to have intelligence gathering as their main goal.

symantec-enterprise-blogs EN 2022 ShadowPad RAT
Bumblebee Returns with New Infection Technique https://blog.cyble.com/2022/09/07/bumblebee-returns-with-new-infection-technique/
13/09/2022 19:59:47
QRCode
archive.org
thumbnail

Delivers Payload Using Post Exploitation Framework
During our routine threat-hunting exercise, Cyble Research & Intelligence Labs (CRIL) came across a Twitter post wherein a researcher mentioned an interesting infection chain of the Bumblebee loader malware being distributed via spam campaigns.

Bumblebee is a replacement for the BazarLoader malware, which acts as a downloader and delivers known attack frameworks and open-source tools such as Cobalt Strike, Shellcode, Sliver, Meterpreter, etc. It also downloads other types of malware such as ransomware, trojans, etc.

cyble EN 2022 Bumblebee Analysis
Lampion Trojan Utilizes New Delivery through Cloud-Based Sharing https://cofense.com/blog/lampion-trojan-utilizes-new-delivery-through-cloud-based-sharing
12/09/2022 14:05:35
QRCode
archive.org
thumbnail

Analysts at the Cofense Phishing Defense Center (PDC) have recently analyzed an email asking users to download a “Proof of Payment” as well as other documents. While it is important to never click on the link(s) or download the attachment(s) of any suspicious email, if the recipient interacts with the link, it downloaded the malware Lampion.

cofense EN 2022 Phishing Lampion malware IoCs
Dead or Alive? An Emotet Story https://thedfirreport.com/2022/09/12/dead-or-alive-an-emotet-story/
12/09/2022 14:03:00
QRCode
archive.org
thumbnail

In this intrusion from May 2022, we observed a domain-wide compromise that started from a malware ridden Excel document containing the never-dying malware, Emotet. The post-exploitation started ver…

thedfirreport EN 2022 Emotet Excel Analysis IOCs
The Curious Case of “Monti” Ransomware: A Real-World Doppelganger https://blogs.blackberry.com/en/2022/09/the-curious-case-of-monti-ransomware-a-real-world-doppelganger
11/09/2022 23:26:57
QRCode
archive.org
thumbnail

While working a recent ransomware incident, BlackBerry identified a group whose name and TTPs mimicked the long-standing, popular ransomware crew Conti. Furthermore, the encryptor payload used in the attack was taken from the original group and modified for use with this new group. Who was this doppelganger?

blackberry EN 2022 Monti Conti ransomware
Inside Fog Data Science, the Secretive Company Selling Mass Surveillance to Local Police https://www.eff.org/deeplinks/2022/08/inside-fog-data-science-secretive-company-selling-mass-surveillance-local-police
11/09/2022 10:58:48
QRCode
archive.org
thumbnail

A data broker has been selling raw location data about individual people to federal, state, and local law enforcement agencies, EFF has learned. This personal data isn’t gathered from cell phone towers or tech giants like Google — it’s obtained by the broker via thousands of different apps on Android and iOS app stores as part of the larger location data marketplace.

EFF EN 2022 Fog-Data-Science surveillance broker data data-broker privacy police
page 17 / 41
4834 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn