Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 178 / 208
4148 résultats taggé EN  ✕
Apple Fixes Exploited Zero-Day With iOS 16.1 Patch | SecurityWeek.Com https://www.securityweek.com/apple-fixes-exploited-zero-day-ios-161-patch
25/10/2022 09:21:25
QRCode
archive.org

Apple confirms the active exploitation of CVE-2022-42827, warning in a barebones advisory that the flaw exposes iPhones and iPads to arbitrary code execution attacks.

securityweek EN 2022 apple CVE-2022-42827 CVE-2022-32894 CVE-2022-32917 ios ipad iphone zero-day exploits in-the-wild
#StopRansomware: Daixin Team https://www.cisa.gov/uscert/ncas/alerts/aa22-294a
24/10/2022 21:52:46
QRCode
archive.org

Actions to take today to mitigate cyber threats from ransomware: • Install updates for operating systems, software, and firmware as soon as they are released. • Require phishing-resistant MFA for as many services as possible. • Train users to recognize and report phishing attempts.

cisa EN 2022 US uscert csirt cert threat ransomware #StopRansomware alert Daixin-Team gang health
Unattributed RomCom Threat Actor Spoofing Popular Apps Now Hits Ukrainian Militaries https://blogs.blackberry.com/en/2022/10/unattributed-romcom-threat-actor-spoofing-popular-apps-now-hits-ukrainian-militaries
24/10/2022 21:48:55
QRCode
archive.org
thumbnail

Threat actor RomCom RAT is now targeting Ukrainian military institutions. Known to deploy spoofed versions of popular software Advanced IP Scanner, once exposed, RomCom RAT switched to PDF Filler, another popular application, which indicates the group behind it is actively developing new capabilities.

blackberry EN 2022 Research Unattributed RomCom Advanced-IP-Scanner RAT
SHA-3 Buffer Overflow https://mouha.be/sha-3-buffer-overflow/
24/10/2022 07:03:47
QRCode
archive.org

Over the past few months, I’ve been coordinating the disclosure of a new vulnerability that I’ve found. Today is the disclosure date, so I am excited that I can finally talk about what I’ve been working on! The vulnerability has been assigned CVE-2022-37454 and bug reports are available for Python, PHP, PyPy, SHA3 for Ruby, and XKCP.

mouha.be EN 2022 CVE-2022-37454 SHA-3 Buffer-Overflow vulnerability XKCP
TommyLeaks and SchoolBoys: Two sides of the same ransomware gang https://www.bleepingcomputer.com/news/security/tommyleaks-and-schoolboys-two-sides-of-the-same-ransomware-gang/
24/10/2022 07:02:48
QRCode
archive.org
thumbnail

Two new extortion gangs named 'TommyLeaks' and 'SchoolBoys' are targeting companies worldwide. However, there is a catch — they are both the same ransomware gang.

bleepingcomputer EN 2022 TommyLeaks SchoolBoys ransomware extortion gang
“Dormant Colors”: Live Campaign With Over 1M Data Stealing Extensions Installed https://guardiosecurity.medium.com/dormant-colors-live-campaign-with-over-1m-data-stealing-extensions-installed-9a9a459b5849
24/10/2022 07:02:14
QRCode
archive.org
thumbnail

The “Dormant Colors” is yet another vast campaign of malicious extensions with millions of active installations worldwide, this time with a color-related theme and full of deception all through the chain. It starts with the trickery malvertising campaign, continues with a crafty novel way to side-load the real malicious code without anyone noticing (until now!), and finally with stealing not only your searches and browsing data, but also affiliation to 10,000 targeted sites — a capability that is easily leveraged for targeted spear phishing, account takeover and credential extraction — all using this powerful network of millions of infected computers worldwide!

guardiosecurity EN 2022 Campaign Data Stealing malicious Extensions browser Chrome Edge
Intelligence Insights: October 2022 https://redcanary.com/blog/intelligence-insights-october-2022/
24/10/2022 07:01:47
QRCode
archive.org
thumbnail

AdSearch ghosts, Qbot returns with new tricks, and PureCrypter loads malware treats.

redcanary EN 2022 trends Insights october2022
Mirai, RAR1Ransom, and GuardMiner – Multiple Malware Campaigns Target VMware Vulnerability https://www.fortinet.com/blog/threat-research/multiple-malware-campaigns-target-vmware-vulnerability
24/10/2022 07:01:03
QRCode
archive.org
thumbnail

n April, VMware patched a vulnerability CVE-2022-22954. It causes server-side template injection because of the lack of sanitization on parameters “deviceUdid” and “devicetype”. It allows attackers to inject a payload and achieve remote code execution on VMware Workspace ONE Access and Identity Manager. FortiGuard Labs published Threat Signal Report about it and also developed IPS signature in April.

fortinet EN 2022 VMware CVE-2022-22954 vulnerability Campaigns deviceUdid devicetype
Operation Jackal: Interpol arrests Black Axe fraud suspects https://www.theregister.com/2022/10/17/interpol_black_axe_fraud/
23/10/2022 11:51:46
QRCode
archive.org
thumbnail

75 collars felt, $1.2m seized in bid to cut off crime network’s financial lifeline

theregister EN 2022 Interpol BalckAxe arrest operation-jackal fraud
Exploited Windows zero-day lets JavaScript files bypass security warnings https://www.bleepingcomputer.com/news/security/exploited-windows-zero-day-lets-javascript-files-bypass-security-warnings/
22/10/2022 18:46:55
QRCode
archive.org
thumbnail

A new Windows zero-day allows threat actors to use malicious JavaScript files to bypass Mark-of-the-Web security warnings. Threat actors are already seen using the zero-day bug in ransomware attacks.

bleepingcomputer EN 2022 JavaScript Mark-of-the-Web Microsoft Ransomware Windows-10 Windows-11
Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1 https://securityintelligence.com/posts/analysis-rce-vulnerability-cobalt-strike/
22/10/2022 18:41:21
QRCode
archive.org
thumbnail

Command & Control (C2) frameworks are a very sensitive component of Red Team operations. Often, a Red Team will be in a highly privileged position on a target’s network, and a compromise of the C2 framework could lead to a compromise of both the red team operator’s system and control over beacons established on a target’s systems. As such, vulnerabilities in C2 frameworks are high priority targets for threat actors and Counterintelligence (CI) operations. On September 20, 2022, HelpSystems published an out-of-band patch for Cobalt Strike which stated that there was potential for Remote Code Execution (RCE).

securityintelligence EN 2022 RCE Cobalt-Strike HelpSystems Vulnerability Analysis
Reverse Engineering the Apple MultiPeer Connectivity Framework https://www.evilsocket.net/2022/10/20/Reverse-Engineering-the-Apple-MultiPeer-Connectivity-Framework/
22/10/2022 18:38:55
QRCode
archive.org
thumbnail

Some time ago I was using Logic Pro to record some of my music and I needed a way to start and stop the recording from an iPhone, so I found about Logic Remote and was quite happy with it.

evilsocket EN 2022 Apple MultiPeer Connectivity Framework mDNS analysis macOS LogicPro network reverse-engineering
How Vice Society got away with a global ransomware spree | Ars Technica https://arstechnica.com/information-technology/2022/10/how-vice-society-got-away-with-a-global-ransomware-spree/
22/10/2022 17:34:03
QRCode
archive.org
thumbnail

Vice Society has a superpower that’s allowed it to quietly thrive: Mediocrity.

arstechnica EN 2022 vice-society mediocrity opinion school
Starlink signals can be reverse-engineered to work like GPS—whether SpaceX likes it or not https://www.technologyreview.com/2022/10/21/1062001/spacex-starlink-signals-reverse-engineered-gps/
22/10/2022 17:26:14
QRCode
archive.org
thumbnail

Elon said no thanks to using his mega-constellation for navigation. Researchers went ahead anyway.

technologyreview MIT 2022 EN Starlink reverse-engineering GPS hacking SpaceX
Archive Sidestepping: Emotet Botnet Pushing Self-Unlocking Password-Protected RAR https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/archive-sidestepping-self-unlocking-password-protected-rar/
22/10/2022 13:11:29
QRCode
archive.org
thumbnail

Trustwave SpiderLabs’ spam traps have identified an increase in threats packaged in password-protected archives with about 96% of these being spammed by the Emotet Botnet. In the first half of 2022, we identified password-protected ZIP files as the third most popular archive format used by cybercriminals to conceal malware.

trustwave en 2022 Emotet botnet self-unlocking rar analysis spam archives
From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind https://www.mandiant.com/resources/blog/rm3-ldr4-ursnif-banking-fraud
21/10/2022 21:32:38
QRCode
archive.org
thumbnail

A new variant of the URSNIF malware, first observed in June 2022, marks an important milestone for the tool. Unlike previous iterations of URSNIF, this new variant, dubbed LDR4, is not a banker, but a generic backdoor (similar to the short-lived SAIGON variant), which may have been purposely built to enable operations like ransomware and data theft extortion. This is a significant shift from the malware’s original purpose to enable banking fraud, but is consistent with the broader threat landscape.

mandiant EN 2022 URSNIF backdoor Banking malware Gozi CUTWAIL spam
Domestic Kitten campaign spying on Iranian citizens with new FurBall malware https://www.welivesecurity.com/2022/10/20/domestic-kitten-campaign-spying-iranian-citizens-furball-malware/
21/10/2022 13:41:28
QRCode
archive.org
thumbnail

ESET researchers recently identified a new version of the Android malware FurBall being used in a Domestic Kitten campaign conducted by the APT-C-50 group. The Domestic Kitten campaign is known to conduct mobile surveillance operations against Iranian citizens and this new FurBall version is no different in its targeting. Since June 2021, it has been distributed as a translation app via a copycat of an Iranian website that provides translated articles, journals, and books. The malicious app was uploaded to VirusTotal where it triggered one of our YARA rules (used to classify and identify malware samples), which gave us the opportunity to analyze it.

WeLiveSecurity EN 2022 FurBall APT-C-50 surveillance Iran research
APT27 - One Year To Exfiltrate Them All: Intrusion In-Depth Analysis https://www.intrinsec.com/apt27-analysis/?cn-reloaded=1
21/10/2022 11:57:51
QRCode
archive.org

During Spring 2022, a company discovered that one of their equipments was communicating with a known command and control server. As a result, the company decided to contact CERT Intrinsec in order to get help to handle the security breach and manage the crisis. CERT Intrinsec gathered information about malicious activities that were discovered on victim’s information system, and past incidents. Our in-depth analysis led us to conclude that an advanced persistent threat dubbed APT27 (a.k.a LuckyMouse, EmissaryPanda) actually compromised the company’s internal network for more than a year by exploiting a public facing application. Our analysis showed that the threat actor managed to compromise five different domains and to gain persistence on many equipments while trying to hide in plain sight. Besides, APT27 operators collected technical and business-related informations and exfiltrate almost three terabytes of data. As investigations went on, we observed tactics, techniques and procedures that had already been documented in papers, but we discovered new ones as well. CERT Intrinsec wanted to share with the community fresh and actionnable threat-intelligence related to APT27. That is why this report presents a timeline of actions taken by the attackers and the tactics, techniques and procedures seen during our incident response. It provides as well a MITRE ATT&CK diagram and several recommendations to follow if you came across such incident, and to prevent them.

intrinsec EN 2022 APT27 Analysis Exfiltrate LuckyMouse, EmissaryPanda Chine
TeamTNT Returns – or Does It? https://www.trendmicro.com/en_us/research/22/j/teamtnt-returns-or-does-it.html
20/10/2022 20:36:13
QRCode
archive.org
thumbnail

TeamTNT is a threat group that was known for primarily targeting the cloud and container environments around the world. This group has been documented to leverage the cloud and container resources by deploying cryptocurrency miners in the victim environments. While the group has been active since 2019 and announced it was quitting in 2021, our recent observations make it appear as if TeamTNT has returned — or a copycat group imitating the routines of TeamTNT — and has been deploying an XMRig cryptocurrency miner. Analysis of the attack patterns and other technical details of the code has also led us to believe that the routines are mimicking TeamTNT’s arsenal, but are likely deployed by another cryptocurrency mining group named WatchDog.

trendmicro 2022 EN TeamTNT WatchDog
SafeBreach Uncovers Fully Undetectable Powershell Backdoor https://www.safebreach.com/resources/blog/safebreach-labs-researchers-uncover-new-fully-undetectable-powershell-backdoor/
19/10/2022 08:30:40
QRCode
archive.org
thumbnail

See how this tool—created by a sophisticated and seemingly unknown threat actor—uses the unique approach of disguising itself as part of a Windows update.

SafeBreach EN 2022 Powershell Undetectable IoCs research
page 178 / 208
4734 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio