Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 199 / 251
A Backdoor with Smart Screenshot Capability https://isc.sans.edu/diary/rss/29534
09/02/2023 18:27:30
QRCode
archive.org

Today, everything is “smart” or “intelligent”. We have smartphones, smart cars, smart doorbells, etc. Being "smart" means performing actions depending on the context, the environment, or user actions.

For a while, backdoors and trojans have implemented screenshot capabilities. From an attacker’s point of view, it’s interesting to “see” what’s displayed on the victim’s computer.

sans EN 2023 python backdoor Screenshot
HTML Smuggling: The Hidden Threat in Your Inbox https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/html-smuggling-the-hidden-threat-in-your-inbox/
09/02/2023 18:21:15
QRCode
archive.org
thumbnail

Last October, Trustwave SpiderLabs blogged about the use and prevalence of HTML email attachments to deliver malware and phishing for credentials.

trustwave EN 2023 HTML Threat SpiderLabs email phishing malware
Enigma Stealer Targets Cryptocurrency Industry with Fake Jobs https://www.trendmicro.com/en_us/research/23/b/enigma-stealer-targets-cryptocurrency-industry-with-fake-jobs.html
09/02/2023 18:11:58
QRCode
archive.org
thumbnail

We discovered an active campaign targeting Eastern Europeans in the cryptocurrency industry using fake job lures.

trendmicro EN 2023 malware endpoints research Cryptocurrency campaign Fake Jobs
2023 Crypto Crime Trends: Illicit Cryptocurrency Volumes Reach All-Time Highs Amid Surge in Sanctions Designations and Hacking https://blog.chainalysis.com/reports/2023-crypto-crime-report-introduction/
09/02/2023 10:43:04
QRCode
archive.org
thumbnail

Every year, we publish our estimates of illicit cryptocurrency activity to demonstrate the power of blockchains’ transparency – these kinds of estimates aren’t possible in traditional finance – and to teach investigators and compliance professionals about the latest trends in cryptocurrency-related crime that they need to know about. What could those estimates look like in a year like 2022? Last year was one of the most tumultuous in cryptocurrency history, with several large firms imploding, including Celsius, Three Arrows Capital, FTX, and others — some amid allegations of fraud.

chainalysis 2023 EN Cryptocurrency Volumes Report
Bitwarden password vaults targeted in Google ads phishing attack https://www.bleepingcomputer.com/news/security/bitwarden-password-vaults-targeted-in-google-ads-phishing-attack/
08/02/2023 17:03:24
QRCode
archive.org
thumbnail

Bitwarden and other password managers are being targeted in Google ads phishing campaigns to steal users' password vault credentials.

bleepingcomputer EN 2023 1Password Bitwarden GoogleAds googleads MFA Multi-Factor-Authentication Password-Manager Passwords Phishing
OpenSSL fixes High Severity data-stealing bug – patch now! https://nakedsecurity.sophos.com/2023/02/08/openssl-fixes-high-severity-data-stealing-bug-patch-now/
08/02/2023 10:18:51
QRCode
archive.org
thumbnail

7 memory mismanagements and a timing attack. We explain all the jargon bug terminology in plain English…

nakedsecurity EN 2023 OpenSSL CVE-2022-4450 CVE-2023-0286 CVE-2023-0215 cryptography vulnerability cryptography memory-mismanagement openssl timing-attack
Russia-linked Lockbit ransomware hacking gang threatens to publish Royal Mail data stolen in cyber attack https://www.telegraph.co.uk/business/2023/02/07/russia-linked-lockbit-ransomware-hacking-gang-threatens-publish/
07/02/2023 20:20:08
QRCode
archive.org
thumbnail

Ransomware gang says it will share the stolen information in a matter of days

telegraph EN 2023 Royal-Mail Lockbit ransomware stolen
Sliver Malware With BYOVD Distributed Through Sunlogin Vulnerability Exploitations - ASEC BLOG https://asec.ahnlab.com/en/47088/
07/02/2023 20:18:03
QRCode
archive.org
thumbnail

Sliver is an open-source penetration testing tool developed in the Go programming language. Cobalt Strike and Metasploit are major examples of penetration testing tools used by many threat actors, and various attack cases involving these tools have been covered here on the ASEC blog. Recently, there have been cases of threat actors using Sliver in addition to Cobalt Strike and Metasploit.

The ASEC (AhnLab Security Emergency response Center) analysis team is monitoring attacks against systems with either unpatched vulnerabilities or misconfigured settings. During this process, we have recently discovered a Sliver backdoor being installed through what is presumed to be vulnerability exploitation on certain software. Not only did threat actors use the Sliver backdoor, but they also used the BYOVD (Bring Your Own Vulnerable Driver) malware to incapacitate security products and install reverse shells.

asec.ahnlab EN 2023 Sliver Sunlogin analysis
Iran responsible for Charlie Hebdo attacks https://www.microsoft.com/en-us/security/business/security-insider/uncategorized/iran-responsible-for-charlie-hebdo-attacks/
06/02/2023 19:44:22
QRCode
archive.org
thumbnail

Today, Microsoft’s Digital Threat Analysis Center (DTAC) is attributing a recent influence operation targeting the satirical French magazine Charlie Hebdo

microsoft DTAC EN 2023 attribution Iran influence France CharlieHebdo EmennetPasargad
Cyberattaque contre l’Université de Zurich: des accès aux serveurs vendus sur le darkweb (update) https://www.ictjournal.ch/news/2023-02-06/cyberattaque-contre-luniversite-de-zurich-des-acces-aux-serveurs-vendus-sur-le
06/02/2023 19:04:47
QRCode
archive.org
thumbnail

Des cybercriminels ont pris l'Université de Zurich pour cible.

ictjournal FR CH 2023 Cyberattaque Zurich Université
Onenote Malware: Classification and Personal Notes https://marcoramilli.com/2023/02/04/onenote-malware-classification-and-personal-notes/
06/02/2023 18:59:12
QRCode
archive.org
thumbnail

During the past 4 months Microsoft Onenote file format has been (ab)used as Malware carrier by different criminal groups. While the main infection vector is still on eMail side - so nothing really relevant to write on - the used techniques, the templates and the implemented code to inoculate Malware changed a lot. So it…

marcoramilli EN 2023 OneNote abused technical Malware
Detecting OneNote Abuse https://labs.withsecure.com/publications/detecting-onenote-abuse
06/02/2023 18:58:22
QRCode
archive.org
thumbnail

OneNote is a software part of the Office suite, commonly used within most organisations for note-keeping, task management and more. In the last year, OneNote gained more attention from a security perspective, mostly thanks to the research paper published by Emeric Nasi.

withsecure 2023 EN Attack-detection OneNote Office LNK
No Macro? No Worries. VSTO Being Weaponized by Threat Actors https://www.deepinstinct.com/blog/no-macro-no-worries-vsto-being-weaponized-by-threat-actors
06/02/2023 18:54:47
QRCode
archive.org
thumbnail

A software development toolset, VSTO is available in Microsoft’s Visual Studio IDE. It enables Office Add-In’s (a type of Office application extension) to be developed in .NET and also allows for Office documents to be created that will deliver and execute these Add-In’s.

deepinstinct EN 2023 Weaponized VSTO Microsoft VisualStudio IDE Add-In
Cybercrime: Les hackers avaient aussi sévi en Suisse https://www.20min.ch/fr/story/les-hackers-avaient-aussi-sevi-en-suisse-240666892221
05/02/2023 23:11:49
QRCode
archive.org
thumbnail

Les autorités américaines ont récemment démantelé Hive, un des principaux réseaux mondiaux d’attaques au rançongiciel. Il avait notamment ciblé le groupe automobile Emil Frey et les magasins MediaMarkt.

20min FR 2023 Hive Suisse CH Mediamarkt EmilFrey
Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide https://www.bleepingcomputer.com/news/security/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide/
05/02/2023 12:57:29
QRCode
archive.org
thumbnail

Admins, hosting providers, and the French Computer Emergency Response Team (CERT-FR) warn that attackers actively target VMware ESXi servers unpatched against a two-year-old remote code execution vulnerability to deploy ransomware.

bleepingcomputer EN 2023 ESXiArgs Nevada-Ransomware Ransomware VMware Vmware-ESXi
Ransomware : des centaines de serveurs VMware ESXi pris dans une vaste campagne https://www.lemagit.fr/actualites/365530273/Ransomware-vaste-campagne-contre-les-serveurs-VMware-ESXi
05/02/2023 10:52:27
QRCode
archive.org
thumbnail

Déclenchée ce vendredi 3 février, une vaste campagne d’infection avec ransomware frappe les serveurs VMware ESXi à travers le monde. La France ne fait pas exception. L’échelle suggère une opération automatisée.

lemagit FR 2023 VMware ESXiArgs ESXi VMware infection France
Campagne d’exploitation d’une vulnérabilité affectant VMware ESXi https://www.cert.ssi.gouv.fr/alerte/CERTFR-2023-ALE-015/
05/02/2023 10:51:57
QRCode
archive.org

Le 03 février 2023, le CERT-FR a pris connaissance de campagnes d'attaque ciblant les hyperviseurs VMware ESXi dans le but d'y déployer un rançongiciel.

Dans l'état actuel des investigations, ces campagnes d'attaque semblent exploiter la vulnérabilité CVE-2021-21974, pour laquelle un correctif est disponible depuis le 23 février 2021. Cette vulnérabilité affecte le service Service Location Protocol (SLP) et permet à un attaquant de réaliser une exploitation de code arbitraire à distance.

Les systèmes actuellement visés seraient des hyperviseurs ESXi en version 6.x et antérieures à 6.7.

CERT-FR FR 2023 VMware ESXi ESXiArgs Advisory
Un ransomware attaque les clients ESXi des hébergeurs français (MAJ) https://www.lemondeinformatique.fr/actualites/lire-un-ransomware-attaque-les-clients-esxi-des-hebergeurs-francais-maj-89437.html
05/02/2023 10:51:30
QRCode
archive.org
thumbnail

Plusieurs alertes ont été lancées par différents hébergeurs sur une campagne d'attaque par ransomware concernant des serveurs basés sur l'hyperviseur ESXi de VMware. OVH a dans un premier temps identifié le rançongiciel Nevada dans un blog avant de corriger son message.

lemondeinformatique FR 2023 ESXi OVH rançongiciel ESXiArgs
Exploitation of GoAnywhere MFT zero-day vulnerability https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/
05/02/2023 10:47:52
QRCode
archive.org
thumbnail

On Thursday, February 2, 2023, security reporter Brian Krebs published a warning on Mastodon about an actively exploited zero-day vulnerability affecting on-premise instances of Fortra’s GoAnywhere MFT managed file transfer solution. Fortra (formerly HelpSystems) evidently published an advisory on February 1 behind authentication; there is no publicly accessible advisory.

rapid7 EN 2023 GoAnywhere BrianKrebs Fortra HelpSystems MFT
https://infosec.exchange/@briankrebs/109795710941843934?s=09 https://infosec.exchange/@briankrebs/109795710941843934?s=09
05/02/2023 10:47:36
QRCode
archive.org
thumbnail

GoAnywhere MFT, a popular file transfer application, is warning about a zero-day remote code injection exploit. The company said it has temporarily implemented a service outage in response.

GoAnywhere MFT 0day 0-day BrianKrebs exploit
page 199 / 251
5001 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn