Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 206 / 238
How 3 hours of inaction from Amazon cost cryptocurrency holders $235,000 https://arstechnica.com/information-technology/2022/09/how-3-hours-of-inaction-from-amazon-cost-cryptocurrency-holders-235000/
05/10/2022 23:16:32
QRCode
archive.org
thumbnail

For 2nd time in 4 years, Amazon loses control of its IP space in BGP hijacking.

arstechnica EN 2022 BGP cryptocurrency hijacking Amazon
Remove All The Callbacks – BlackByte Ransomware Disables EDR Via RTCore64.sys Abuse https://news.sophos.com/en-us/2022/10/04/blackbyte-ransomware-returns/
05/10/2022 23:14:04
QRCode
archive.org
thumbnail

A fresh exploration of the malware uncovers a new tactic for bypassing security products by abusing a known driver vulnerability

sophos EN 2022 BlackByte Ransomware Disables EDR RTCore64.sys
MAR-10365227-3.v1 China Chopper Webshells https://www.cisa.gov/uscert/ncas/analysis-reports/ar22-277c
05/10/2022 22:55:17
QRCode
archive.org

CISA analyzed 15 files associated with China Chopper malware. The files are modified Offline Address Book (OAB) Virtual Directory (VD) configuration files for Microsoft Exchange servers. The files have been modified with a variant of the China Chopper webshell. The webshells allow an attacker to remotely access the server and execute arbitrary code on the system(s).referenced in this bulletin or otherwise.

uscert csirt cert en 2022 CISA China Chopper malware Analysis
MAR-10365227-2.v1 HyperBro https://www.cisa.gov/uscert/ncas/analysis-reports/ar22-277b
05/10/2022 22:41:44
QRCode
archive.org

CISA analyzed 4 files associated with HyperBro malware. The files creates a backdoor program that is capable of uploading and downloading files to and from the system. The RAT is also capable of logging keystrokes and executing commands on the system.

uscert csirt cert CISA HyperBro malware Analysis RAT EN 2022
PHP Supply Chain Attack on Composer https://blog.sonarsource.com/php-supply-chain-attack-on-composer/
05/10/2022 22:32:46
QRCode
archive.org
thumbnail

We recently discovered a vulnerability in Composer, the main package manager for PHP, and were able to use it to take over the central repository, packagist.org.

sonarsource EN 2022 php supplychain supply-chain packagist.org
Bumblebee: increasing its capacity and evolving its TTPs https://research.checkpoint.com/2022/bumblebee-increasing-its-capacity-and-evolving-its-ttps/
04/10/2022 19:49:59
QRCode
archive.org
thumbnail

The spring of 2022 saw a spike in activity of Bumblebee loader, a recent threat that has garnered a lot of attention due to its many links to several well-known malware families.

checkpoint EN 2022 Bumblebee loader malware Analysis
Malicious Tor Browser spreads through YouTube https://securelist.com/onionpoison-infected-tor-browser-installer-youtube/107627/
04/10/2022 16:49:03
QRCode
archive.org
thumbnail

Kaspersky researchers detected OnionPoison campaign: malicious Tor Browser installer spreading through a popular YouTube channel and targeting Chinese users.

securelist EN 2022 Kaspersky Malware-Descriptions Onion Social-engineering Targeted-attacks TOR YouTube Chine
A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion – NCC Group Research https://research.nccgroup.com/2022/09/30/a-glimpse-into-the-shadowy-realm-of-a-chinese-apt-detailed-analysis-of-a-shadowpad-intrusion/
03/10/2022 21:21:19
QRCode
archive.org
thumbnail

This post explores some of the TTPs employed by a threat actor who was observed deploying ShadowPad during an incident response engagement.

nccgroup EN 2022 TTP research ShadowPad CVE-2022-29464 secur32.dll
DeftTorero TTPs in 2019–2021 https://securelist.com/defttorero-tactics-techniques-and-procedures/107610/
03/10/2022 20:15:11
QRCode
archive.org
thumbnail

Earlier this year, we started hunting for possible new DeftTorero (aka Lebanese Cedar, Volatile Cedar) artifacts. This threat actor is believed to originate from the Middle East and was publicly disclosed to the cybersecurity community as early as 2015. Notably, no other intelligence was shared until 2021, which led us to speculate on a possible shift by the threat actor to more fileless/LOLBINS techniques, and the use of known/common offensive tools publicly available on the internet that allows them to blend in.

securelist EN 2022 DeftTorero LebaneseCedar Lebanon webshell
Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors | Mandiant https://www.mandiant.com/resources/blog/esxi-hypervisors-malware-persistence
03/10/2022 20:11:54
QRCode
archive.org
thumbnail

Earlier this year, Mandiant identified a novel malware ecosystem impacting VMware ESXi, Linux vCenter servers, and Windows virtual machines that enables a threat actor to take the following actions:

1) Maintain persistent administrative access to the hypervisor
2) Send commands to the hypervisor that will be routed to the guest VM for execution
3) Transfer files between the ESXi hypervisor and guest machines running beneath it
4) Tamper with logging services on the hypervisor

mandiant EN 2022 esxi hypervisors malware BadVIB(E)s 0-day
Lazarus hackers abuse Dell driver bug using new FudModule rootkit https://www.bleepingcomputer.com/news/security/lazarus-hackers-abuse-dell-driver-bug-using-new-fudmodule-rootkit/
02/10/2022 12:36:22
QRCode
archive.org
thumbnail

The notorious North Korean hacking group 'Lazarus' was seen installing a Windows rootkit that abuses a Dell hardware driver in a Bring Your Own Vulnerable Driver attack.

bleepingcomputer EN 2022 CVE-2021-21551 BYOVD Dell Driver Lazarus-Group Malware North-Korea Rootkit
Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium https://www.welivesecurity.com/2022/09/30/amazon-themed-campaigns-lazarus-netherlands-belgium/
02/10/2022 12:32:50
QRCode
archive.org
thumbnail

ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers.

welivesecurity EN 2022 Lazarus report campaign Netherlands Belgium spearphishing
ProxyNotShell— the story of the claimed zero days in Microsoft Exchange https://doublepulsar.com/proxynotshell-the-story-of-the-claimed-zero-day-in-microsoft-exchange-5c63d963a9e9
02/10/2022 10:20:25
QRCode
archive.org

Yesterday, cybersecurity vendor GTSC Cyber Security dropped a blog saying they had detected exploitation of a new Microsoft Exchange zero…

ProxyNotShell doublepulsar EN 2022 Medium KevinBeaumont ProxyNotShell CVE-2022–41040 CVE-2022–41082
Logiciels espions et surveillance : un rapport de l’ONU met en garde contre les menaces croissantes pour la vie privée et les droits de l’homme https://www.ohchr.org/fr/press-releases/2022/09/spyware-and-surveillance-threats-privacy-and-human-rights-growing-un-report
02/10/2022 10:02:48
QRCode
archive.org

Le droit à la vie privée est de plus en plus menacé par l’utilisation de technologies numériques modernes en réseau, dont les caractéristiques en font de formidables outils de surveillance, de contrôle et d’oppression, selon un nouveau rapport de l’ONU. Il est donc essentiel que ces technologies soient encadrées par une réglementation efficace reposant sur le droit international des droits de l’homme et les normes applicables en la matière
PDF Document link

OHCHR ONU FR 2022 surveillance espion spyware Pegasus rapport
Under the hood of a Doppelgänger https://www.qurium.org/alerts/under-the-hood-of-a-doppelganger/
02/10/2022 10:00:22
QRCode
archive.org

This work is the result of a collaboration with EU DisinfoLab an independent non-profit organization focused on tackling sophisticated disinformation campaigns targeting the EU.

EU DisinfoLab has during the past three months been investigating a large disinformation campaign targeting western audience with pro-Russian propaganda. While our partner has focused on the actual disinformation being spread, Qurium has looked into the technical infrastructure in use to better understand how the campaign has been setup and operated.

The complete report from EU Disinfo Lab can be found here: Doppelganger.

Below follows the results of Qurium’s digital forensics investigation and a list of more than 50 domains used in the disinformation campaign.

qurium EUDisinfoLab EU NE 2022 report Doppelgänger propaganda disifnormation campaign
Ukraine warns of 'massive cyberattacks' coming from Russia on critical infrastructure sites https://www.cyberscoop.com/ukrainians-warn-of-massive-cyberattacks/
02/10/2022 09:53:51
QRCode
archive.org
thumbnail

The Russian government is planning “massive cyberattacks” against Ukrainian critical infrastructure facilities to “increase the effect of missile strikes on electrical supply facilities,” the Ukrainian government said Monday.

cyberscoop EN 2022 massive cyberattacks geopolitics Russia-Ukraine-war Ukraine government threat infrastructures
Mystery Hackers Are ‘Hyperjacking’ Targets for Insidious Spying https://www.wired.com/story/hyperjacking-vmware-mandiant/
01/10/2022 01:07:10
QRCode
archive.org
thumbnail

For decades, security researchers warned about techniques for hijacking virtualization software. Now one group has put them into practice.

wired 2022 EN hacking virtualization Hyperjacking malware Blue-Pill Mandiant
Chaos is a Go-based Swiss army knife of malware https://blog.lumen.com/chaos-is-a-go-based-swiss-army-knife-of-malware/
01/10/2022 01:03:28
QRCode
archive.org
thumbnail

Black Lotus Labs, the threat intelligence arm of Lumen Technologies, recently uncovered a multifunctional Go-based malware developed for Windows and Linux

lumen EN 2022 Chaos Go malware Windows Linux IoCs
Warning: New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server https://gteltsc.vn/blog/warning-new-attack-campaign-utilized-a-new-0day-rce-vulnerability-on-microsoft-exchange-server-12715.html
30/09/2022 09:27:43
QRCode
archive.org
thumbnail

Circa the beginning of August 2022, while doing security monitoring & incident response services, GTSC SOC team discovered that a critical infrastructure was being attacked, specifically to their Microsoft Exchange application. During the investigation, GTSC Blue Team experts determined that the attack utilized an unpublished Exchange security vulnerability, i.e., a 0-day vulnerability, thus immediately came up with a temporary containment plan.

gteltsc.vn EN 2022 Microsoft-Exchange Exchange 0-day RCE vulnerability campaign IoCs
Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/witchetty-steganography-espionage
30/09/2022 09:08:07
QRCode
archive.org
thumbnail

Espionage group begins using new backdoor that leverages rarely seen steganography technique.

symantec EN 2022 Witchetty Espionage backdoor steganography LookingFrog IoCs
page 206 / 238
4760 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio