Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 222 / 251
RedLine spreads through ads for cheats and cracks on YouTube https://securelist.com/self-spreading-stealer-attacks-gamers-via-youtube/107407/
15/09/2022 21:14:03
QRCode
archive.org
thumbnail

An unusual malicious bundle (a collection of malicious programs distributed in the form of a single installation file, self-extracting archive or other file with installer-type functionality) recently caught our eye. Its main payload is the widespread RedLine stealer. Discovered in March 2020, RedLine is currently one of the most common Trojans used to steal passwords and credentials from browsers, FTP clients and desktop messengers. It is openly available on underground hacker forums for just a few hundred dollars, a relatively small price tag for malware.

securelist EN 2022 RedLine YouTube stealer
Undermining Microsoft Teams Security by Mining Tokens https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens
15/09/2022 17:40:33
QRCode
archive.org
thumbnail

In August 2022, the Vectra Protect team identified an attack path that enables malicious actors with file system access to steal credentials for any Microsoft Teams user who is signed in.

Vectra EN 2022 token teams Microsoft credentials steal
How Human Traffickers Force Victims Into Cyberscamming https://www.propublica.org/article/human-traffickers-force-victims-into-cyberscamming
14/09/2022 18:13:28
QRCode
archive.org
thumbnail

Traffickers in Southeast Asia force thousands of people into perpetrating cyberscams that defraud Americans out of millions of dollars. Here’s how they do it.

Propublica EN 2022 traffickers scams victims
Charming Kitten: “Can We Have A Meeting?” https://blog.certfa.com/posts/charming-kitten-can-we-wave-a-meeting/
14/09/2022 14:37:07
QRCode
archive.org
thumbnail

Our recent investigation at Certfa Lab, the APT42 has been running multiple phishing campaigns since late 2021 and some of them are ongoing and still active.

certfa EN 2022 Charming-Kitten APT Iran Phishing Espionage-Operations Sophisticated-Attacks investigation
Breach of software maker used to backdoor as many as 200,000 servers https://arstechnica.com/information-technology/2022/09/breach-of-software-maker-used-to-backdoor-as-many-as-200000-servers/
14/09/2022 11:45:37
QRCode
archive.org
thumbnail

Hack of FishPig distribution server used to install Rekoobe on customer systems.

arstechnica EN 2022 FishPig Rekoobe
New Wave of Espionage Activity Targets Asian Governments https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/espionage-asia-governments
13/09/2022 20:06:10
QRCode
archive.org
thumbnail

Governments and state-owned organizations are the latest targets of a well-established threat actor.
A distinct group of espionage attackers who were formerly associated with the ShadowPad remote access Trojan (RAT) has adopted a new, diverse toolset to mount an ongoing campaign against a range of government and state-owned organizations in a number of Asian countries. The attacks, which have been underway since at least early 2021, appear to have intelligence gathering as their main goal.

symantec-enterprise-blogs EN 2022 ShadowPad RAT
Bumblebee Returns with New Infection Technique https://blog.cyble.com/2022/09/07/bumblebee-returns-with-new-infection-technique/
13/09/2022 19:59:47
QRCode
archive.org
thumbnail

Delivers Payload Using Post Exploitation Framework
During our routine threat-hunting exercise, Cyble Research & Intelligence Labs (CRIL) came across a Twitter post wherein a researcher mentioned an interesting infection chain of the Bumblebee loader malware being distributed via spam campaigns.

Bumblebee is a replacement for the BazarLoader malware, which acts as a downloader and delivers known attack frameworks and open-source tools such as Cobalt Strike, Shellcode, Sliver, Meterpreter, etc. It also downloads other types of malware such as ransomware, trojans, etc.

cyble EN 2022 Bumblebee Analysis
Lampion Trojan Utilizes New Delivery through Cloud-Based Sharing https://cofense.com/blog/lampion-trojan-utilizes-new-delivery-through-cloud-based-sharing
12/09/2022 14:05:35
QRCode
archive.org
thumbnail

Analysts at the Cofense Phishing Defense Center (PDC) have recently analyzed an email asking users to download a “Proof of Payment” as well as other documents. While it is important to never click on the link(s) or download the attachment(s) of any suspicious email, if the recipient interacts with the link, it downloaded the malware Lampion.

cofense EN 2022 Phishing Lampion malware IoCs
Dead or Alive? An Emotet Story https://thedfirreport.com/2022/09/12/dead-or-alive-an-emotet-story/
12/09/2022 14:03:00
QRCode
archive.org
thumbnail

In this intrusion from May 2022, we observed a domain-wide compromise that started from a malware ridden Excel document containing the never-dying malware, Emotet. The post-exploitation started ver…

thedfirreport EN 2022 Emotet Excel Analysis IOCs
The Curious Case of “Monti” Ransomware: A Real-World Doppelganger https://blogs.blackberry.com/en/2022/09/the-curious-case-of-monti-ransomware-a-real-world-doppelganger
11/09/2022 23:26:57
QRCode
archive.org
thumbnail

While working a recent ransomware incident, BlackBerry identified a group whose name and TTPs mimicked the long-standing, popular ransomware crew Conti. Furthermore, the encryptor payload used in the attack was taken from the original group and modified for use with this new group. Who was this doppelganger?

blackberry EN 2022 Monti Conti ransomware
Inside Fog Data Science, the Secretive Company Selling Mass Surveillance to Local Police https://www.eff.org/deeplinks/2022/08/inside-fog-data-science-secretive-company-selling-mass-surveillance-local-police
11/09/2022 10:58:48
QRCode
archive.org
thumbnail

A data broker has been selling raw location data about individual people to federal, state, and local law enforcement agencies, EFF has learned. This personal data isn’t gathered from cell phone towers or tech giants like Google — it’s obtained by the broker via thousands of different apps on Android and iOS app stores as part of the larger location data marketplace.

EFF EN 2022 Fog-Data-Science surveillance broker data data-broker privacy police
Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against
11/09/2022 10:49:17
QRCode
archive.org
thumbnail

Mandiant attributes the ransomware attack against the Albanian government network in July of 2022 to an Iranian threat actor.

Mandiant EN 2022 report Albania Iran ransomware ROADSWEEP CHIMNEYSWEEP Attribution
Corte dei conti e l'hacker che ha violato account WhatsApp https://www.giornalettismo.com/corte-dei-conti-e-lhacker-whatsapp-violato/
10/09/2022 11:40:14
QRCode
archive.org
thumbnail

La violazione dell'account WhatsApp di un magistrato della Corte dei Conti ha un effetto domino: hacker hanno accesso a diverse informazioni

giornalettismo IT 2022 Corte-dei-conti WhatsApp Phishing
Campagne de phishing Instagram : la certification sur les réseaux sociaux, ou le nouveau piège des hackers https://www.vadesecure.com/fr/blog/campagne-de-phishing-instagram
10/09/2022 11:04:44
QRCode
archive.org
thumbnail

Une campagne de phishing d’Instagram cible spécifiquement les utilisateurs de la plateforme afin de subtiliser leurs informations personnelles et identifiants de compte.

vadesecure FR 2022 phishing Instagram certification scam
Documentos portugueses da NATO apanhados à venda na darkweb https://www.dn.pt/sociedade/documentos-portugueses-da-nato-apanhados-a-venda-na-darkweb--15146671.html
10/09/2022 10:55:41
QRCode
archive.org
thumbnail

Google Translate
Portuguese NATO documents caught for sale on the darkweb
The extent of the damage is still being investigated by the National Security Office, but suspicions of the breach of security that facilitated the exfiltration of secret NATO documents fall on EMGFA, secret military and MDN computers.

DiarioDeNoticias PT 2022 EMGFA CEMGFA NATO documents Portugal darkweb
Microsoft investigates Iranian attacks against the Albanian government https://www.microsoft.com/security/blog/2022/09/08/microsoft-investigates-iranian-attacks-against-the-albanian-government/
09/09/2022 16:03:03
QRCode
archive.org
thumbnail

Shortly after the destructive cyberattacks on the Albanian government in mid-July, the Microsoft Detection and Response Team (DART) was engaged to lead an investigation into the attacks.

microsoft EN 2022 investigation DART EUROPIUM Albania Iran attack
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection https://www.sentinelone.com/labs/crimeware-trends-ransomware-developers-turn-to-intermittent-encryption-to-evade-detection/
09/09/2022 15:45:06
QRCode
archive.org
thumbnail

Partially encrypting victims' files improves ransomware speed and aids evasion. First seen in LockFile, the technique is now being widely adopted.

SentinelOne EN 2022 LockFile ransomware technique speed Partially evasion
L'Albanie accuse l'Iran d'une cyberattaque qui a paralysé ses services publics https://www.usine-digitale.fr/article/l-albanie-accuse-l-iran-d-une-cyberattaque-qui-a-paralyse-ses-services-publics.N2041972
09/09/2022 15:43:53
QRCode
archive.org
thumbnail

L'Albanie a décidé de rompre ses relations diplomatiques avec l'Iran, a annoncé le Premier ministre albanais Edi Rama dans une allocution télévisée le 7 septembre. Il l'accuse d'avoir engagé "quatre groupes pour monter une cyberattaque" qui a paralysé les services gouvernementaux le 15 juillet dernier.

usine-digitale FR 2022 Albanie Iran cyberattaque diplomatie
Conti vs. Monti: A Reinvention or Just a Simple Rebranding? https://intel471.com/blog/conti-vs-monti-a-reinvention-or-just-a-simple-rebranding
09/09/2022 15:36:11
QRCode
archive.org
thumbnail

Whether Conti has rebranded as Monti in a bid to mock the former strain or it is just another new ransomware variant on the block.

intel471 EN 2022 Conti Monti rebranding ransomware variant
Centre hospitalier Sud-Francilien : ce que dit l’autopsie de la cyberattaque https://www.lemagit.fr/actualites/252524725/Centre-hospitalier-Sud-Francilien-ce-que-dit-lautopsie-de-la-cyberattaque
09/09/2022 15:34:34
QRCode
archive.org
thumbnail

Selon les premiers éléments de l’enquête technique conduite par l’Anssi, l’assaillant accédait déjà au système d’information du CHSF de Corbeil-Essonnes, via l’accès VPN, 10 jours avant de déclencher le ransomware.

lemagit FR 2022 ransomware hôpital santé CHSF Corbeil-Essonnes LockBit LockBit-3.0 postmortem
page 222 / 251
5010 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn