Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 3 / 4
61 résultats taggé Linux  ✕
Shikitega - New stealthy malware targeting Linux https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux
07/09/2022 11:11:43
QRCode
archive.org
thumbnail

AT&T Alien Labs has discovered a new malware targeting endpoints and IoT devices that are running Linux operating systems. Shikitega is delivered in a multistage infection chain where each module responds to a part of the payload and downloads and executes the next one. An attacker can gain full control of the system, in addition to the cryptocurrency miner that will be executed and set to persist.

cybersecurity.att.com AT&T-Alien-Labs Shikitega EN 2022 Linux malware Analysis
Linux Kernel Exploit (CVE-2022-32250) with mqueue https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/
26/08/2022 09:57:02
QRCode
archive.org
thumbnail

Netfilter is a framework in the Linux kernel for implementing various networking-related tasks with user-defined handlers. Netfilter provides various functions for packet filtering, network address translation and port translation, and packet logging. Netfilter represents a set of hooks that allow other kernel modules to register callback functions in the kernel’s networking stack.

theori EN 2022 exploit Linux mqueue CVE-2022-32250 Kernel
Vulnerability in Linux containers – investigation and mitigation https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
23/08/2022 16:35:39
QRCode
archive.org
thumbnail

Operating system access controls, that constrain which programs can open which files, have existed for almost as long as computers themselves. Access controls are still widely used and are more flexible and efficient when compared to cryptographically protecting files. Despite the long history, ther

benthamsgaze EN 2022 constrain Linux containers investigation Access controls
Kaspersky report on Luna and Black Basta ransomware https://securelist.com/luna-black-basta-ransomware/106950/
22/07/2022 09:04:18
QRCode
archive.org
thumbnail

This report discusses new ransomware, that targets Windows, Linux and ESXi systems: Luna written in Rust and Black Basta.

securelist EN 2022 Luna Rust BlackBasta Cross-platform-malware Cybercrime Data-Encryption ESXi Linux Malware-Descriptions Malware-Technologies Microsoft-Windows Ransomware Targeted-attacks
[CVE-2022-34918] A crack in the Linux firewall https://www.randorisec.fr/crack-linux-firewall/
21/07/2022 19:12:52
QRCode
archive.org
thumbnail

In our previous article Yet another bug into Netfilter, I presented a vulnerability found within the netfilter subsystem of the Linux kernel. During my investigation, I found a weird comparison that does not fully protect a copy within a buffer. It led to a heap buffer overflow that was exploited to obtain root privileges on Ubuntu 22.04.

randorisec EN 2022 CVE-2022-34918 Linux netfilter Vulnerability analysis
The US military wants to understand the most important software on Earth https://www.technologyreview.com/2022/07/14/1055894/us-military-sofware-linux-kernel-open-source/
15/07/2022 22:19:12
QRCode
archive.org
thumbnail

Open-source code runs on every computer on the planet—and keeps America’s critical infrastructure going. DARPA is worried about how well it can be trusted

technologyreview EN 2022 Linux DARPA kernel trust US
Linux Threat Hunting: 'Syslogk' a kernel rootkit found under development in the wild https://decoded.avast.io/davidalvarez/linux-threat-hunting-syslogk-a-kernel-rootkit-found-under-development-in-the-wild/
14/06/2022 09:44:10
QRCode
archive.org
thumbnail

Introduction Rootkits are dangerous pieces of malware. Once in place, they are usually really hard to detect. Their code is typically more challenging to write than other malware, so developers resort to code reuse from open source projects. As rootkits are very interesting to analyze, we are always looking out for these kinds of samples […]

avast EN 2022 Rootkit Linux Syslogk malware Adore-Ng
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat https://www.intezer.com/blog/research/new-linux-threat-symbiote/
10/06/2022 08:19:14
QRCode
archive.org
thumbnail

Symbiote is a new Linux malware we discovered that acts in a parasitic nature, infecting other running processes to inflict damage on machines.

intezer 2022 EN research Symbiote malware BPF Linux Threat
Put an io_uring on it: Exploiting the Linux Kernel - Blog | https://www.graplsecurity.com/post/iou-ring-exploiting-the-linux-kernel
04/06/2022 17:36:28
QRCode
archive.org

At Grapl we believe that in order to build the best defensive system we need to deeply understand attacker behaviors. As part of that goal we're investing in offensive security research. Keep up with our blog for new research on high risk vulnerabilities, exploitation, and advanced threat tactics.

Graplsecurity en 2022 0-day Linux kernel exploit redteam research
New Linux-Based Ransomware Cheerscrypt Targets ESXi Devices https://www.trendmicro.com/en_us/research/22/e/new-linux-based-ransomware-cheerscrypt-targets-exsi-devices.html
27/05/2022 10:59:32
QRCode
archive.org
thumbnail

Trend Micro Research detected “Cheerscrypt”, a new Linux-based ransomware variant that compromises ESXi servers. We discuss our initial findings in this report.

Trendmicro EN 2022 endpoints ransomware research ESXi Linux cheerscrypt
Rise in XorDdos: A deeper look at the stealthy DDoS malware targeting Linux devices - Microsoft Security Blog https://www.microsoft.com/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/
23/05/2022 09:26:34
QRCode
archive.org
thumbnail

Observing a 254% increase in activity over the last six months from a versatile Linux trojan called XorDdos, the Microsoft 365 Defender research team provides in-depth analysis into this stealthy malware's capabilities and key infection signs.

microsoft-security-blog 2022 EN Linux XorDdos botnet malware stealthy
Malicious PyPI package opens backdoors on Windows, Linux, and Macs https://www.bleepingcomputer.com/news/security/malicious-pypi-package-opens-backdoors-on-windows-linux-and-macs/
21/05/2022 22:21:57
QRCode
archive.org
thumbnail

Yet another malicious Python package has been spotted in the PyPI registry performing supply chain attacks to drop Cobalt Strike beacons and backdoors on Windows, Linux, and macOS systems.

Backdoor Cobalt-Strike Cobalt-Strike-Beacon Linux macOS PyPI Python Windows supplychain
Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/
27/04/2022 10:53:04
QRCode
archive.org
thumbnail

Microsoft has discovered several vulnerabilities, collectively referred to as Nimbuspwn, that could be chained together, allowing an attacker to elevate privileges to root on many Linux desktop endpoints. Leveraging Nimbuspwn as a vector for root access could allow attackers to achieve greater impact on vulnerable devices by deploying payloads and performing other malicious actions via arbitrary root code execution.

Nimbuspwn microsoft EN 2022 CVE-2022-29799 CVE-2022-29800 vulnerability Linux D-Bus TOCTOU networkd-dispatcher
The Discovery and Exploitation of CVE-2022-25636 https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/
14/03/2022 16:04:52
QRCode
archive.org

A few weeks ago, I found and reported CVE-2022-25636 - a heap out of bounds write in the Linux kernel. The bug is exploitable to achieve kernel code execution (via ROP), giving full local privilege escalation, container escape, whatever you want.

cve-2022-25636 nickgregory bug Linux Kernel escape
The Dirty Pipe Vulnerability — The Dirty Pipe Vulnerability documentation https://dirtypipe.cm4all.com/
07/03/2022 16:07:02
QRCode
archive.org

This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes.

It is similar to CVE-2016-5195 “Dirty Cow” but is easier to exploit.

The vulnerability was fixed in Linux 5.16.11, 5.15.25 and 5.10.102.

CVE-2022-0847 dirtypipe Linux Kernel arbitrary privilege escalation vulnerability EN 2022
New Linux Vulnerability CVE-2022-0492 Affecting Cgroups: Can Containers Escape? https://unit42.paloaltonetworks.com/cve-2022-0492-cgroups/
05/03/2022 20:09:41
QRCode
archive.org
thumbnail

On Feb. 4, Linux announced CVE-2022-0492, a new privilege escalation vulnerability in the kernel. CVE-2022-0492 marks a logical bug in control groups (cgroups), a Linux feature that is a fundamental building block of containers. The issue stands out as one of the simplest Linux privilege escalations discovered in recent times: The Linux kernel mistakenly exposed a privileged operation to unprivileged users.

paoloaltonetworks vulnerability CVE-2022-0492 Linux cgroups containers escalation docker
Une faille vulnérabilise le gestionnaire de paquets Snap pour Linux https://www.lemondeinformatique.fr/actualites/lire-une-faille-vulnerabilise-le-gestionnaire-de-paquets-snap-pour-linux-85889.html
22/02/2022 10:47:41
QRCode
archive.org
thumbnail

Découverte dans le gestionnaire de paquets Snap pour systèmes Linux développé par Canonical, une faille expose les utilisateurs à de l'escalade de privilèges. Un risque qui peut déboucher jusqu'à de l'accès root.

lemondeinformatique FR 2022 snap linux CVE-2021-44731 CVE-2021-44730
Linux-Targeted Malware Increases by 35% in 2021 https://www.crowdstrike.com/blog/linux-targeted-malware-increased-by-35-percent-in-2021/
15/02/2022 20:57:36
QRCode
archive.org
thumbnail

CrowdStrike has observed that malware targeting Linux-based systems increased by 35% in 2021. XorDDoS, Mirai and Mozi were the most common malware families.

CrowdStrike 2021 EN Linux XorDDoS Mirai Mozi malware
SysJoker : un malware pour macOS, Windows et Linux qui opère discrètement depuis des mois https://www.macg.co/macos/2022/01/sysjoker-un-malware-pour-macos-windows-et-linux-qui-opere-discretement-depuis-des-mois-126671
15/02/2022 10:27:08
QRCode
archive.org
thumbnail

Un inquiétant cheval de Troie très discret et multiplateformes vient d'être repéré. Baptisé SysJoker et mis en lumière par la firme de sécurité Intezer, il peut cibler autant Windows, Linux que macOS. Pire encore, celui-ci passait sous les radars des antivirus depuis un bout de temps. Les versions Linux et macOS n'étaient jusqu'à présent pas du tout détectées par des sites

malware macos MacGeneration FR SysJoker Windows Linux
New SysJoker Backdoor Targets Windows, Linux, and macOS https://www.intezer.com/blog/malware-analysis/new-backdoor-sysjoker/
15/02/2022 10:20:18
QRCode
archive.org
thumbnail

In December 2021, we discovered a new multi-platform backdoor that targets Windows, Mac, and Linux that we have named SysJoker.

Intezer backdoor SysJoker malware Linux macos Windows EN multiplatform 
page 3 / 4
4259 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio