Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 7 / 16
308 résultats taggé Malware  ✕
Chinese hackers infect Dutch armed forces network with malware https://www.bleepingcomputer.com/news/security/chinese-hackers-infect-dutch-armed-forces-network-with-malware/
06/02/2024 19:50:53
QRCode
archive.org
thumbnail

A Chinese cyber-espionage group breached the Dutch Ministry of Defence last year and deployed malware on compromised devices, according to the Military Intelligence and Security Service (MIVD) of the Netherlands.

bleepingcomputer EN 2024 Army China COATHANGER Cyber-espionage Defense Fortigate Fortinet Malware Netherlands
DarkGate malware delivered via Microsoft Teams - detection and response https://cybersecurity.att.com/blogs/security-essentials/darkgate-malware-delivered-via-microsoft-teams-detection-and-response
01/02/2024 09:05:20
QRCode
archive.org
thumbnail

While most end users are well-acquainted with the dangers of traditional phishing attacks, such as those delivered via email or other media, a large proportion are likely unaware that Microsoft Teams chats could be a phishing vector. Most Teams activity is intra-organizational, but Microsoft enables External Access by default, which allows members of one organization to add users outside the organization to their Teams chats. Perhaps predictably, this feature has provided malicious actors a new avenue by which to exploit untrained or unaware users.

cybersecurity.att.com EN 2024 Microsoft Teams phishing malware
Evolution of UNC4990: Uncovering USB Malware's Hidden Depths https://www.mandiant.com/resources/blog/unc4990-evolution-usb-malware
31/01/2024 17:36:21
QRCode
archive.org
thumbnail

UNC4990 uses USB devices for initial infection, and is likely motivated by financial gain.

mandiant EN 2024 UNC4990 USB malware
New Go-based Malware Loader Discovered I Arctic Wolf https://arcticwolf.com/resources/blog/cherryloader-a-new-go-based-loader-discovered-in-recent-intrusions/
29/01/2024 18:47:54
QRCode
archive.org
thumbnail

Arctic Wolf Labs has discovered, based on recent intrusion observations, a new Go-based malware loader named CherryLoader

arcticwolf EN 2024 Go-based Malware Loader analysis CherryLoader
Malicious PyPI Packages Slip WhiteSnake InfoStealer Malware onto Windows Machines https://thehackernews.com/2024/01/malicious-pypi-packages-slip-whitesnake.html?m=1
29/01/2024 07:14:13
QRCode
archive.org
thumbnail

Malicious code hiding in seemingly innocent PyPI packages steals your passwords, crypto & more
#attacks #breach #computer #cyber #data #hack #hacker #hacking #how #information #malware #network #news #ransomware #security #software #the #to #today #updates #vulnerability

hacking attacks information network data to updates malware cyber today news ransomware breach security software hack the hacker how computer vulnerability
Info Stealing Packages Hidden in PyPI https://www.fortinet.com/blog/threat-research/info-stealing-packages-hidden-in-pypi
23/01/2024 10:08:55
QRCode
archive.org
thumbnail

An info-stealing PyPI malware author was identified discreetly uploading malicious packages.

FortiGuard-Labs-Threat-Research fortinet 2024 EN PyPI malware Supply-chain-attack
A backdoor with a cryptowallet stealer inside cracked macOS software https://securelist.com/new-macos-backdoor-crypto-stealer/111778/
22/01/2024 10:41:52
QRCode
archive.org
thumbnail

We review a new macOS backdoor that piggybacks on cracked software to replace Bitcoin and Exodus wallets with malware.

securelist EN 2024 Apple MacOS Backdoor Cryptocurrencies DNS Malware Malware-Descriptions Malware-Technologies Trojan Trojan-stealer
Balada Injector Infects Over 7,100 WordPress Sites Using Plugin Vulnerability https://thehackernews.com/2024/01/balada-injector-infects-over-7100.html
20/01/2024 21:19:56
QRCode
archive.org
thumbnail

Over 7,100 WordPress sites have been hit by the 'Balada Injector' malware, which exploits sites using a vulnerable version of the Popup Builder plugin

thehackernews 2024 EN Balada WP plugin WordPress malware Injector infected
Jamf Threat Labs Discovers Pirated macOS Apps Similar to ZuRu Malware https://www.jamf.com/blog/jtl-malware-pirated-applications/
19/01/2024 09:15:51
QRCode
archive.org
thumbnail

Jamf Threat Labs discovers new pirated macOS applications that establish communication with attacker infrastructure, allowing the victim's computer to be controlled by the attacker.

jamf EN 2024 macOS Malware pirated applications
MacOS info-stealers quickly evolve to evade XProtect detection https://www.bleepingcomputer.com/news/security/macos-info-stealers-quickly-evolve-to-evade-xprotect-detection/
17/01/2024 19:24:07
QRCode
archive.org
thumbnail

Multiple information stealers for the macOS platform have demonstrated the capability to evade detection even when security companies follow and report about new variants frequently.

bleepingcomputer EN 2024 Information Malware Security Apple Evasion Stealer Info XProtect InfoSec Computer macOS
iShutdown scripts can help detect iOS spyware on your iPhone https://www.bleepingcomputer.com/news/security/ishutdown-scripts-can-help-detect-ios-spyware-on-your-iphone/
17/01/2024 19:23:42
QRCode
archive.org
thumbnail

Security researchers found that infections with high-profile spyware Pegasus, Reign, and Predator could be discovered on compromised Apple mobile devices by checking Shutdown.log, a system log file that stores reboot events.

bleepingcomputer EN 2024 Spyware iPhone Malware Security Apple iOS Pegasus InfoSec Logging Computer
Analyzing DPRK's SpectralBlur https://objective-see.org/blog/blog_0x78.html
05/01/2024 12:38:58
QRCode
archive.org
thumbnail

In both his twitter (err, X) thread and in a subsequent posting he provided a comprehensive background and triage of the malware dubbed SpectralBlur. In terms of its capabilities he noted:

SpectralBlur is a moderately capable backdoor, that can upload/download files, run a shell, update its configuration, delete files, hibernate or sleep, based on commands issued from the C2. -Greg
He also pointed out similarities to/overlaps with the DPRK malware known as KandyKorn (that we covered in our “Mac Malware of 2024” report), while also pointing out there was differences, leading him to conclude:

We can see some similarities ... to the KandyKorn. But these feel like families developed by different folks with the same sort of requirements. -Greg

objective-see EN 2024 Analysis macOS backdoor SpectralBlur malware
Objective-See's Blog https://objective-see.org/blog/blog_0x77.html
02/01/2024 15:28:28
QRCode
archive.org
thumbnail

A comprehensive analysis of the year's new malware

objective-see EN 2024 retrospective macos malware year analysis
Steam game mod breached to push password-stealing malware https://www.bleepingcomputer.com/news/security/steam-game-mod-breached-to-push-password-stealing-malware/
30/12/2023 10:56:09
QRCode
archive.org
thumbnail

Downfall, a fan expansion for the popular Slay the Spire indie strategy game, was breached on Christmas Day to push Epsilon information stealer malware using the Steam update system.

bleepingcomputer Epsilon-Stealer Game-Mod Information-Stealer Malware Slay-the-Spire Slay-the-Spire-Downfall Steam
Microsoft disables MSIX protocol handler abused in malware attacks https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-msix-protocol-handler-abused-in-malware-attacks/
28/12/2023 23:31:32
QRCode
archive.org
thumbnail

Microsoft has again disabled the MSIX ms-appinstaller protocol handler after multiple financially motivated threat groups abused it to infect Windows users with malware.

bleepingcomputer EN 2023 App-Installer Malware Windows Microsoft MSIX CVE-2021-43890
Operation Triangulation: The last (hardware) mystery https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/
27/12/2023 18:40:33
QRCode
archive.org
thumbnail

Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.

securelist EN 2023 Apple Malware Reverse-engineering Targeted-attacks Triangulation 0-days iPhone
Hackers Exploiting MS Excel Vulnerability to Spread Agent Tesla Malware https://thehackernews.com/2023/12/hackers-exploiting-old-ms-excel.html?m=1
21/12/2023 19:57:57
QRCode
archive.org
thumbnail

Beware of phishing emails with invoice-themed attachments! Attackers are using an old Office vulnerability (CVE-2017-11882) to spread the Agent Tesla

thehackernews EN 2023 malware Agent-Tesla CVE-2017-11882 phishing email MSExcel Excel vulnerability
Qakbot's Back, But Don't Y'all Panic: A Southern Tech Talk https://itssecurityyall.substack.com/p/qakbots-back-but-dont-yall-panic
20/12/2023 21:01:49
QRCode
archive.org
thumbnail

Qakbot, a versatile malware threat, returned after a takedown in August. The new campaign targets the hospitality industry with IRS-themed phishing emails containing malicious PDFs. Microsoft identified the attack, offering two IP addresses for blocking and a way to detect the malware's digital signature.

itssecurityyall EN 2023 Qakbot return malware hospitality IRS-themed
Web injections are back on the rise: 40+ banks affected by new malware campaign https://securityintelligence.com/posts/web-injections-back-on-rise-banks-affected-danabot-malware/
20/12/2023 20:51:20
QRCode
archive.org
thumbnail

DanaBot is a sophisticated banking trojan targeting financial institutions and their customers. Now, a new global campaign has put more users at risk.

securityintelligence EN 2023 DanaBot banking trojan malware
Rhadamanthys v0.5.0 - a deep dive into the stealer’s components https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/
18/12/2023 11:04:16
QRCode
archive.org
thumbnail
  • The Rhadamanthys stealer is a multi-layer malware, sold on the black market, and frequently updated. Recently the author released a new major version, 0.5.0.
  • In the new version, the malware expands its stealing capabilities and also introduces some general-purpose spying functions.
  • A new plugin system makes the malware expandable for specific distributor needs.
  • The custom executable formats, used for modules, are unchanged since our last publication (XS1 and XS2 formats are still in distribution).
  • Check Point Research (CPR) provides a comprehensive review of the agent modules, presenting their capabilities and implementation, with a focus on how the stealer components are loaded and how they work.
checkpoint EN 2023 Rhadamanthys stealer malware analysis
page 7 / 16
4956 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn