Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 9 / 20
382 résultats taggé Analysis  ✕
GitHub - amlweems/xzbot: notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094) https://github.com/amlweems/xzbot?tab=readme-ov-file#ed448-patch
01/04/2024 18:42:40
QRCode
archive.org
thumbnail

notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094) - amlweems/xzbot

amlweems EN 2024 CVE-2024-3094 xz backdoor honeypot analysis
xz/liblzma: Bash-stage Obfuscation Explained - gynvael.coldwind//vx.log https://gynvael.coldwind.pl/?lang=en&id=782
01/04/2024 10:35:47
QRCode
archive.org
thumbnail

esterday Andres Freund emailed oss-security@ informing the community of the discovery of a backdoor in xz/liblzma, which affected OpenSSH server (huge respect for noticing and investigating this). Andres' email is an amazing summary of the whole drama, so I'll skip that. While admittedly most juicy and interesting part is the obfuscated binary with the backdoor, the part that caught my attention – and what this blogpost is about – is the initial part in bash and the simple-but-clever obfuscation methods used there. Note that this isn't a full description of what the bash stages do, but rather a write down of how each stage is obfuscated and extracted.

gynvael EN xz liblzma analysis CVE-2024-3094
Cybercriminals Transform Raspberry Pi into a Tool for Fraud and Anonymization: GEOBOX Discovery https://www.resecurity.com/blog/article/cybercriminals-transform-raspberry-pi-into-a-tool-for-fraud-and-anonymization-geobox-discovery?ref=news.risky.biz
29/03/2024 10:26:20
QRCode
archive.org
resecurity EN 2024 Raspberry-Pi GEOBOX analysis tool Fraud Anonymization
Diving Deeper into AI Package Hallucinations https://www.lasso.security/blog/ai-package-hallucinations
28/03/2024 19:07:30
QRCode
archive.org
thumbnail

Lass Security's recent research on AI Package Hallucinations extends the attack technique to GPT-3.5-Turbo, GPT-4, Gemini Pro (Bard), and Coral (Cohere).

lasso EN 2024 AI Package Hallucinations GPT-4 Bard Cohere analysis LLM
Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit https://blog.sekoia.io/tycoon-2fa-an-in-depth-analysis-of-the-latest-version-of-the-aitm-phishing-kit/
26/03/2024 09:09:23
QRCode
archive.org
thumbnail

Tycoon 2FA has become one of the most widespread adversary-in-The-Middle (AiTM) phishing kits over the last few months.

sekoia EN 2024 Tycoon2FA phishing PhaaS AiTM phishing-kit analysis
Large-Scale StrelaStealer Campaign in Early 2024 https://unit42.paloaltonetworks.com/strelastealer-campaign/
22/03/2024 12:15:51
QRCode
archive.org
thumbnail

We unravel the details of two large-scale StrelaStealer campaigns from 2023 and 2024. This email credential stealer has a new variant delivered through zipped JScript.
#2024 #Campaign #EN #JScript #StrelaStealer #analysis #paloaltonetworks

analysis EN 2024 JScript paloaltonetworks StrelaStealer Campaign
The iSOON Disclosure: Exploring the Integrated Operations Platform https://bishopfox.com/blog/the-isoon-disclosure-exploring-the-integrated-operations-platform
22/03/2024 09:14:22
QRCode
archive.org
thumbnail

Bishop Fox examines the iSoon data disclosure from an offensive security perspective and an analysis of the platform's capabilities, design, features.

Bishop-Fox bishopfox EN 2024 iSOON Integrated Operations Platform China analysis
Interesting Multi-Stage StopCrypt Ransomware Variant Propagating in the Wild https://blog.sonicwall.com/en-us/2024/03/new-multi-stage-stopcrypt-ransomware/
19/03/2024 17:14:35
QRCode
archive.org
thumbnail

Overview The SonicWall Capture Labs threat research team recently observed an interesting variant of StopCrypt ransomware. The ransomware executes its malicious activities by utilizing multi-stage shellcodes before launching a final payload that contains the file […]

SonicWall EN 2024 StopCrypt ransomware analysis
The Architects of Evasion: a Crypters Threat Landscape https://blog.sekoia.io/the-architects-of-evasion-a-crypters-threat-landscape/
14/03/2024 18:18:31
QRCode
archive.org
thumbnail

Learn about key concepts and different crypters-related activities as well as the lucrative ecosystem of malicious groups that exploit them.

sekoia EN 2024 Crypters Evasion analysis
The Anatomy of an ALPHA SPIDER Ransomware Attack https://www.crowdstrike.com/blog/anatomy-of-alpha-spider-ransomware/
07/03/2024 11:34:35
QRCode
archive.org
thumbnail

Read this blog on the anatomy of an ALPHA SPIDER ransomware attack to better understand how they operate and how to better protect your business.

crowdstrike EN 2024 Analysis ALPHA SPIDER ransomware
NoName057(16) DDoSia project: 2024 updates and behavioural shifts https://blog.sekoia.io/noname05716-ddosia-project-2024-updates-and-behavioural-shifts/
01/03/2024 16:43:41
QRCode
archive.org
thumbnail

Learn about NoName057(16), a pro-Russian hacktivist group behind Project DDoSia targeting entities supporting Ukraine. Discover an overview of the changes made by the group, both from the perspective of the software shared by the group to generate DDoS attacks and the specifics of the evolution of the C2 servers. It also provides an overview of the country and sectors targeted by the group for 2024.

sekoia EN 2024 NoName057(16) DDoSia Analysis
Scattered Spider laying new eggs https://blog.sekoia.io/scattered-spider-laying-new-eggs/
22/02/2024 13:53:44
QRCode
archive.org
thumbnail

Discover the techniques, tactics (TTPs) used by Scattered Spider intrusion set, including social engineering and targeted phishing campaigns.

sekoia EN 2024 analysis TTPs Scattered-Spider phishing intrusion Social-engineering
A first analysis of the i-Soon data leak https://www.malwarebytes.com/blog/news/2024/02/a-first-analysis-of-the-i-soon-data-leak
21/02/2024 15:40:24
QRCode
archive.org
thumbnail

Data from a Chinese cybersecurity vendor that works for the Chinese government exposed a range of hacking tools and services.

malwarebytes EN 2024 i-Soon data leak analysis
Code injection or backdoor: A new look at Ivanti’s CVE-2021-44529 https://www.labs.greynoise.io/grimoire/2024-02-what-is-this-old-ivanti-exploit/index.html
18/02/2024 02:35:49
QRCode
archive.org
thumbnail

In 2021, Ivanti patched a vulnerability that they called “code injection”. Rumors say it was a backdoor in an open source project. Let’s find out what actually happened!

greynoise EN 2024 backdoor Ivanti CVE-2021-44529 analysis
Vulnerable Fortinet Devices: Low-hanging Fruit for Threat Actors https://cyble.com/blog/vulnerable-fortinet-devices-low-hanging-fruit-for-threat-actors/
16/02/2024 09:22:26
QRCode
archive.org
thumbnail

Cyble analyzes the increasing incidences of vulnerabilities in Fortinet, highlighting the impact they have on Critical Infrastructure.

cyble EN 2024 analysis Fortinet exposed
Threat Intel Accelerates Detection & Response https://www.huntress.com/blog/threat-intel-accelerates-detection-and-response
15/02/2024 14:28:01
QRCode
archive.org
thumbnail

Evidence of a pre-existing exploit was rendered when the Huntress agent was added to an endpoint. Within minutes, and in part through the use of previously published threat intelligence, analysts were able to identify the issue and make recommendations to the customer to remediate the root cause.

huntress EN 2024 analysis endpoint finger.exe IoC
New MacOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group https://www.bitdefender.com/blog/labs/new-macos-backdoor-written-in-rust-shows-possible-link-with-windows-ransomware-group/
13/02/2024 09:12:38
QRCode
archive.org
thumbnail

Bitdefender researchers have discovered a new backdoor targeting Mac OS users.

bitdefender EN 2024 macOS Backdoor rust Trojan.MAC.RustDoor analysis
Zero Day Initiative — CVE-2023-46263: Ivanti Avalanche Arbitrary File Upload Vulnerability https://www.zerodayinitiative.com/blog/2024/2/5/cve-2023-46263-ivanti-avalanche-arbitrary-file-upload-vulnerability
06/02/2024 18:40:29
QRCode
archive.org
thumbnail

In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Lucas Miller and Dusan Stevanovic of the Trend Micro Research Team detail a recently patched remote code execution vulnerability in the Ivanti Avalanche enterprise mobility management program. Other Ivanti products

zerodayinitiative EN 2024 CVE-2023-46263 Ivanti Avalanche analysis
Ransomware Retrospective 2024: Unit 42 Leak Site Analysis https://unit42.paloaltonetworks.com/unit-42-ransomware-leak-site-data-analysis/
06/02/2024 10:27:54
QRCode
archive.org
thumbnail

Analysis of ransomware gang leak site data reveals significant activity over 2023. As groups formed — or dissolved — and tactics changed, we synthesize our findings.

unit42 2024 EN Retrospective Analysis ransomware Data-Leak-Site
New Go-based Malware Loader Discovered I Arctic Wolf https://arcticwolf.com/resources/blog/cherryloader-a-new-go-based-loader-discovered-in-recent-intrusions/
29/01/2024 18:47:54
QRCode
archive.org
thumbnail

Arctic Wolf Labs has discovered, based on recent intrusion observations, a new Go-based malware loader named CherryLoader

arcticwolf EN 2024 Go-based Malware Loader analysis CherryLoader
page 9 / 20
4746 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio