Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
8 résultats taggé Malware-as-a-Service  ✕
What a new threat report says about Mac malware in 2024 https://appleinsider.com/articles/24/12/04/what-a-new-threat-report-says-about-mac-malware-in-2024
09/12/2024 14:02:09
QRCode
archive.org
thumbnail

Apple's macOS has been under siege in 2024 as malware-as-a-service platforms and AI-driven threats make the year a turning point for Mac security.

appleinsider EN 2024 Apple macOS AI-driven Mac security malware-as-a-service
Obfuscated PowerShell leads to Lumma C2 Stealer https://www.ontinue.com/resource/obfuscated-powershell-leads-to-lumma-c2-stealer/
07/09/2024 11:46:07
QRCode
archive.org
thumbnail

Ontinue Cyber Defenders have observed an uptick in activities related to the LummaC2 infostealer being used as a Malware-as-a-Service.

ontinue EN 2024 obfuscated Powershell analysis Lumma LummaC2 Stealer Malware-as-a-Service
From the Depths: Analyzing the Cthulhu Stealer Malware for macOS https://www.cadosecurity.com/blog/from-the-depths-analyzing-the-cthulhu-stealer-malware-for-macos
24/08/2024 12:13:11
QRCode
archive.org
thumbnail

Cado Security has identified a malware-as-a-service (MaaS) targeting macOS users named “Cthulhu Stealer”.

cadosecurity EN 2024 Cthulhu-Stealer macos analysis MaaS malware-as-a-service
Lumma Stealer malware now uses trigonometry to evade detection https://www.bleepingcomputer.com/news/security/lumma-stealer-malware-now-uses-trigonometry-to-evade-detection/
20/11/2023 17:05:02
QRCode
archive.org
thumbnail

The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software - the measuring of mouse movements using trigonometry to determine if the malware is running on a real machine or an antivirus sandbox.

bleepingcomputer EN 2023 Anti-VM Info-Stealer Information-stealing-malware Lumma LummaC2 Malware Malware-as-a-Service Security detection
Detecting and Fingerprinting Infostealer Malware-as-a-Service platforms https://blog.bushidotoken.net/2022/11/detecting-and-fingerprinting.html
27/11/2022 17:18:47
QRCode
archive.org
thumbnail

Cyber threat intelligence largely involves the tracking and studying of the adversaries outside of your network. Gaining counterintelligence about your adversaries' capabilities and weaponry is one of the final building blocks for managing a strong cyber defense. In the pursuit of performing this duty, I have been studying how to discover adversary infrastructure on the internet. One good way of doing this has been via leveraging the scan data available through the popular Shodan search engine. If you've not used it before, Shodan periodically scans the entire internet and makes it available for users to query through. It is often used to monitor networks, look for vulnerabilities, and ensure the security of an organization's perimeter.

bushidotoken en 2022 shodan Infostealer Malware-as-a-Service Detecting howto
Aurora: a rising stealer flying under the radar https://blog.sekoia.io/aurora-a-rising-stealer-flying-under-the-radar/
21/11/2022 20:56:10
QRCode
archive.org
thumbnail

Since September 2022, Aurora malware is advertised as an infostealer and several traffers teams announced they added it to their malware toolset.

sekoia 2022 EN infostealer malware technical analysis IoCs Malware-as-a-Service
Raccoon Stealer v2: The Latest Generation of the Raccoon Family https://www.zscaler.com/blogs/security-research/raccoon-stealer-v2-latest-generation-raccoon-family
02/08/2022 08:02:58
QRCode
archive.org
thumbnail

Raccoon is a malware family that has been sold as malware-as-a-service on underground forums since early 2019. In early July 2022, a new variant of this malware was released. The new variant, popularly known as Raccoon Stealer v2, is written in C unlike previous versions which were mainly written in C++.

zscaler EN 2022 Raccoon malware malware-as-a-service Stealer
Eternity, poche centinaia di dollari per un ransomware o un malware per furto dati https://www.italian.tech/blog/sicuri-nella-rete/2022/05/16/news/eternity_poche_centinaia_di_dollari_per_un_ransomware_o_un_malware_per_furto_dati-349771131/
17/05/2022 09:52:28
QRCode
archive.org
thumbnail

Numerosi rapporti ci suggeriscono che gli attacchi basati su codici malevoli rappresentano la maggioranza delle offensive cui osserviamo, tra esse la fanno da padrona i ransomware e gli info-stealer, questi ultimi sono malware concepiti per rubare un gran numero di informazioni dai sistemi infetti. Premesso ciò, chiediamoci quale sia la disponibilità sul mercato criminale di questi strumenti, quali siano i costi ed il modello di vendita.

italiantech IT 2022 Paganini Malware-as-a-Service info-stealer vendita prezzi
4252 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio