Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
18 résultats taggé Tool  ✕
Lookout Discovers Massistant Chinese Mobile Forensic Tooling https://www.lookout.com/threat-intelligence/article/massistant-chinese-mobile-forensics
20/07/2025 22:45:46
QRCode
archive.org
thumbnail

lookout.com - Massistant is a mobile forensics application used by law enforcement in China to collect extensive information from mobile devices.

  • Massistant is the presumed successor to Chinese forensics tool, “MFSocket”, reported in 2019 and attributed to publicly traded cybersecurity company, Meiya Pico
  • The forensics tool works in tandem with a corresponding desktop software.
  • Massistant gains access to device GPS location data, SMS messages, images, audio, contacts and phone services.
  • Meiya Pico maintains partnerships with domestic and international law enforcement partners, both as a surveillance hardware and software provider, as well as through training programs for law enforcement personnel.
  • Travel to and within mainland China carries with it the potential for tourists, business travelers, and persons of interest to have their confidential mobile data acquired as part of lawful intercept initiatives by state police.

Researchers at the Lookout Threat Lab have discovered a mobile forensics application named Massistant, used by law enforcement in China to collect extensive information from mobile devices. This application is believed to be the successor to a previously reported forensics tool named “MFSocket” used by state police and reported by various media outlets in 2019. These samples require physical access to the device to install, and were not distributed through the Google Play store.

Forensics tools are used by law enforcement personnel to collect sensitive data from a device confiscated by customs officials, at local or provincial border checkpoints or when stopped by law enforcement officers.

These tools can pose a risk to enterprise organizations with executives and employees that travel abroad - especially to countries with border patrol policies that allow them to confiscate mobile devices for a short period of time upon entry. In 2024, the Ministry of State Security introduced new legislation that would allow law enforcement personnel to collect and analyze devices without a warrant. There have been anecdotal reports of Chinese law enforcement collecting and analyzing the devices of business travellers. In some cases, researchers have discovered persistent, headless surveillance modules on devices confiscated and then returned by law enforcement such that mobile device activity can continue to be monitored even after the device has been returned.

lookout.com EN 2025 Massistant China Forensic Tool mobile
Unveiling RIFT: Enhancing Rust malware analysis through pattern matching https://www.microsoft.com/en-us/security/blog/2025/06/27/unveiling-rift-enhancing-rust-malware-analysis-through-pattern-matching/
30/06/2025 16:34:04
QRCode
archive.org
thumbnail

Today, Microsoft Threat Intelligence Center is excited to announce the release of RIFT, a tool designed to assist malware analysts automate the identification of attacker-written code within Rust binaries. Known for its efficiency, type safety, and robust memory safety, Rust has increasingly become a tool for creating malware, especially among financially motivated groups and nation-state entities. This shift has introduced new challenges for malware analysts as the unique characteristics of Rust binaries make static analysis more complex.

One of the primary challenges in reverse engineering malware developed with Rust lies in its layers of abstraction added through features such as memory safety and concurrency handling, making it more challenging to identify the behavior and intent of the malware. Compared to traditional languages, Rust binaries are often larger and more complex due to the incorporation of extensive library code. Consequently, reverse engineers must undertake the demanding task of distinguishing attacker-written code from standard library code, necessitating advanced expertise and specialized tools.

To address these pressing challenges, Microsoft Threat Intelligence Center has developed RIFT. RIFT underscores the growing need for specialized tools as cyber threat actors continue to leverage Rust’s features to evade detection and complicate analysis. The adoption of Rust by threat actors is a stark reminder of the ever-changing tactics employed in the cyber domain, and the increasing sophistication required to combat these threats effectively. In this blog post, we explore how threat actors are increasingly adopting Rust for malware development due to its versatility and how RIFT can be used to combat this threat by enhancing the efficiency and accuracy of Rust-based malware analysis.

microsoft EN 2025 tool Rust annouce RIFT binaries
Darknet’s Xanthorox AI Offers Customizable Tools for Hacker https://www.infosecurity-magazine.com/news/darknets-xanthorox-ai-hackers-tools/
13/04/2025 10:50:08
QRCode
archive.org
thumbnail

A self-contained AI system engineered for offensive cyber operations, Xanthorox AI, has surfaced on darknet forums and encrypted channels.

Introduced in late Q1 2025, it marks a shift in the threat landscape with its autonomous, modular structure designed to support large-scale, highly adaptive cyber-attacks.

Built entirely on private servers, Xanthorox avoids using public APIs or cloud services, significantly reducing its visibility and traceability.

infosecurity EN 2025 Xanthorox AI self-contained tool
Unidentified Threat Actor Utilizes Android Malware to Target High-Value Assets in South Asia https://www.cyfirma.com/research/unidentified-threat-actor-utilizes-android-malware-to-target-high-value-assets-in-south-asia/
09/12/2024 11:43:26
QRCode
archive.org
thumbnail

The team at CYFIRMA analyzed a malicious Android sample designed to target high-value assets in Southern Asia. This sample, attributed to an unknown threat actor, was generated using the Spynote Remote Administration Tool. While the specifics of the targeted asset remain confidential, it is likely that such a target would attract the interest of APT groups. However, we are restricted from disclosing further details about the actual target and its specific region. For a comprehensive analysis, please refer to the detailed report

cyfirma EN 2024 Unidentified Threat Actor Malware research Android Spynote Remote Administration Tool
SmokeBuster Tool https://www.zscaler.com/blogs/security-research/smokebuster-keeping-systems-smokeloader-free
04/11/2024 07:06:54
QRCode
archive.org
thumbnail
  • ThreatLabz has developed a tool named SmokeBuster to detect, analyze, and remediate infections.
  • SmokeBuster supports 32-bit and 64-bit instances of SmokeLoader and versions 2017-2022. The tool is compatible with Windows 7 to Windows 11.
  • SmokeLoader is a malware downloader that originated in 2011. The malware is primarily designed to deliver second-stage payloads, which include information stealers and ransomware.
  • Despite a major disruption by Operation Endgame in May 2024, SmokeLoader continues to be used by numerous threat groups largely due to numerous cracked versions publicly available on the internet.
  • The last four versions of SmokeLoader contain coding flaws that significantly impact an infected system’s performance.
zscaler EN 2024 tool SmokeBuster SmokeLoader Operation-Endgame
Exclusive: Chinese researchers develop AI model for military use on back of Meta's Llama https://www.reuters.com/technology/artificial-intelligence/chinese-researchers-develop-ai-model-military-use-back-metas-llama-2024-11-01/
01/11/2024 09:24:34
QRCode
archive.org
  • Papers show China reworked Llama model for military tool
  • China's top PLA-linked Academy of Military Science involved
  • Meta says PLA 'unauthorised' to use Llama model
  • Pentagon says it is monitoring competitors' AI capabilities
reuters EN China Llama model military tool Meta AI LLM Pentagon
Cyber Army of Russia — DDoS Tool. The «Cyber Army of Russia» (or… | by PJ) https://medium.com/@PJ04857920/cyber-army-of-russia-ddos-tool-3b3050419225
13/06/2024 09:48:12
QRCode
archive.org

The «Cyber Army of Russia» (or “people’s Cyber Army”), published their own DDoS-Tool on Wednesday (2023–11–29). According to their post, it is based on the code of the Aura-DDoS tool (used by the…

medium.com/@PJ04857920 DDoS Aura-DDoS Tool peoples-Cyber-Army Cyber-Army-of-Russia
Cybercriminals Transform Raspberry Pi into a Tool for Fraud and Anonymization: GEOBOX Discovery https://www.resecurity.com/blog/article/cybercriminals-transform-raspberry-pi-into-a-tool-for-fraud-and-anonymization-geobox-discovery?ref=news.risky.biz
29/03/2024 10:26:20
QRCode
archive.org
resecurity EN 2024 Raspberry-Pi GEOBOX analysis tool Fraud Anonymization
Microsoft Copilot for Security: General Availability details https://techcommunity.microsoft.com/t5/microsoft-security-copilot-blog/microsoft-copilot-for-security-general-availability-details/ba-p/4079970
20/03/2024 22:33:51
QRCode
archive.org
thumbnail

Microsoft Copilot for Security will be generally available on April 1st. Read this blog to learn about new productivity research, product capabilities,..

techcommunity.microsoft EN 2024 AI Microsoft Copilot for Security annonce tool
Mail in the middle – a tool to automate spear phishing campaigns https://sensepost.com/blog/2024/mail-in-the-middle-a-tool-to-automate-spear-phishing-campaigns/
03/03/2024 11:32:26
QRCode
archive.org

The idea is simple; take advantage of the typos that people make when they enter email addresses. If we positioned ourselves in between the sender of an email (be it a person or a system) and the legitimate recipient, we may be able to capture plenty of information about the business, including personally identifiable information, email verification processes, etc. This scenario is effectively a Person-in-the-Middle (PiTM), but for email communications.

Orange-Cyberdefence sensepost 2024 EN Typosquatting tool mail domain
Magika: AI powered fast and efficient file type identification https://opensource.googleblog.com/2024/02/magika-ai-powered-fast-and-efficient-file-type-identification.html?m=1
17/02/2024 10:39:36
QRCode
archive.org
thumbnail

Today we are open-sourcing Magika, Google’s AI-powered file-type identification system, to help others accurately detect binary and textual file types. Under the hood, Magika employs a custom, highly optimized deep-learning model, enabling precise file identification within milliseconds, even when running on a CPU.

googleblog.com magika AI-powered file-type tool blueteam
Avast Updates Babuk Ransomware Decryptor in Cooperation with Cisco Talos and Dutch Police https://decoded.avast.io/threatresearch/avast-updates-babuk-ransomware-decryptor-in-cooperation-with-cisco-talos-and-dutch-police/
09/01/2024 13:36:22
QRCode
archive.org
thumbnail

Avast is releasing an updated version of the Avast Babuk decryption tool, capable of restoring files encrypted by the Babuk variant called Tortilla.

avast EN 2024 Babuk decryption tool Tortilla
Introducing HAR Sanitizer: secure HAR sharing https://blog.cloudflare.com/introducing-har-sanitizer-secure-har-sharing/
29/10/2023 11:52:06
QRCode
archive.org
thumbnail

As a follow-up to the most recent Okta breach, we are making a HAR file sanitizer available to everyone, not just Cloudflare customers, at no cost.

cloudflare EN 2023 HAR Sanitizer Okta tool
Introducing: Red Canary Mac Monitor https://redcanary.com/blog/mac-monitor/
16/04/2023 12:12:26
QRCode
archive.org

Mac Monitor is Red Canary’s newly available tool for collection and dynamic system analysis on macOS endpoints.
Red Canary Mac Monitor is a feature-rich dynamic analysis tool for macOS that leverages our extensive understanding of the platform and Apple’s latest APIs to collect and present relevant security events. Mac Monitor is practically the macOS version of the Microsoft Sysinternals tool, Procmon. Mac Monitor collects a wide variety of telemetry classes, including processes, interprocess, files, file metadata, logins, XProtect detections, and more—enabling defenders to quickly and effectively analyze enriched, high-fidelity macOS security events in a native, modern, and customizable user interface

redcanary EN 2023 tool Monitor announce macOS monitoring Sysinternals Procmon
Untitled Goose Tool Aids Hunt and Incident Response in Azure, Azure Active Directory, and Microsoft 365 Environments https://www.cisa.gov/news-events/alerts/2023/03/23/untitled-goose-tool-aids-hunt-and-incident-response-azure-azure-active-directory-and-microsoft-365
25/03/2023 11:12:42
QRCode
archive.org

Today, CISA released the Untitled Goose Tool to help network defenders detect potentially malicious activity in Microsoft Azure, Azure Active Directory (AAD), and Microsoft 365 (M365) environments. The Untitled Goose Tool offers novel authentication and data gathering methods for network defenders to use as they interrogate and analyze their Microsoft cloud services. The tool enables users to:

cisa EN 2023 tool AD Azure M365 hunting blueteam check
Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice | Proofpoint US https://www.proofpoint.com/us/blog/threat-insight/nighthawk-and-coming-pentest-tool-likely-gain-threat-actor-notice
23/11/2022 22:57:25
QRCode
archive.org
thumbnail

Key Takeaways

  • Nighthawk is an advanced C2 framework intended for red team operations through commercial licensing.
  • Proofpoint researchers observed initial use of the framework in September 2022 by a likely red team.
  • We have seen no indications at this time that leaked versions of Nighthawk are being used by attributed threat actors in the wild.
  • The tool has a robust list of configurable evasion techniques that are referenced as “opsec” functions throughout its code.
    P* roofpoint researchers expect Nighthawk will show up in threat actor campaigns as the tool becomes more widely recognized or as threat actors search for new, more capable tools to use against targets.
proofpoint EN 2022 redteam tool Nighthawk C2 framework threat
Emsisoft Decryptor for Maze / Sekhmet / Egregor - Emsisoft: Free Ransomware Decryption Tools https://www.emsisoft.com/ransomware-decryption-tools/maze-sekhmet-egregor
13/02/2022 22:04:57
QRCode
archive.org
thumbnail

Free Maze / Sekhmet / Egregor ransomware decryptor by Emsisoft. Unlock your files without paying the ransom.

decrypter decryptor emsisoft EN ransomware tool Maze Sekhmet Egregor emsisoft
esmat: New Free macOS Endpoint Security Message Analysis Tool • UX monitoring & endpoint security analytics for Windows, macOS, Citrix, VMware on Splunk https://uberagent.com/blog/esmat-new-free-macos-endpoint-security-framework-esf-message-analysis-tool/
13/02/2022 01:45:21
QRCode
archive.org

We’re happy to announce the public release of esmat, a new free & open-source tool. esmat is a command-line app for macOS that allows you to explore the behavior of Apple’s Endpoint Security framework.

macOS EN tool esmat commandline endpointsecurityframework apple log logging
4558 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio