Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
5 résultats taggé offensive  ✕
Getting a taste of your own medicine: Threat actor MUT-1244 targets offensive actors, leaking hundreds of thousands of credentials | Datadog Security Labs https://securitylabs.datadoghq.com/articles/mut-1244-targeting-offensive-actors/
14/12/2024 10:58:04
QRCode
archive.org
thumbnail
  • In this post, we describe our in-depth investigation into a threat actor to which we have assigned the identifier MUT-1244.
  • MUT-1224 uses two initial access vectors to compromise their victims, both leveraging the same second-stage payload: a *phishing campaign targeting thousands of academic researchers and a large number of trojanized GitHub repositories, such as proof-of-concept code for exploiting known CVEs.
  • Over 390,000 credentials, believed to be for WordPress accounts, have been exfiltrated to the threat actor through the malicious code in the trojanized "yawpp" GitHub project, masquerading as a WordPress credentials checker.
  • Hundreds of victims of MUT-1244 were and are still being compromised. Victims are believed to be offensive actors—including pentesters and security researchers, as well as malicious threat actors— and had sensitive data such as SSH private keys and AWS access keys exfiltrated.
  • We assess that MUT-1244 has overlap with a campaign tracked in previous research reported on the malicious npm package 0xengine/xmlrpc and the malicious GitHub repository hpc20235/yawpp.
securitylabs.datadoghq.com EN 2024 pentesters script-kiddies offensive actors MUT-1244 PoC PoC-abuse MUT-1224 credentials steal
Project Naptime: Evaluating Offensive Security Capabilities of Large Language Models https://googleprojectzero.blogspot.com/2024/06/project-naptime.html
21/06/2024 18:02:02
QRCode
archive.org
thumbnail

At Project Zero, we constantly seek to expand the scope and effectiveness of our vulnerability research. Though much of our work still relies on traditional methods like manual source code audits and reverse engineering, we're always looking for new approaches.

As the code comprehension and general reasoning ability of Large Language Models (LLMs) has improved, we have been exploring how these models can reproduce the systematic approach of a human security researcher when identifying and demonstrating security vulnerabilities. We hope that in the future, this can close some of the blind spots of current automated vulnerability discovery approaches, and enable automated detection of "unfuzzable" vulnerabilities.

googleprojectzero EN 2024 Offensive Project-Naptime LLM
Gootloader Unloaded: Researchers Launch Multi-Pronged Offensive Against Gootloader, Cutting Off Traffic to Thousands of Gootloader Web Pages and Using the Operator’s Very Own Tactics to Protect End-Users https://www.esentire.com/web-native-pages/gootloader-unloaded
26/04/2023 09:11:35
QRCode
archive.org

eSentire’s Threat Response Unit (TRU), led by researchers Joe Stewart and Keegan Keplinger, have launched a multi-pronged offensive against a growing cyberthreat: the Gootloader Initial Access-as-a-Service Operation. The Gootloader Operation is an expansive cybercrime business, and it has been active since 2018. For the past 15 months, the Gootloader Operator has been launching ongoing attacks targeting legal professionals working for both law firms and corporate legal departments in the U.S., Canada, the U.K. and Australia. Between January and March 2023, TRU shut down Gootloader attacks against 12 different organizations, seven of which were law firms.

esentire EN 2023 Gootloader Access-as-a-Service Offensive hackback
What It Means that the U.S. Is Conducting Offensive Cyber Operations Against Russia https://zetter.substack.com/p/what-it-means-that-the-us-is-conducting
18/06/2022 10:38:58
QRCode
archive.org
thumbnail

Gen. Paul Nakasone's remarks this month about offensive operations against Russia caused a stir. But have people misinterpreted his words?

Zetter newsletter EN 2022 cyberoperations definition Nakasone offensive TallinManual Russia US cyberwarfare cyberwar
US military hackers conducting offensive operations in support of Ukraine, says head of Cyber Command https://news.sky.com/story/us-military-hackers-conducting-offensive-operations-in-support-of-ukraine-says-head-of-cyber-command-12625139
02/06/2022 11:02:44
QRCode
archive.org
thumbnail

In an exclusive interview with Sky News, General Paul Nakasone confirmed for the first time that the US had "conducted a series of operations" in response to Russia's invasion of Ukraine.

skycom 2022 EN offensive operations cyberoperations cyberwar offensive-operations US russia-ukraine-war
4470 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio