Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 2
26 résultats taggé sekoia  ✕
From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic https://blog.sekoia.io/clickfake-interview-campaign-by-lazarus/
01/04/2025 11:54:41
QRCode
archive.org
thumbnail

Discover how Lazarus leverages fake job sites in the ClickFake Interview campaign targeting crypto firms using the ClickFix tactic.

sekoia EN 2025 ClickFake Interview ClickFix Lazarus
Targeted supply chain attack against Chrome browser extensions https://blog.sekoia.io/targeted-supply-chain-attack-against-chrome-browser-extensions/
24/01/2025 09:22:51
QRCode
archive.org
thumbnail

In this blog post, learn about the supply chain attack targeting Chrome browser extensions and the associated targeted phishing campaign.

sekoia EN 2025 supply chain attack Chrome extensions
ClickFix tactic: Revenge of detection https://blog.sekoia.io/clickfix-tactic-revenge-of-detection/
05/11/2024 14:27:46
QRCode
archive.org
thumbnail

Detect the ClickFix tactic: a social engineering technique using fake video calls and CAPTCHA pages to deploy malicious code.

sekoia EN 2024 ClickFix tactic
A glimpse into the Quad7 operators' next moves and associated botnets https://blog.sekoia.io/a-glimpse-into-the-quad7-operators-next-moves-and-associated-botnets/
01/11/2024 10:18:13
QRCode
archive.org
thumbnail

Uncover the secrets of the Quad7 botnet and its ever-evolving toolset. Learn about the new backdoors and protocols used by these operators.

sekoia EN 2024 Quad7 botnet CovertNetwork-1658 analysis
ClickFix tactic: The Phantom Meet https://blog.sekoia.io/clickfix-tactic-the-phantom-meet/
30/10/2024 14:39:58
QRCode
archive.org
thumbnail

Analyse the ClickFix tactic and related campaigns. Uncover a ClickFix campaign impersonating Google Meet and cybercrime infrastructure.

sekoia EN 2024 ClickFix campaigns Google Meet
Mamba 2FA: A new contender in the AiTM phishing ecosystem - Sekoia.io Blog https://blog.sekoia.io/mamba-2fa-a-new-contender-in-the-aitm-phishing-ecosystem/
07/10/2024 16:38:39
QRCode
archive.org
thumbnail

Discover Mamba 2FA, a previously unknown adversary-in-the-middle (AiTM) phishing kit and sold as phishing-as-a-service (PhaaS).

sekoia EN 2024 Mamba 2FA AiTM phishing phishing-as-a-service PhaaS
WebDAV-as-a-Service: Uncovering the infrastructure behind Emmenhtal loader distribution https://blog.sekoia.io/webdav-as-a-service-uncovering-the-infrastructure-behind-emmenhtal-loader-distribution/
19/09/2024 14:02:56
QRCode
archive.org
thumbnail

Our TDR team has been investigating the WebDAV infrastructure used to distribute the Emmenhtal loader. Here are some key insights:

sekoia EN 2024 webdav WebDAV-as-a-Service Emmenhtal loader
A glimpse into the Quad7 operators' next moves and associated botnets https://blog.sekoia.io/a-glimpse-into-the-quad7-operators-next-moves-and-associated-botnets/#h-conclusion
11/09/2024 20:35:54
QRCode
archive.org
thumbnail

Uncover the secrets of the Quad7 botnet and its ever-evolving toolset. Learn about the new backdoors and protocols used by these operators.

sekoia EN 2024 Quad7 botnet toolset backdoors analysis
Solving the 7777 Botnet enigma: A cybersecurity quest https://blog.sekoia.io/solving-the-7777-botnet-enigma-a-cybersecurity-quest/
23/07/2024 23:57:07
QRCode
archive.org
thumbnail
  • Sekoia.io investigated the mysterious 7777 botnet (aka. Quad7 botnet), published by the independent researcher Gi7w0rm inside the “The curious case of the 7777 botnet” blogpost.

  • This investigation allowed us to intercept network communications and malware deployed on a TP-Link router compromised by the Quad7 botnet in France.

  • To our understanding, the Quad7 botnet operators leverage compromised TP-Link routers to relay password spraying attacks against Microsoft 365 accounts without any specific targeting.

  • Therefore, we link the Quad7 botnet activity to possible long term business email compromise (BEC) cybercriminal activity rather than an APT threat actor.

  • However, certain mysteries remain regarding the exploits used to compromise the routers, the geographical distribution of the botnet and the attribution of this activity cluster to a specific threat actor.

  • The insecure architecture of this botnet led us to think that it can be hijacked by other threat actors to install their own implants on the compromised TP-Link routers by using the Quad7 botnet accesses.

sekoia EN 2024 7777 botnet research Quad7 TP-Link routers
PikaBot: a Guide to its Deep Secrets and Operations - Sekoia.io Blog https://blog.sekoia.io/pikabot-a-guide-to-its-deep-secrets-and-operations/
04/06/2024 11:15:28
QRCode
archive.org
thumbnail

Uncover an in-depth analysis of PikaBot, a malware loader used by Initial Access Brokers for network compromise and ransomware deployment.

sekoia EN 2024 PikaBot malware analysis TA577 BlackBasta
Unplugging PlugX: Sinkholing the PlugX USB worm botnet https://blog.sekoia.io/unplugging-plugx-sinkholing-the-plugx-usb-worm-botnet/
26/04/2024 08:01:32
QRCode
archive.org
thumbnail

Learn about our process for collecting telemetry data from PlugX worm-infected workstations, as well as how to disinfect them.
#2024 #EN #PlugX #Sinkhole #USB #botnet #sekoia #worm

botnet Sinkhole sekoia USB worm PlugX EN 2024
Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit https://blog.sekoia.io/tycoon-2fa-an-in-depth-analysis-of-the-latest-version-of-the-aitm-phishing-kit/
26/03/2024 09:09:23
QRCode
archive.org
thumbnail

Tycoon 2FA has become one of the most widespread adversary-in-The-Middle (AiTM) phishing kits over the last few months.

sekoia EN 2024 Tycoon2FA phishing PhaaS AiTM phishing-kit analysis
The Architects of Evasion: a Crypters Threat Landscape https://blog.sekoia.io/the-architects-of-evasion-a-crypters-threat-landscape/
14/03/2024 18:18:31
QRCode
archive.org
thumbnail

Learn about key concepts and different crypters-related activities as well as the lucrative ecosystem of malicious groups that exploit them.

sekoia EN 2024 Crypters Evasion analysis
NoName057(16) DDoSia project: 2024 updates and behavioural shifts https://blog.sekoia.io/noname05716-ddosia-project-2024-updates-and-behavioural-shifts/
01/03/2024 16:43:41
QRCode
archive.org
thumbnail

Learn about NoName057(16), a pro-Russian hacktivist group behind Project DDoSia targeting entities supporting Ukraine. Discover an overview of the changes made by the group, both from the perspective of the software shared by the group to generate DDoS attacks and the specifics of the evolution of the C2 servers. It also provides an overview of the country and sectors targeted by the group for 2024.

sekoia EN 2024 NoName057(16) DDoSia Analysis
The Predator spyware ecosystem is not dead https://blog.sekoia.io/the-predator-spyware-ecosystem-is-not-dead/
29/02/2024 13:44:02
QRCode
archive.org
thumbnail

Discover our TDR team's revelations about Predator spyware: its C2 infrastructure and list of countries still using its cyber espionage tool.

sekoia En 2024 Predator spyware Angola Madagascar Indonesia Kazakhstan Egypt Botswana Mongolia Sudan
Scattered Spider laying new eggs https://blog.sekoia.io/scattered-spider-laying-new-eggs/
22/02/2024 13:53:44
QRCode
archive.org
thumbnail

Discover the techniques, tactics (TTPs) used by Scattered Spider intrusion set, including social engineering and targeted phishing campaigns.

sekoia EN 2024 analysis TTPs Scattered-Spider phishing intrusion Social-engineering
CALISTO doxxing : Sekoia.io findings concurs to Reuters’ investigation on FSB-related Andrey Korinets https://blog.sekoia.io/calisto-doxxing-sekoia-io-findings-concurs-to-reuters-investigation-on-fsb-related-andrey-korinets/
13/12/2023 15:30:13
QRCode
archive.org
thumbnail

Discover activities linking Korinets to CALISTO doxxing in our investigation. Uncover details from emails, domains & servers used to target UK Parliament & Cambridge University.

sekoia EN 2023 Korinets CALISTO doxxing mail whois
Following NoName057(16) DDoSia Project’s Targets https://blog.sekoia.io/following-noname05716-ddosia-projects-targets/
04/07/2023 08:30:18
QRCode
archive.org
thumbnail

DDoSia is a DDoS attack toolkit used by the pro-Russia hacktivist group NoName057(16) against countries critical the invasion of Ukraine.

sekoia EN 2023 DDOSIA NoName057(16)
SEKOIA.IO analysis of the #VulkanFiles leak https://blog.sekoia.io/sekoia-io-analysis-of-the-vulkanfiles-leak/
01/04/2023 20:21:11
QRCode
archive.org
  • Exfiltrated Russian-written documents provide insights into cyber offensive tool projects contracted by Vulkan private firm for the Russian Ministry of Defense.

  • Scan-AS is a database used to map adversary networks in parallel or prior to cyber operations. Scan-AS is a subsystem of a wider management system used to conduct, manage and capitalize results of cyber operations.

  • Amezit is an information system aimed at managing the information flow on a limited geographical area. It allows communications interception, analysis and modification, and can create wide information campaigns through social media, email, altered websites or phone networks.

sekoia EN 2023 analysis vulkanfiles leaks Russia Scan-AS Amezit Vulkan
Raspberry Robin's botnet second life https://blog.sekoia.io/raspberry-robins-botnet-second-life/
10/01/2023 20:52:19
QRCode
archive.org
thumbnail

Raspberry Robin appears to be a type of Pay-Per-Install botnet, likely to be used by cybercriminals to distribute other malware.

sekoia EN 2023 RaspberryRobin Pay-Per-Install botnet cybercriminals malware
page 1 / 2
4261 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio