Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
5 résultats taggé spoofing  ✕
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks https://www.welivesecurity.com/en/eset-research/thewizards-apt-group-slaac-spoofing-adversary-in-the-middle-attacks/
01/05/2025 13:31:03
QRCode
archive.org
thumbnail

ESET researchers publish an analysis of Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks.<<

  • We discovered a malicious downloader being deployed, by legitimate Chinese software update mechanisms, onto victims’ machines.
  • The downloader seeks to deploy a modular backdoor that we have named WizardNet.
  • We analyzed Spellbinder: the tool the attackers use to conduct local adversary-in-the-middle attacks and to redirect traffic to an attacker-controlled server to deliver the group’s signature backdoor WizardNet.
  • We provide details abouts links between TheWizards and the Chinese company Dianke Network Security Technology, also known as UPSEC.
welivesecurity EN 2025 TheWizards APT SLAAC UPSEC spoofing adversary-in-the-middle lateral-movement
Censorship Attack against the Tor network https://osservatorionessuno.org/blog/2024/10/censorship-attack-against-the-tor-network/
04/11/2024 07:00:25
QRCode
archive.org

In the last few days, many Tor relay operators - mainly hosting relay nodes on providers like Hetzner - began receiving abuse notices.
All the abuses reported many failed SSH login attempts - part of a brute force attack - coming from their Tor relays.

Tor relays normally only transport traffic between a guard and an exit node of the Tor network, and per-se should not perform any SSH connections to internet-facing hosts, let alone performing SSH brute force attacks.

osservatorionessuno EN 2024 Tor network spoofing attack relays SSH
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52
14/10/2024 08:59:24
QRCode
archive.org
thumbnail

1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies - zendesk.md

hackermondev EN 2024 Zendesk email spoofing
Spoofed GlobalProtect Used to Deliver Unique WikiLoader Variant https://unit42.paloaltonetworks.com/global-protect-vpn-spoof-distributes-wikiloader/
02/09/2024 16:28:57
QRCode
archive.org
thumbnail

Unit 42 discusses WikiLoader malware spoofing GlobalProtect VPN, detailing evasion techniques, malicious URLs, and mitigation strategies. Unit 42 discusses WikiLoader malware spoofing GlobalProtect VPN, detailing evasion techniques, malicious URLs, and mitigation strategies.

unit42 EN 2024 WikiLoader malware spoofing GlobalProtect VPN
SMTP Smuggling - Spoofing E-Mails Worldwide https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/
18/12/2023 13:20:04
QRCode
archive.org
thumbnail

Introducing a novel technique for e-mail spoofing

sec-consult EN 2023 e-mail spoofing technique
4623 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio