Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
4 résultats taggé toolset  ✕
Open-source toolset of an Ivanti CSA attacker https://www.synacktiv.com/en/publications/open-source-toolset-of-an-ivanti-csa-attacker
15/05/2025 21:25:15
QRCode
archive.org
thumbnail

In September and October 2024, Ivanti published multiple1 security2 advisories3 regarding security policy bypasses and remote code execution vulnerabilities in their Cloud Services Appliance (CSA) product. It was later revealed by FortiGuard Labs Threat Research's work4 that some threat actors had been actively chaining these vulnerabilities as early as September 9, 2024, before any security advisory or patch was publicly released by Ivanti.

In some compromise scenarios, even though the initial access stemmed from the exploitation of zero-day vulnerabilities, later stages were short of such proficient attacker tradecraft. Threat actors were seen using known malicious tools and noisy payloads for lateral movement, persistence and credential dumping.

Synacktiv's CSIRT was recently in charge of different forensic investigations where the root cause was a vulnerable CSA appliance exposed to the internet. During these engagements, we found a set of open-source tools used by the attacker to achieve its goals. In this article, we take a tour of the OSS toolset from an Ivanti CSA exploiter and discuss related detection capabilities.

  • suo5
  • iox
  • atexec-pro
synacktiv EN 2025 analisys Ivanti CSA attacker toolset CSIRT forensic
A glimpse into the Quad7 operators' next moves and associated botnets https://blog.sekoia.io/a-glimpse-into-the-quad7-operators-next-moves-and-associated-botnets/#h-conclusion
11/09/2024 20:35:54
QRCode
archive.org
thumbnail

Uncover the secrets of the Quad7 botnet and its ever-evolving toolset. Learn about the new backdoors and protocols used by these operators.

sekoia EN 2024 Quad7 botnet toolset backdoors analysis
To the Moon and back(doors): Lunar landing in diplomatic missions https://www.welivesecurity.com/en/eset-research/moon-backdoors-lunar-landing-diplomatic-missions/
17/05/2024 09:22:41
QRCode
archive.org
thumbnail

ESET researchers provide technical analysis of the Lunar toolset, likely used by the Turla APT group, that infiltrated a European ministry of foreign affairs

welivesecurity EN 2024 Lunar toolset Turla APT EU European ministry analysis
PNG Steganography Hides Backdoor https://decoded.avast.io/martinchlumecky/png-steganography/
12/11/2022 22:35:11
QRCode
archive.org
thumbnail

Our deep analysis of the Worok toolset (previously described by ESET Research) reveals the final stage, hidden in a PNG file, that steals data and provides a multifunctional backdoor using the DropBox repository and API.

avast EN 2022 PNG backdoor Worok analysis toolset Steganography
4470 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio