Quotidien Hebdomadaire Mensuel

Hebdomadaire Shaarli

Tous les liens d'un semaine sur une page.

Semaine 27 (July 3, 2023)

The five-day job: A BlackByte ransomware intrusion case study

In a recent investigation by Microsoft Incident Response of a BlackByte 2.0 ransomware attack, we found that the threat actor progressed through the full attack chain, from initial access to impact, in less than five days, causing significant business disruption for the victim organization.

Une entreprise genevoise au cœur d’une vaste opération d’influence des Emirats arabes unis

Collecte de données privées, désinformation et tentative d’influence politique: entre 2017 et au moins 2020, l’entreprise Alp Services à Genève orchestre dans le plus grand secret plusieurs actions pour le compte des Emirats arabes unis, révèlent des documents confidentiels obtenus par Mediapart, et partagés notamment avec la RTS

Unmasking the Meduza Stealer: Comprehensive Analysis & Countermeasures

Read Uptycs' analysis of the newly discovered Meduza Stealer malware targeting Windows users, revealing capabilities, potential impact & mitigation steps.

Two spyware tied with China found hiding on the Google Play Store

This week, our engine detected two spyware hiding on the Google Play Store and affecting up to 1.5 million users.

Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks

“Write once, infect everywhere” might be the new cybercrime motto, with newly discovered campaigns showing malicious npm packages powering phishing kits and supply chain attacks.

Hacks targeting British exam boards raise fears of students cheating

One incident affected the OCR and Pearson Edexcel examiners, and another hit AQA, Britain's largest exam board.

FBI digital sting against Hive cybercrime group shows the promise — and limits — of hacking hackers

The bureau is trying to take the fight to foreign ransomware gangs, even if it means giving up on bringing some of them behind bars.

Port of Nagoya cyberattack: Japanese port paralysed by LockBit

Japan’s biggest port, the Port of Nagoya, has been shut down after a cyberattack by the LockBit ransomware gang. The Russian cybercriminals have been on a crime spree this week, claiming ten new victims in the last five days.

BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection -

Threat actors are using increasingly sophisticated forms of evasion and anti-analysis as they respond to increased attention to macOS security in the enterprise.

Suspected key figure of notorious cybercrime group arrested in joint operation

Operation Nervone has dealt a significant blow to the OPERA1ER group.

Clop Ransomware: History, Timeline, And Adversary Simulation

The infamous Clop ransomware, mainly known as Cl0p, targets various industries and organizations, extorting data for a huge amount of ransom. It advances actively with new emerging campaigns. This blog walks through the Clop timeline, Mitre TTPs and their emulation.

BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising

Threat actors associated with the BlackCat ransomware have been observed employing malvertising tricks to distribute rogue installers of the WinSCP file transfer application.

Campagne MOVEit : Cl0p divulgue une grande quantité de données volées à Cegedim

Le groupe Cl0p a poursuivi la diffusion des données volées à Cegedim à l’occasion de sa campagne de cyberattaques contre les instances MOVEit Transfer. Il met désormais à disposition plus de 1,5 To de données.

Au mois de juin, la menace des infostealers n’a pas faibli

Plus furtive et discrète que les cyberattaques avec rançongiciel, la menace des maliciels dérobeurs se maintient à un niveau élevé. Panorama de la menace en collaboration avec Sekoia.io.

Following NoName057(16) DDoSia Project’s Targets

DDoSia is a DDoS attack toolkit used by the pro-Russia hacktivist group NoName057(16) against countries critical the invasion of Ukraine.

Chinese Threat Actors Targeting Europe in SmugX Campaign

In the last couple of months, Check Point Research (CPR) has been tracking the activity of a Chinese threat actor targeting Foreign Affairs ministries and embassies in Europe. Combined with other Chinese activity previously reported by Check Point Research, this represents a larger trend within the Chinese ecosystem, pointing to a shift to targeting European entities, with a focus on their foreign policy.

The activity described in this report, utilizes HTML Smuggling to target governmental entities in Eastern Europe. This specific campaign has been active since at least December 2022, and is likely a direct continuation of a previously reported campaign attributed to RedDelta (and also to Mustang Panda, to some extent).

Detecting Popular Cobalt Strike Malleable C2 Profile Techniques

We examine malicious Cobalt Strike case studies with distinct techniques using Malleable C2 profiles.

Malvertising Used as Entry Vector for BlackCat Actors Also Leverage SpyBoy Terminator

We found that malicious actors used malvertising to distribute malware via cloned webpages of legitimate organizations. The distribution involved a webpage of the well-known application WinSCP, an open-source Windows application for file transfer. We were able to identify that this activity led to a BlackCat (aka ALPHV) infection, and actors also used SpyBoy, a terminator that tampers with protection provided by agents.

Decrypted: Akira Ransomware

Researchers for Avast have developed a decryptor for the Akira ransomware and released it for public download. The Akira ransomware appeared in March 2023 and since then, the gang claims successful attacks on various organizations in the education, finance and real estate industries, amongst others.

NCSC marks 20th anniversary of first response to state-sponsored cyber attack

In June 2003, GCHQ experts were involved in responding to a cyber attack against the UK Government for the first time.

TSMC Says Supplier Hacked After Ransomware Group Claims Attack on Chip Giant

The LockBit ransomware group claims to have hacked Taiwan Semiconductor Manufacturing Company (TSMC), but the chip giant says only one of its suppliers was breached.

The notorious cybercrime group announced on Thursday on its website that it targeted TSMC, suggesting — based on the $70 million ransom demand — that it has stolen vast amounts of sensitive information. The victim was initially given seven days to respond, but the deadline has been extended to August 6 at the time of writing.