text stringlengths 8 115k |
|---|
# Tracking Cobalt Strike: A Trend Micro Vision One Investigation
In late May, Trend Micro Managed XDR alerted a customer to a noteworthy Vision One alert on one of their endpoints. What followed was a deeper investigation that involved searching for other similarly infected endpoints and the confirmation of a Cobalt S... |
# ENISA Threat Landscape 2015
## About ENISA
The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector, and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on ... |
# Chasing Chaes Kill Chain
**January 25, 2022**
by Anh Ho and Igor Morgenstern
## Introduction
Chaes is a banking trojan that operates solely in Brazil and was first reported in November 2020 by Cybereason. In Q4 2021, Avast observed an increase in Chaes’ activities, with infection attempts detected from more than... |
# Operation RestyLink: 日本企業を狙った標的型攻撃キャンペーン
Ryu Hiyoshi
本日の記事は、SOC アナリスト 小池 倫太郎の記事です。
---
2022年4月中旬から日本企業を狙った標的型攻撃キャンペーンを複数の組織で観測しています。この攻撃キャンペーンは2022年3月にも活動していたと考えられ、また2021年10月にも関連した攻撃が行われていた可能性があります。このことから、短期・単発的な攻撃キャンペーンではなく、今後も攻撃が継続する可能性があります。本稿では、この攻撃キャンペーンについて詳細な解析を行い、その攻撃主体の帰属について検討します。
## 攻撃概要
2022年4月中旬に観... |
# Joker’s Stash, the Largest Carding Marketplace, Shuts Down
**January 15, 2021**
## Key Findings
Joker’s Stash, the largest dark web marketplace in the underground payment card economy, has announced that it is shutting down. While this marketplace was the largest in the carding space, it also exhibited a severe de... |
# Analyzing CrossRAT
**Objective-See**
**Date:** 1/24/2018
I'm on a plane again...this time flying home from one of my favorite hacker cons: ShmooCon! I was stoked to give a talk about auditing on macOS. Yah, I know that doesn't seem like the sexiest of topics - but if you're interested in incident response, malw... |
# CrystalBit / Apple Double DLL Hijack
As part of a rapid change in the work environment during the COVID-19 pandemic, Morphisec Labs has been tracking the change in the attack trend landscape. This has included the evolution of adware, PUA, and fraudulent software bundle delivery beyond a consumer problem into a sign... |
# MountLocker – Some Pseudo-Code Snippets
## Generate CLIENT_ID
```c
for (client_id_pos = StrStrIA(psz_recovery_manual_ransom_note, "%CLIENT_ID%"); client_id_pos; client_id_pos = StrStrIA(psz_recovery_manual_ransom_note, "%CLIENT_ID%")) {
cnt = 32i64;
client_id_str = g_str_879538e20b82e80052dd5f7ef9ad5077;
... |
# Cuba Ransomware Group’s New Variant Found Using Optimized Infection Techniques
Cuba ransomware is a malware family that has been seasonally detected since it was first observed in February 2020. It resurfaced in November 2021 based on the FBI’s official notice and has reportedly attacked 49 organizations in five cri... |
# The DAA File Format
In diary entry "Malicious .DAA Attachments", we extracted a malicious executable from a Direct Access Archive file. Let's take a closer look at this file format. Here is a hex/ascii dump of the beginning of the file:
With the source code of DAA2ISO, I was able to make some sense of this data. I ... |
# Raccoon Back with New Claws!
By Rahul R
July 18, 2022
Raccoon infostealer was first released in April 2019. The initial Version 1 (V1) was distributed in Telegram groups and other forums as Malware-as-a-Service (MaaS). Now the stealer has been updated with new features and comes packed with commercial packers. It... |
# Microsoft Exchange Servers Hacked to Deploy Cuba Ransomware
**By Bill Toulas**
**February 24, 2022**
The Cuba ransomware operation is exploiting Microsoft Exchange vulnerabilities to gain initial access to corporate networks and encrypt devices. Cybersecurity firm Mandiant tracks the ransomware gang as UNC2596 ... |
# Part 1: Analysing MedusaLocker Ransomware
In this 3-part post, we share the tradecraft from an RDP brute force linked ransomware event (MedusaLocker) we responded to in June 2020. We cover the business ramifications of the attack, technical analysis, and some advice based on attacks such as these.
Ransomware is a s... |
# Help for Ukraine: Free Decryptor for HermeticRansom Ransomware
On February 24th, the Avast Threat Labs discovered a new ransomware strain accompanying the data wiper HermeticWiper malware, which our colleagues at ESET found circulating in Ukraine. Following this naming convention, we opted to name the strain we foun... |
# Meta’s Adversarial Threat Report, First Quarter 2023
Today, as part of our quarterly threat reporting, we’re sharing a number of security updates, including our Q1 Adversarial Threat Report and insights into our work against malware campaigns.
Over the past five years, we’ve shared our findings about threats we det... |
# njRat: Indicators of Compromise
**March 5, 2020**
## Indicators of Compromise
**Hostnames analyzed:**
- Bank.capeturk.com
- Blog.capeturk.com
- Checkout.capeturk.com
- Capeturk.com
- anandpen.com
- 1111.elitfilmizle.com
- 2222.elitfilmizle.com
- 3333.elitfilmizle.com
- 4444.elitfilmizle.com
- 5555.elitfilmizle.com... |
# Red October: Detailed Malware Description
## First Stage of Attack
1. Exploits
2. Dropper
3. Loader Module
4. Main component
## Second Stage of Attack
1. Modules, general overview
2. Recon group
3. Password group
4. Email group
5. USB drive group
6. Keyboard group
7. Persistence group
8. Spreading group
9. Mobile... |
# 2021 Cryptojacking Trends and Investigation Recommendations
Throughout 2021, the CrowdStrike Falcon OverWatch™ team has observed the volume of cryptojacking intrusions more than quadruple compared to 2020. ECrime adversaries are using cryptojacking as a means of monetizing an intrusion, in addition to ransom demands... |
# The Dexter Malware: Getting Your Hands Dirty
A very interesting piece of malware that targets Point of Sale systems has recently surfaced in the malware community. As a guy who frequently reverses malware that targets card data (aka. Track data), this caused me to take notice. Before I jump into the really interesti... |
# UpnP – Messing up Security since years
UpnP is a set of networking protocols to permit network devices to discover each other’s presence on a network and establish services for various functionalities. Too lazy to port forward yourself? Just enable UpnP to automatically establish working configurations with devices!... |
# Mariposa Botnet Author, Darkcode Crime Forum Admin Arrested in Germany
A Slovenian man convicted of authoring the destructive and once-prolific Mariposa botnet and running the infamous Darkode cybercrime forum has been arrested in Germany on request from prosecutors in the United States, who’ve recently re-indicted ... |
# Malware Burrows Deep into Computer BIOS to Escape AV
## Dan Goodin
Researchers have discovered one of the first pieces of malware ever used in the wild that modifies the software on the motherboard of infected computers to ensure the infection can't be easily eradicated. Known as Trojan.Mebromi, the rootkit reflash... |
# Executive Overview of Russian Aggression Against Ukraine
**Executive Summary**
In the event of a renewed Russian invasion of Ukraine, it is likely that cyber offensive actions targeting Ukraine will primarily consist of distributed denial-of-service (DDoS) attacks and website defacements against Ukrainian governme... |
# McAfee Labs Threats Report
## June 2017
### Executive Summary
There are hundreds, if not thousands, of evasion techniques employed by malware authors. We examine some of these techniques and how malware authors use them to accomplish their goals.
### Key Topics
#### Malware evasion techniques and trends
Malware dev... |
# Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: Mustang Panda Deploys a New Wave of Malware Targeting Europe
By Jung Soo An, Asheer Malhotra, and Justin Thattil, with contributions from Aliza Berk and Kendall McKay.
In February 2022, corresponding roughly with the start of the Russian invasion o... |
# Cyber Security Updates
**09 March 2021**
**Why managing the human factors is crucial to a successful cyber security crisis response**
In this blog, Lorena Gutierrez discusses why a successful response to a cyber security crisis strongly relies on a number of human factors.
**08 March 2021**
**Womxn in Cyber’s... |
# 奇安信威胁情报中心
## 背景
2020年9月,Quick Heal披露了一起针对印度国防军和武装部队陆军人员的窃密行动并将其命名为Operation SideCopy。行动始于2019年初,其攻击者主要以复制Sidewinder APT组织的TTPs进行攻击,故被命名为Operation SideCopy。研究人员在此次活动中有如下发现:
1. 活动中几乎所有C2都属于Contabo GmbH托管服务提供商,该托管服务器在南亚地区的威胁组织中较受青睐,CrimsonRAT以及TransparentTribe其他武器都曾连接到Contabo GmbH;
2. Operation SideCopy在活动中所使用域名的命名方式... |
# Detect and Prevent the SolarWinds Build-Time Code Injection Attack
February 17, 2021
We have developed a patent-pending technology to detect and prevent SolarWinds-style attacks before shipping binaries to production, in both on-prem and cloud environments. In order to understand how this new capability works techn... |
# New Panda Stealer Targets Cryptocurrency Wallets
The other infection chain involves an attached .XLS file containing an Excel formula that utilizes a PowerShell command to access paste.ee, a Pastebin alternative, that accesses a second encrypted PowerShell command. Decoding these PowerShell scripts revealed that the... |
# Trellix Global Defenders: Analysis and Protections for RagnarLocker Ransomware
The United States Federal Bureau of Investigation (FBI) has released a Flash Alert warning that the RagnarLocker ransomware gang has breached the networks of at least fifty-two organizations from multiple critical infrastructure sectors a... |
# Threat Actors Target Government of Belarus Using CMSTAR Trojan
Palo Alto Networks Unit 42 has identified a series of phishing emails containing updated versions of the previously discussed CMSTAR malware family targeting various government entities in Belarus.
We first reported on CMSTAR in spear phishing attacks ... |
# The Zero-Day Exploits of Operation WizardOpium
**Authors**
Boris Larin
Alexey Kulaev
Back in October 2019, we detected a classic watering-hole attack on a North Korea-related news site that exploited a chain of Google Chrome and Microsoft Windows zero-days. While we’ve already published blog posts briefly des... |
# Operation Ke3chang Resurfaces With New TidePool Malware
**By Micah Yates, Mike Scott, Brandon Levene, Jen Miller-Osborn, Tom Keigher**
**May 22, 2016**
**Category:** Malware, Unit 42
**Tags:** AutoFocus, BS2005, CVE-2015-2545, Ke3chang, Operation Ke3chang, TidePool
## Introduction
Little has been published... |
# Gootloader: ‘Initial Access as a Service’ Platform Expands Its Search for High Value Targets
Antonio Pirozzi
The ongoing Gootloader campaign expands its scope to highly sensitive assets worldwide including financial, military, automotive, pharmaceutical, and energy sectors, operating on an Initial Access as a Servi... |
# Cyber Threat Intelligence & Incident Response
**29 November 2019**
**Thomas Thomasen**
Senior Manager, Threat Intelligence Specialist
Part of Deloitte’s Global Cyber Threat Intelligence Team & Deloitte DK’s IR Team
Former Analyst at Danish Defence. MSc Theory and History of International Relations
I love t... |
# Conti Ransomware Source Code Leaked by Ukrainian Researcher
A Ukrainian researcher continues to deal devastating blows to the Conti ransomware operation, leaking further internal conversations, as well as the source for their ransomware, administrative panels, and more. It has been quite a damaging week for Conti af... |
# TeleBots are back: Supply-chain attacks against Ukraine
This blogpost reveals many details about the Diskcoder.C (aka ExPetr or NotPetya) outbreak and related information about previously unpublished attacks.
## TeleBots
In December 2016, we published two detailed blogposts about disruptive attacks conducted by th... |
# Bedep has raised its game vs Bot Zombies
**2016-04-14 - Deception**
**Simulacra & Simulation - Jean Baudrillard**
Featured in Matrix
Bedep could be described as a fileless loader with a resident module that can optionally perform AdFraud. It's intimate to Angler EK and appeared around August 2014. On 2016-03-24... |
# Pay No Attention to the Server Behind the Proxy: Mapping FinFisher’s Continuing Proliferation
**October 15, 2015**
**Categories:** Adam Senft, Bill Marczak, Irene Poetranto, John Scott-Railton, Reports and Briefings, Research News, Sarah McKune
**Authors:** Bill Marczak, John Scott-Railton, Adam Senft, Irene Poe... |
# FIN7 Not Finished – Morphisec Spots New Campaign
This blog was co-authored by Alon Groisman.
It seems like the rumors of FIN7’s decline have been hasty. Just a few months after the well-publicized indictment of three high-ranking members in August, Morphisec has identified a new FIN7 campaign that appears to be tar... |
# How SunBurst Malware Does Defense Evasion
In an effort attributed to actors working for or on behalf of a national government, an unknown adversary compromised the software supply chain of the enterprise IT management firm SolarWinds to distribute malicious code. The success of that attack, dubbed Sunburst, gave the... |
# LockBit Ransomware
## Ransom Gates
- lockbitkodidilol.onion
- lockbitks2tvnmwk.onion
## Ransom Note
- Restore-My-Files.txt
## Ransom Extension
- .lockbit
## E-mail
- ondrugs@firemail.cc
## Persistence
- HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XO1XADpO01
## Mutex
- Global{BEF590BE-11A6-442A-A85B-656C1... |
# Secrets of the Comfoo Masters
**Author:** Joe Stewart and Don Jackson, Dell SecureWorks Counter Threat Unit™
**Threat Intelligence**
**Date:** 31 July 2013
## Introduction
The details of organized cyber-espionage campaigns are becoming more public. So-called "Advanced Persistent Threat" (APT) attacks are com... |
# Carbanak Gang is Back and Packing New Guns
The Carbanak financial APT group made the headlines when Group-IB and Fox-IT broke the news in December 2014, followed by the Kaspersky report in February 2015. The two reports describe the same cybercriminal gang which stole up to several hundreds of millions of dollars fr... |
# retefe
Artefacts from various retefe campaigns
## Sources
Potential sources for various methods/functions:
1. QuasarRAT/Client/Core/Recovery/Browsers/Firefox.cs
2. Pastebin: Firefox 37+ Password & Cookie Recovery
3. PowerShell Code Repository: Using Task Sch, wrapper by BattleChicken
4. Получить handle дочернего ... |
# Microsoft Help Files Disguise Vidar Malware
Microsoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug. |
# “KONNI” MALWARE 2019 CAMPAIGN
## Executive Summary
Throughout 2019, CyberInt Research observed multiple events related to Konni, a remote administration tool, observed in the wild since early 2014. The Konni malware family is potentially linked to APT37, a North Korean cyber espionage group active since 2012. The g... |
# The Ad Blocker That Injects Ads
Deceptive ad injection is a growing concern on the internet today, affecting many people browsing the web. While the concept isn’t new (Google stated it was the most common complaint amongst Chrome users back in 2015), bad actors are constantly refining their techniques.
Imperva’s re... |
# Mirai Activity Picks up Once More After Publication of PoC Exploit Code
The publication of proof-of-concept (PoC) exploit code in a public vulnerabilities database has led to increased activity from Mirai-based IoT botnets, Li Fengpei, a security researcher with Qihoo 360 Netlab, told Bleeping Computer today. The ex... |
# BrasDex: A New Brazilian ATS Android Banker with Ties to Desktop Malware
## A Varied and Wild Landscape
The mobile malware landscape of the LATAM region, specifically Brazil, has recently risen to prominence due to families like Brata and Amextroll, extending their reach to Europe. However, not all malware develope... |
# Rise in XorDdos: A Deeper Look at the Stealthy DDoS Malware Targeting Linux Devices
In the last six months, we observed a 254% increase in activity from a Linux trojan called XorDdos. First discovered in 2014 by the research group MalwareMustDie, XorDdos was named after its denial-of-service-related activities on Li... |
# Malicious Document Targets Vietnamese Officials
After our investigation of APT SideWinder, we’ve created a YARA rule for hunting RTF documents exploiting the CVE-2017–11882. We found a document written in Vietnamese dealing with a summary about different projects in the district Hải Châu of Đà Nẵng.
In this article... |
# Qakbot Being Distributed via Virtual Disk Files (*.vhd)
December 22, 2022
There’s been a recent increase in the distribution of malware using disk image files. Out of these, the Qakbot malware has been distributed in ISO and IMG file formats, and the ASEC analysis team discovered that it has recently changed its di... |
# APT35 Automates Initial Access Using ProxyShell
In December 2021, we observed an adversary exploiting the Microsoft Exchange ProxyShell vulnerabilities to gain initial access and execute code via multiple web shells. The overlap of activities and tasks was remarkably similar to that observed in our previous report, ... |
# Trojan Tricks Victims Into Transferring Funds
It’s horrifying enough when a computer crook breaks into your PC, steals your passwords and empties your bank account. Now, a new malware variant uses a devilish scheme to trick people into voluntarily transferring money from their accounts to a cyber thief’s account.
T... |
# Indicators of Compromise
- 21de75a8d9d38f342b508015d7a9a7021cea SHA256 CryptoWall/H1N1
- 85c29d2f7fabd1ec29be545806b6 Loader Document
- 4de3f3789c70eef3a8eeb0f8934e6b2dfcc27d SHA256 CryptoWall/H1N1
- d7e0c38be428f45f6d7ee2d58e Loader Document
- f135871e5d8a2455db8f6c961f701a4f3ba61e SHA256 CryptoWall/H1N1
- ... |
# Multistage FreeDom Loader Used to Spread AZORult and NanoCore RAT
In March 2020, ThreatLabz observed several Microsoft Office PowerPoint files being used in the wild by a threat actor to spread AZORult and NanoCore RAT. The malicious files in this campaign used an interesting payload delivery method that distinguish... |
# Fake e‑shops on the prowl for banking credentials using Android malware
ESET researchers analyzed three malicious applications targeting customers of eight Malaysian banks. The popularity of online shopping has been growing during the past few years, a trend accelerated by the pandemic. To make this already convenie... |
# The Art and Science of Detecting Cobalt Strike
**By Nick Mavis**
**Edited by Joe Marshall and Jon Munshaw**
**Updated September 11, 2020**
---
## Introduction
Cobalt Strike is ubiquitous in the cybersecurity arena. It’s a prolific toolkit used at many levels of intrusion to solve adversaries' problems like po... |
# North Korean Hacking Group Steals $13.5 Million From Indian Bank
**Jai Vijayan**
**August 27, 2018**
Tactics that Lazarus Group used to siphon money from India's Cosmos Bank were highly sophisticated, Securonix says.
North Korean-linked Lazarus Group is believed responsible for stealing $13.5 million from Indi... |
# Inside the EquationDrug Espionage Platform
## Authors
GReAT
## Introduction
EquationDrug is one of the main espionage platforms used by the Equation Group, a highly sophisticated threat actor that has been engaged in multiple CNE (computer network exploitation) operations dating back to 2001, and perhaps as early a... |
# Purgalicious VBA: Macro Obfuscation With VBA Purging
**Threat Research**
Andrew Oliveau, Alyssa Rahman, Brett Hawkins
Nov 19, 2020
Malicious Office documents remain a favorite technique for every type of threat actor, from red teamers to FIN groups to APTs. In this blog post, we will discuss "VBA Purging", a ... |
# GRU 26165: The Russian Cyber Unit That Hacks Targets On-Site
By Justin Sherman
Russian hackers are not always breaching targets from afar, typing on their keyboards in Moscow bunkers or St. Petersburg apartment buildings. For some Russian government hackers, foreign travel is part of the game. They pack up their eq... |
# CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE Vulnerability “Follina”
At the end of last week, @nao_sec, an independent cyber security research team, tweeted about a malicious Microsoft Word document submitted from Belarus that leverages remote templates to execute a PowerShell payload using the "ms-m... |
# Dissecting the Qadars Banking Trojan
Qadars is a sophisticated and dangerous trojan used for crimeware-related activities including banking fraud and credential theft. Qadars targets users through exploit kits and is installed using Powershell Scripts. We have observed Qadars targeting multiple well-known banks in t... |
# ESET Threat Report Q3 2020
## Foreword
Welcome to the Q3 2020 issue of the ESET Threat Report! As the world braces for a pandemic-ridden winter, COVID-19 appears to be losing steam at least in the cybercrime arena. With coronavirus-related lures played out, crooks seem to have gone “back to basics” in Q3 2020. An a... |
# UNVEILING THE CRYPTOMIMIC
**Hajime Takai, Shogo Hayashi & Rintaro Koike**
NTT Security (Japan) KK
hajime.takai@global.ntt
syogo.hayashi@global.ntt
rintaro.koike@global.ntt
## ABSTRACT
CryptoMimic (also called Dangerous Password) is an APT actor that has been observed since around March 2018. It is report... |
# Op. “Pistacchietto”: An Italian Job
## Introduction
In the past weeks, a new strange campaign emerged in the Italian landscape. It has been baptized “Operation Pistacchietto” from a username extracted from a Github account used to serve some part of the malware. This campaign has been initially studied by C.R.A.M. ... |
# UDPoS - Exfiltrating Credit Card Data via DNS
In the current era of mass malware, it's becoming increasingly rare to find something beyond the ‘usual suspects’ we see being spread by high-profile botnets on a regular basis: Dridex spread by Necurs, the ever-increasing number of ransomware families, cryptocurrency mi... |
# Inside of CL0P’s Ransomware Operation
**Blog.Telekom**
**01‑14‑2021**
**Thomas Barabosch**
**17 Comments**
TA505 (also known as FIN11) is a financially motivated cybercrime actor. They conduct Big Game Hunting operations, such as deployment of ransomware and extortion of large ransom payments. In the past, I ... |
# Let's Talk About FlexiSpy
## Introduction
I started this blog post to explain the context of FlexiSpy leaks and show some information I have found during my analysis. This information is incomplete and there is still plenty of analysis of source code or binaries to be done. I have uploaded the source code and binari... |
# Ransomware Recap: Dec. 19 - Dec. 31, 2016
Christmas brought an unwanted surprise to one family in 2016. On December 25, software engineer Darren Cauthon tweeted an image showing his family's LG smart TV had been infected with ransomware. The smart TV was disabled and displayed a ransom note mimicking a notification ... |
# FIN7 Recruits Talent For Push Into Ransomware
The intelligence in this report was gathered by a source who was recruited by “Bastion Secure”. Gemini Advisory’s investigation and analysis of the source’s information has been ongoing for the past several months. Although sensitive information has been redacted from th... |
# Nexus: A New Android Botnet?
**Key Point**
On January 2023, a new Android banking trojan appeared on multiple hacking forums under the name of Nexus. However, Cleafy’s Threat Intelligence & Response Team traced the first Nexus infections way before the public announcement in June 2022. Nexus is promoted via a Malw... |
# OPERATION ARID VIPER
## Introduction
Trend Micro researchers discovered an ongoing malware campaign that targets Israeli victims and leverages network infrastructure in Germany. The campaign has strong attribution ties to Arab parties located in the Gaza Strip and elsewhere.
Picture the following reconstruction b... |
# Tarrask Malware Uses Scheduled Tasks for Defense Evasion
As Microsoft continues to track the high-priority state-sponsored threat actor HAFNIUM, new activity has been uncovered that leverages unpatched zero-day vulnerabilities as initial vectors. The Microsoft Detection and Response Team (DART), in collaboration wit... |
# Ursnif Malware: Deep Technical Dive
In this blog, I explain some of the core methods an attack tool named Ursnif uses, as well as mention some, probably unintentional, pieces of code that were left behind in the production version of the malware.
Ursnif is a data stealer and a downloader with a lot of abilities to ... |
# Pulling the Curtains on Azov Ransomware: Not a Skidsware but Polymorphic Wiper
**Research by:** Jiri Vinopal
## Highlights
- Check Point Research (CPR) provides under-the-hood details of its analysis of the infamous Azov Ransomware.
- Investigation shows that Azov is capable of modifying certain 64-bit executables ... |
# HOW DO YOU LIKE DEM EGGS? I LIKE MINE SCRAMBLED, REALLY SCRAMBLED - A LOOK AT A RECENT more_eggs SAMPLES
## Mo Bustami
### BACKGROUND
The topic of discussion has been covered quite well in the past years, with some analysis focusing on the human element and actors behind the tools, and other analysis attributing t... |
# Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques
**Written By**
Cybereason Nocturnus
May 4, 2022 | 11 minute read
In 2021, the Cybereason Nocturnus Incident Response Team investigated multiple intrusions targeting technology and manufacturing companies located in Asia, Europe, and North America... |
# 2022 Cybersecurity Predictions
Cyberint Research Team will try and shed some light on the upcoming year: the key security risks and threats, and what we feel will change in the coming year. |
# BlackMatter & Haron: Evil Ransomware Newborns or Rebirths
Microsoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug. |
# Demystifying the Full Attack Chain of MineBridge RAT
## Introduction
In March 2021, threat actors started distributing MineBridge RAT with an updated distribution mechanism. Morphisec blogged about the partial attack chain of this new attack but could not find the origin or initial stages of the attack chain. In Ma... |
# Pingback: Backdoor At The End Of The ICMP Tunnel
## Introduction
In this post, we analyze a piece of malware that we encountered during a recent breach investigation. What caught our attention was how the malware achieved persistence, how it used ICMP tunneling for its backdoor communications, and how it operated w... |
# DarkSky Botnet
Radware’s Threat Research has recently discovered a new botnet, dubbed DarkSky. DarkSky features several evasion mechanisms, a malware downloader, and a variety of network- and application-layer DDoS attack vectors. This bot is now available for sale for less than $20 over the Darknet. As published by... |
# AVIVORE – Hunting Global Aerospace through the Supply Chain
Until now, most prominent supply chain intrusions have been "vertical"; initial victims are typically Managed Services Providers or software vendors leveraged by attackers to move up or down the supply chain. However, since summer 2018, Context Information ... |
# SideWinder
There is no description at this point.
## References
- 2022-04-14 ⋅ Medium (@CDSO_CyTec) ⋅ DCSO CyTec
- 2021-03-04 ⋅ Malpedia ⋅ Malpedia
- 2021-01-13 ⋅ AlienVault ⋅ Tom Hegel: A Global Perspective of the SideWinder APT
- 2020-12-09 ⋅ Trend Micro ⋅ Joseph C Chen, Jaromír Hořejší, Ecular Xu: SideWinder Le... |
# Investigation of a Long-Lived Phishing Kit
## Executive Summary
Phishing kits are powerful enablers of digital crime. By providing a ready-made format that can be purchased by anyone, the barrier to creating convincing fake login portals is nearly eliminated. Recent reports indicate attacks leveraging phishing kits... |
# WhisperGate
## Introduction
Dozens of Ukrainian government sites, including the Ministry of Foreign Affairs, Cabinet of Ministers, and Security Council, have been hit by a massive cyber attack. Microsoft incident response team recently released samples of destructive malware used in the campaign.
## Samples
- vir... |
# SPECIAL REPORT
## APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION
### Introduction
APT30 is noted for sustained activity, but also for successfully maintaining the same tools, tactics, and infrastructure since at least 2005. When our Singapore-based FireEye Labs team examined targets, which pos... |
# Breaking The Weakest Link Of The Strongest Chain
**Authors**
IDF C4I
Ido Naor
Around July last year, more than 100 Israeli servicemen were hit by a cunning threat actor. The attack compromised their devices and exfiltrated data to the attackers’ command and control server. In addition, the compromised devices... |
# ZeroAccess / Max++ / Smiscer Crimeware Rootkit Sample
## Post Update Feb 24, 2011
Download MaxRootkit_2011_1.exe as a password protected archive (contact me if you need the password).
### Virustotal
**Submission date:** 2011-02-14 14:41:24 (UTC)
**Result:** 25 / 43 (58.1%)
| Antivirus | Version ... |
# Divergent: "Fileless" NodeJS Malware Burrows Deep Within the Host
**Update (09/27/2019):** Additional information regarding the malware interaction with various online advertisements has been included to highlight the click-fraud related network communications associated with Divergent.
## Executive Summary
Cisco ... |
# Analysis of ShadowHammer ASUS Attack First Stage Payload
**Introduction**
On March 25th 2019, Kaspersky released a high-level advisory describing the attack against ASUS:
“In January 2019, we discovered a sophisticated supply chain attack involving the ASUS Live Update Utility. The attack took place between June... |
# Annual Threat Trends 2021
**Equipe Cyber Threat Intelligence**
February 8, 2022
## Surge in Ransomware Attacks
2722
That’s the total number of ransomware attacks claimed in 2021, corresponding to 7 claims per day.
### Targeted Geography
When looking at the victimology of ransomware operators, one significant... |
# See Ya Sharp: A Loader’s Tale
**By Max Kersten on Aug 04, 2021**
## Introduction
The DotNet based CyaX-Sharp loader, also known as ReZer0, is known to spread commodity malware, such as AgentTesla. In recent years, this loader has been referenced numerous times, as it was used in campaigns across the globe. The tal... |
# DAAM Android Botnet Being Distributed Through Trojanized Applications
**April 20, 2023**
## Botnet With Ransomware And Data Theft Capabilities
In recent years, the widespread use of Android devices has made them a prime target for cybercriminals. Android botnet is a common malware type that cybercriminals use to g... |
# Unit 42 Identifies New DragonOK Backdoor Malware Deployed Against Japanese Targets
**By Jen Miller-Osborn and Josh Grunzweig**
**April 14, 2015**
## Summary
Palo Alto Networks Unit 42 used the AutoFocus threat intelligence service to identify a series of phishing attacks against Japanese organizations. Using A... |
# RATel
**Language:** Python3, C++, SQL
**Version:** Beta
**License:** MIT
**Commit Activity:** 0/month
**Stars:** 224
**Visitor:** 24224
**Please do not upload to virustotal!**
To prevent RATel from being detected by antivirus, please do not upload the payload to TOTAL VIRUS. Each month I will test mys... |
# New GnatSpy Mobile Malware Family Discovered
**December 18, 2017**
We came across a new mobile malware family which we have called GnatSpy. We believe that this is a new variant of VAMP, indicating that the threat actors behind APT-C-23 are still active.
Earlier this year, researchers first disclosed a targeted at... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.