thejapantimes, to random
@thejapantimes@mastodon.social avatar

Despite threats from climate change, AI-enhanced doping and competition from esports, the boss of the International Olympic Committee believes the future has never looked so bright for the Games. https://www.japantimes.co.jp/olympics/2024/04/28/olympics-interest-thomas-bach/ #olympics #2024parisolympics #2028losangelesolympics #ioc #thomasbach

SocraticEthics, to Ukraine
@SocraticEthics@mastodon.online avatar
dubbel, to python
@dubbel@mstdn.io avatar

Reported 15 malicious packages: asyncioo, asyyncio, asyincio, aasyncio, etc...

On install they decrypt Fernet encrypted code, which loads further code from https://funcaptcha[.]ru/paste2?package=asyncioo (replace the parameter with the package name).

I was blocked from accessing that code (am on mobile right now, so I don't have the means to investigate for real, Fernet decryption was already fun :abloblamp: ).

Anyone else able to access it?

Russia accuses Olympic Committee of ‘racism and neo-Nazism’ over opening ceremony decision (kyivindependent.com)

The Kremlin has accused the International Olympic Committee (IOC) of “racism and neo-Nazism” over its decision to bar athletes from Russia and Belarus from participating in the opening ceremony of the Paris Olympics this summer.

thejapantimes, to Russia
@thejapantimes@mastodon.social avatar

Russians and Belarusians will not take part in the parade of athletes at the opening ceremony of the Paris Olympics in July, the International Olympic Committee has said. https://www.japantimes.co.jp/olympics/2024/03/20/russians-belarusians-no-olympic-parade/ #olympics #russia #belarus #russiaukrainewar #2024parisolympics #ioc

gfkdsgn, to Israel German
@gfkdsgn@burma.social avatar

Marathon runner Jesse Joseph waved a flag at the US Olympic trials in solidarity with @palestine
https://piped.video/watch?v=t5hhroE1sMs
Video is recorded by the #EdgeOfSports team and available via #TheRealNewsNetwork

This interview with him was made with Dave Zirin. It's about politics, sports, #sportswashing #IOC #BSD illegal settlements by #Israel, and #inspiring to oppose the #statusquo
https://therealnews.com/us-marathon-runner-waves-palestinian-flag-at-olympic-trials

thejapantimes, to France
@thejapantimes@mastodon.social avatar

Ahead of the Paris Olympics in July and August, French prosecutors are working on four probes into possible wrongdoing, but are the investigations a sign of problems or of genuine efforts to tackle graft? https://www.japantimes.co.jp/olympics/2024/02/21/paris-olympics-corruption-probes/

tagesschau, to Ukraine German
@tagesschau@ard.social avatar

Ukrainischer Skeleton-Profi Heraskewytsch übt Kritik am IOC

Bei den Olympischen Spielen 2022 sorgte der ukrainische Athlet Heraskewytsch mit seinem Protest gegen Krieg für Schlagzeilen. Heute warnt er davor, dass die nächsten Wettbewerbe nicht zu einer Show für russische Propaganda werden dürfen.

➡️ https://www.tagesschau.de/ausland/europa/heraskewytsch-ukraine-sport-100.html?at_medium=mastodon&at_campaign=tagesschau.de

#Interview #Heraskewytsch #Ukraine #Russland #IOC

simontsui, to macos

BitDefender identified a MacOS backdoor written in Rust that has possible link to ALPHV/BlackCat ransomware group. "Specifically, three out of the four command and control servers have been previously associated with ransomware campaigns targeting Windows clients. ALPHV/BlackCat is a ransomware family (also written in Rust), that first made its appearance in November 2021, and that has pioneered the public leaks business model." IOC provided.
🔗 https://www.bitdefender.com/blog/labs/new-macos-backdoor-written-in-rust-shows-possible-link-with-windows-ransomware-group/

#macos #backdoor #threatintel #cybercrime #ransomware #ALPHV #Blackcat #IOC #Rustdoor

riskybusiness, to random

This week's feature guest is CISA's assistant director for cybersecurity Eric Goldstein. He'll talk about CISA ordering USG agencies to disconnect their Ivanti equipment, the Volt Typhoon campaign and a Politico report into CISA's Joint Cyber Defense Collaborative. Up later today

simontsui,

HOT OFF THE PRESS: CISA: PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure
🔗 https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a

simontsui, to Facebook

Trustwave discovered Ov3r_Stealer, an infostealer distributed using Facebook advertising and phishing emails. Their report provides an in-depth dive into Ov3r_Stealer, exposing what the Threat Hunt team learned about the threat actors, their techniques, tactics, and procedures and how the malware functions. Observed IOC listed.

🔗 https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/trustwave-spiderlabs-uncovers-ov3r_stealer-malware-spread-via-phishing-and-facebook-advertising/

#Ov3r_Stealer #cybercrime #facebook #threatintel #IOC #Trustwave

simontsui, to random

Rapid7 found notable similarities between BlackHunt ransomware and LockBit, which suggested that it uses leaked code of Lockbit. In addition, it uses some techniques similar to REvil ransomware. Rapid7 provided a technical analysis of a BlackHunt sample, describing functionalities and MITRE ATT&CK techniques. IOC provided.
🔗 https://www.rapid7.com/blog/post/2024/02/05/exploring-the-not-so-secret-code-of-blackhunt-ransomware-2/

simontsui, to Cybersecurity

Fortinet reports on a Python infostealer that is distributed using a malicious Excel document. They attributed the campaign to Vietnam-based threat actors. Fortinet describes the initial infection vector, attack stages and the stealer. They also provide IOC.
🔗 https://www.fortinet.com/blog/threat-research/python-info-stealer-malicious-excel-document

#infostealer #cybercrime #threatintel #IOC #cybersecurity #Fortinet

simontsui, to random

Akamai provided details about a new variant of the FritzFrog botnet, which abuses the 2021 Log4Shell vulnerability CVE-2021-44228 (10.0 critical). The vulnerability is exploited in a brute-force manner that attempts to target as many vulnerable Java applications as possible. The malware also now also includes a module to exploit CVE-2021-4034, a privilege escalation in the polkit Linux component. This module enables the malware to run as root on vulnerable servers. IOC provided.
🔗 https://www.akamai.com/blog/security-research/2024/feb/fritzfrog-botnet-new-capabilities-log4shell

#FritzFrog #botnet #IOC #Log4Shell #CVE_2021_44228 #CVE_2021_4034 #threatintel #IOC

simontsui, to Mexico

Unit 42 reports on a new variant of Mispadu Stealer, an infostealer targeting specific regions and URLs associated with Mexico. The infostealer was discovered while hunting for the SmartScreen CVE-2023-36025 security feature bypass vulnerability. They provided a sample analysis, and IOC.
🔗 https://unit42.paloaltonetworks.com/mispadu-infostealer-variant/

#Mispadu #threatintel #IOC #CVE_2023_36025 #SmartScreen #infostealer #Mexico #Unit42

simontsui, to random

Cloudflare blog on Thanksgiving 2023 security incident:

"Based on our collaboration with colleagues in the industry and government, we believe that this attack was performed by a nation state attacker with the goal of obtaining persistent and widespread access to Cloudflare’s global network."

The attack started in October with the compromise of Okta, but the threat actor only began targeting our systems using those credentials from the Okta compromise in mid-November.
🔗 https://blog.cloudflare.com/thanksgiving-2023-security-incident

simontsui, to random

**Sekoia reports on DiceLoader (aka Icebot), a malware used by cybercriminal group FIN7 since 2021. They detail how DiceLoader is dropped by a PowerShell script along with other malware of the intrusion set’s arsenal such as Carbanak RAT. A technical analysis of DiceLoader describes its features and C2 communication and infrastructure. "Surprisingly the analysed sample does not have any technique for anti-analysis" as well as lacking sandbox detection. IOC and Yara rules provided.
🔗 https://blog.sekoia.io/unveiling-the-intricacies-of-diceloader/

#DiceLoader #Icebot #FIN7 #IOC #threatintel #malware

simontsui, to Ukraine

Ukraine's CERT-UA provides IOC and technical instructions for removing DIRTYMOE malware, which has worm-like capabilities and creates a DDoS botnet. The DIRTYMOE/Purple Fox infection of 2000+ affected computers and activity is tracked by the identifier UAC-0027.
🔗https://cert.gov.ua/article/6277422

#Ukraine #CERTUA #UAC0027 #cyberespionage #DIRTYMOE #PurpleFox #malware #IOC #threatintel

hanse_mina, to Ukraine
@hanse_mina@nafo.uk avatar

The Russian Olympic team has been officially stripped of its gold medal in the team figure skating event at the 2022 Winter Olympic Games, following the four-year suspension of team member Kamila #Valieva for doping.

https://www.pravda.com.ua/eng/news/2024/01/30/7439502/

#Ukraine #Russia #IOC #Olympics #China

simontsui, to random

Mandiant reported on UNC4990, an actor who heavily uses USB devices for initial infection. UNC4990 primarily targets users based in Italy and is likely motivated by financial gain. Our research shows this campaign has been ongoing since at least 2020. IOC provided.
🔗 https://www.mandiant.com/resources/blog/unc4990-evolution-usb-malware
See related Ars Technica article: https://arstechnica.com/security/2024/01/ars-technica-used-in-malware-campaign-with-never-before-seen-obfuscation/

#UNC4990 #cybercrime #ArsTechnica #IOC #threatintel

simontsui, to Cybersecurity

Fortinet reports on the FAUST variant of Phobos ransomware, providing insights into the process of downloading the payload file from an MS Excel document embedded with VBA script. Their analysis uncovered a threat actor employing a fileless attack to deploy shellcode, injecting the final FAUST payload into the victim's system. The FAUST variant exhibits the ability to maintain persistence in an environment and creates multiple threads for efficient execution. IOC provided.
🔗 https://www.fortinet.com/blog/threat-research/phobos-ransomware-variant-launches-attack-faust

simontsui, to random

Trend Micro: Kasseika ransomware abuses the Martini driver in “bring-your-own-vulnerable-driver” (BYOVD) attacks, to terminate antivirus processes and services for the deployment of ransomware. Trend Micro assesses that an actor in Kasseika acquired or bought access to BlackMatter ransomware’s source code. They provided IOC.
🔗 https://www.trendmicro.com/en_us/research/24/a/kasseika-ransomware-deploys-byovd-attacks-abuses-psexec-and-expl.html

#Kasseika #BYOVD #ransomware #BlackMatter #DarkSide #cybercrime #IOC #threatIntel #trendmicro

simontsui, to Cybersecurity

Unit 42: BianLian group is one of the most active and prevalent extortion groups (top 10 most active). Maintaining their TTPs of infiltrating corporate networks, the BianLian group has shown adaptiveness to the ransomware market demands. They have shifted from double-extortion into being focused solely on extortion efforts, pressuring their victims into paying the ransom without encrypting their files. A possible connection to the Makop ransomware group was also found, due to their mutual use of a custom tool. IOC provided.
🔗 https://unit42.paloaltonetworks.com/bianlian-ransomware-group-threat-assessment/

#Unit42 #BianLian #Ransomware #ThreatIntel #IOC #Makop #doubleextortion #cybercrime #cybersecurity

hanse_mina, to Ukraine
@hanse_mina@nafo.uk avatar

Statement from Marta Kostyuk, a pro tennis player from Ukraine.

https://nitter.net/marta_kostyuk/status/1749010889863496030

#Ukraine #Russia #IOC #Olympics

simontsui, to random

Ron Bowes @iagox86 at @greynoise describes payloads leveraging the Ivanti Connect Secure vulnerabilities #CVE202346805 and #CVE202421887 to install cryptominers. IOC provided.
🔗 https://www.greynoise.io/blog/ivanti-connect-secure-exploited-to-install-cryptominers

#threatintel #Ivanti #ConnectSecure #zeroday #vulnerability #eitw #IOC #KEV

  • All
  • Subscribed
  • Moderated
  • Favorites
  • Leos
  • rosin
  • InstantRegret
  • ethstaker
  • DreamBathrooms
  • mdbf
  • magazineikmin
  • thenastyranch
  • Youngstown
  • tacticalgear
  • slotface
  • Durango
  • khanakhh
  • kavyap
  • megavids
  • everett
  • vwfavf
  • normalnudes
  • osvaldo12
  • cubers
  • GTA5RPClips
  • cisconetworking
  • ngwrru68w68
  • anitta
  • provamag3
  • tester
  • modclub
  • JUstTest
  • All magazines