jsrailton, to random
@jsrailton@mastodon.social avatar

Late to the party here, but the chance that new .zip and .mov domains mostly get used for malware attacks is 100%

Not sure who asked for this, but this is a bad move.

Block it all.

This sort of thing undermines our collective #cybersecurity & is fundamentally unhelpful.

RL_Dane,
@RL_Dane@fosstodon.org avatar

@jsrailton

Wait, Google can create new TLDs independent of ICANN?!?

@governa

#malware #cybersecurity

stux, to random
@stux@mstdn.social avatar

Ugh, antivirus on Windows keeps trying to manage the settings for me but I'm perfectly capable of that myself I only want it to scan for viruses and not for it to be my assistant

kkarhan,

@stux consider using an on-demand scanner like then...

And yes, on is just at best if not outright most of the time.

w7voa, to random
@w7voa@journa.host avatar

DoJ reveals it has disabled a "sophisticated" malware network used by #Russia FSB for two decades to spy in 50 countries including a #NATO ally.

w7voa,
@w7voa@journa.host avatar
5am, to random
@5am@fosstodon.org avatar

This is a great look at how should not rely solely on tools like , and instead should take time to consider potential code , redirection etc. which can lead to false negatives. https://medium.com/maverislabs/virustotal-is-not-an-incident-responder-80a6bb687eb9

jbzfn, to infosec
@jbzfn@mastodon.social avatar

⚡ Unearthed: CosmicEnergy, malware for causing Kremlin-style power disruptions
@arstechnica

"Researchers have uncovered malware designed to disrupt electric power transmission and may have been used by the Russian government in training exercises for creating or responding to cyberattacks on electric grids."


https://arstechnica.com/information-technology/2023/05/unearthed-cosmicenergy-malware-for-causing-kremlin-style-power-disruptions/

dimi, to random
@dimi@techforgood.social avatar
jbaggs, to random
itnewsbot, to random

Inner workings revealed for “Predator,” the Android malware that exploited 5 0-days - Enlarge

Smartphone malware sold to governments around the wor... - https://arstechnica.com/?p=1942660 #mercenaryware #android #malware #biz&it

0xor0ne, to infosec
0x58, to infosec

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #19/2023 is out! It includes, but not only:

‣ New Phishing-as-a-Service Platform Lets Cybercriminals Generate Convincing #Phishing Pages
#Netgear Routers' Flaws Expose Users to #Malware, Remote Attacks, and Surveillance
‣ 🇮🇹 🏎️ #WordPress Plugin Vulnerability Exposed #Ferrari Website to Hackers
‣ 🇯🇵 🚗 #Toyota Japan exposed data on millions of vehicles for a decade
‣ 📨 #Microsoft patches bypass for recently fixed Outlook zero-click bug
‣ 🇺🇸 🇺🇦 IRS gives #Ukraine tools to expose Russian oligarchs hiding riches in #crypto exchanges
‣ 🇨🇭 Multinational tech firm #ABB hit by Black Basta #ransomware attack
‣ 🐥 #Twitter Finally Rolling Out Encrypted Direct Messages — Starting with Verified Users
‣ 🇺🇸 Cybersecurity firm #Dragos discloses cybersecurity incident, extortion attempt
‣ 🇰🇵 North Korean hackers breached major hospital in Seoul to steal data
‣ 🇺🇸 #Google Now Lets US Users Search #DarkWeb for Their Gmail ID
‣ 🇺🇸 #IBM Delivers Roadmap for Transition to Quantum-safe #Cryptography
‣ 🇪🇸 Spanish police dismantle phishing operation linked to crime ring
‣ 🇺🇸 Microsoft #PatchTuesday: 40 Vulnerabilities, 2 Zero-Days
‣ 🇺🇸 🇷🇺 Justice Department Announces Court-Authorized Disruption of the Snake Malware Network Controlled by #Russia's Federal Security Service
‣ 🇺🇸 Feds seize 13 more DDoS-for-hire platforms in ongoing international crackdown
#MSI Data Breach: Private Code Signing Keys Leaked on the Dark Web
‣ 🇮🇷 Microsoft: Iranian hacking groups join #Papercut attack spree

📚 This week's recommended reading is: "The Pentester BluePrint: Starting a Career as an Ethical Hacker" by @phillipwylie and @crowgirl

#security #data #databreach #surveillance #hospital

Subscribe to the #newsletter to have it piping hot in your inbox every Sunday ⬇️

https://0x58.substack.com/p/infosec-mashup-week-192023

Dierne, to random

Regarding Operation Medusa:

Key take aways:

It was not an FBI only operation. It was a 5-eyes operation. The FBI did not take down the entire 'Snake Network'. They merely led the US side.

Center 16 of the FSB is claimed to be behind the malware and attacks.

In 2014, after public researchers had identified the malware, Center 16 renamed the string 'Ur0bUr()sGo#' to 'gLASs D1ick' within the malware - probably to give a middle finger to researchers investigating the malware. The malware is said to have the developers monikers included within the malware.

The malware was used to also target journalists and dissents. A US journalist, covering Russian affairs was targeted, as an example.

The malware modified TCP & HTTP packets for communication and exfiltration. The FBI imitated these modifications, with 'Perseus', in order to attribute and disable infected machines.

FBI argued they did not have the resources (man power with expertise) to physically disable the malware, so they requested (and were granted) remote search warrants.

#Russia #US #5Eyes #FBI #Malware #CyberSecurity

AAKL, to random

Justice Department says Kremlin-linked ‘Snake’ espionage #malware eliminated #cybersecurity https://therecord.media/turla-snake-russia-malware-takedown-fbi-doj

dantemercurio, to infosec
@dantemercurio@ioc.exchange avatar

FBI’s operation Medusa cuts off Russian malware called ‘snake’. Their countering application communicates with infected devices and orders it to overwrite itself. A very interesting aspect is that this malware has existed in a useful format for two decades.

#malware #cybersecurity #infosec

https://www.theregister.com/2023/05/09/fbi_operation_medusa_snake/

bornach, to random
@bornach@fosstodon.org avatar

Block the entire dot-zip top-level domain
https://youtu.be/V82lHNsSPww
[ThioJoe] discovers that Zip filenames in old posts are being converted to links to malware websites retroactively

#dotZip #malware #Google #security

AAKL, to random

How the US dismantled a #malware network used by Russian spies to steal government secrets #cybersecurity https://techcrunch.com/2023/05/10/turla-snake-malware-network-russia-fsb/ @TechCrunch @carlypage

CharlieMcHenry, to infosec
@CharlieMcHenry@connectop.us avatar

A popular Android app, iRecorder, began secretly spying on its users months after it was listed on Google Play https://techcrunch.com/2023/05/29/popular-android-app-microphone-spying-google-play/ #infosec #Malware #Android #smartphone #SmartPhones #iRecorder

thomrstrom, to random
@thomrstrom@triangletoot.party avatar

From a #detection perspective, #NixOS is indistinguishable from #malware. Here's a process path I encountered today while adding a new detection rule:

/nix/store/yyhwjshmmklk5jz6amih1pan6hfkjy27-pulseaudio-16.1/libexec/pulse/..gsettings-helper-wrapped-wrapped

The double leading dots and double wrapping got me.

thomrstrom, to random
@thomrstrom@triangletoot.party avatar

I found some fun time today to analyze the latest variant: https://unfinished.bike/fun-with-the-new-bpfdoor-2023 - and write new detections for it and similar Linux malware.

Thanks to @GossiTheDog for providing the sample for analysis.

WithSecure, to random

Last year, our Mohammad Kazem Hassan Nejad discovered --malware used by a Vietnam-based threat actor to hijack Facebook Business accounts.

Meta has announced a cease-and-desist letter to the operators, & added new Business security features. https://engineering.fb.com/2023/05/03/security/malware-nodestealer-ducktail/

WithSecure,

Anyone interested in learning more about can read the research into this and operation here --> https://labs.withsecure.com/publications/ducktail-returns

and here -->
https://labs.withsecure.com/publications/ducktail-returns

0xor0ne, to infosec

Short analysis of Brute Ratel (Scandinavian Defence version) by @boymoderre

http://protectedmo.de/brute.html

#malware #redteam #infosec #cybersecurity #reverseengineering

image/jpeg
image/jpeg

aeveltstra, to random
@aeveltstra@mastodon.social avatar
thomrstrom, to linux
@thomrstrom@triangletoot.party avatar

Anyone have access to a sample of the #yayaya #Linux #malware miner for analysis? Research article: https://mp.weixin.qq.com/s/UYdze4yt2OoWoTcK0qY3Mw

It's one of the few in-the-wild that uses a kernel rootkit (Diamorphine-based), and I would like to test open-source #detection methods against it.

0xor0ne, to linux
AAKL, to random
avoidthehack, to infosec

Cybercrime gang pre-infects millions of #Android devices with #malware

TrendMicro holding details close (as of this post).

These pre-infected Android devices have the "Guerilla" malware installed, which can load additional malware. It pretty much compromises the entire device.

#cybersecurity #infosec #security

https://www.bleepingcomputer.com/news/security/cybercrime-gang-pre-infects-millions-of-android-devices-with-malware/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • ngwrru68w68
  • modclub
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • DreamBathrooms
  • megavids
  • GTA5RPClips
  • tacticalgear
  • normalnudes
  • tester
  • osvaldo12
  • everett
  • cubers
  • ethstaker
  • anitta
  • provamag3
  • Leos
  • cisconetworking
  • lostlight
  • All magazines