解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 28 – 2023 - THREAT INTELLIGENCE/HUNTING

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。 一部の記事は Google Bard を使い要約しています。4n6 は こちら からご確認いただけます。

THREAT INTELLIGENCE/HUNTING

Adam Goss

Python Threat Hunting Tools: Part 10 — The Power of Jupyter NotebooksAdam Goss·Follow8 min read·2 days ago--ShareWelcome back to this series on building threat hunting tools. In this series, I will be showcasing a variety of threat hunting tools that you can use to hunt for threats, automate tedious processes, and extend to create your own toolkit!Most of these tools will be simple, focusing on being easy to understand and implement. This is so that you…----FollowWritten by Adam Goss431 Follower...

Ofek Itach and Assaf Morag at Aqua

Aqua Nautilus researchers identified an infrastructure of a potentially massive campaign against cloud native environments. This infrastructure is in early stages of testing and deployment, and is mainly consistent of an aggressive cloud worm, designed to deploy on exposed JupyterLab and Docker APIs in order to deploy Tsunami malware, cloud credentials hijack, resource hijack and further infestation of the worm. We strongly believe that TeamTNT is behind this new campaign. In this blog, the firs...

Avertium

July 6, 2023 Executive Summary June 2023 marked the beginning of Progress Software's MOVEit file transfer zero-days. The initial vulnerability, CVE-2023-34362, was identified as an SQL injection flaw that could lead to escalated privileges and unauthorized access to victims' environments. Shortly after discovering this, Progress found additional critical SQL injection vulnerabilities that could allow attackers to steal data from customer databases. Exploitation of these vulnerabilities could all...

Blackberry

RomCom Threat Actor Suspected of Targeting Ukraine's NATO Membership Talks at the NATO Summit RomCom Threat Actor Suspected of Targeting Ukraine's NATO Membership Talks at the NATO Summit RESEARCH & INTELLIGENCE / 07.08.23 / The BlackBerry Research & Intelligence Team Share on Twitter Share on Facebook Share on Linked In Email Image credit: S_E - stock.adobe.com Summary On July 4, the BlackBerry Threat Research and Intelligence team found two malicious documents submitted from an IP address in H...

Brad Duncan at Malware Traffic Analysis

30 DAYS OF FORMBOOK: DAY 29, MONDAY 2023-07-03 - GULOADER FOR FORMBOOK "AU22" NOTES: This the is my 29th of 30 infection runs for recent Formbook activity. Zip files are password-protected. If you don't know the password, see the "about" page of this website. ASSOCIATED FILES: 2023-07-03-IOCs-for-GuLoader-for-Formbook-infection.txt.zip 1.8 kB (1,841 bytes) 2023-07-03-GuLoader-for-Formbook-infection-traffic.pcap.zip 3.4 MB (3,350,320 bytes) 2023-07-03-GuLoader-for-Formbook-malware-and-artifacts.z...

30 DAYS OF FORMBOOK: DAY 28, SUNDAY 2023-07-02 - "SY18" NOTES: This the is my 28th of 30 infection runs for recent Formbook activity. Zip files are password-protected. If you don't know the password, see the "about" page of this website. ASSOCIATED FILES: 2023-07-02-IOCs-for-Formbook-infection.txt.zip 1.8 kB (1,837 bytes) 2023-07-02-Formbook-infection-traffic.pcap.zip 4.7 MB (4,729,902 bytes) 2023-07-02-Formbook-malware-and-artifacts.zip 2.3 MB (2,284,581 bytes) 30 DAYS OF FORMBOOK: DAY 28, SUND...

30 DAYS OF FORMBOOK: DAY 27, SATURDAY 2023-07-01 - "NES8" NOTES: This the is my 27th of 30 infection runs for recent Formbook activity. Zip files are password-protected. If you don't know the password, see the "about" page of this website. ASSOCIATED FILES: 2023-07-01-IOCs-for-Formbook-infection.txt.zip 2.1 kB (2,147 bytes) 2023-07-01-Formbook-infection-traffic.pcap.zip 8.9 MB (8,859,530 bytes) 2023-07-01-Formbook-malware-and-artifacts.zip 456 kB (456,061 bytes) 30 DAYS OF FORMBOOK: DAY 27, SATU...

30 DAYS OF FORMBOOK: DAY 30, TUESDAY 2023-07-04 - "MF6W" NOTES: This the is my final post of 30 infection runs for recent Formbook activity. Zip files are password-protected. If you don't know the password, see the "about" page of this website. ASSOCIATED FILES: 2023-07-04-IOCs-for-Formbook-infection.txt.zip 1.6 kB (1,646 bytes) 2023-07-04-Formbook-infection-traffic.pcap.zip 4.9 MB (4,854,704 bytes) 2023-07-04-Formbook-malware-and-artifacts.zip 552 kB (552,102 bytes) 30 DAYS OF FORMBOOK: DAY 30,...

TUESDAY 2023-07-04 THRU FRIDAY 2023-07-07: AGENTTESLA TO MY HONEYPOT EMAIL ACCOUNTS NOTES: Malspam sent to my honeypot email accounts this week all had AgentTesla-style malware. Zip files are password-protected. If you don't know the password, see the "about" page of this website. ASSOCIATED FILES: 2023-07-04-thru-07-AgentTesla-data-dump.zip 19.9 MB (19,884,673 bytes) TUESDAY 2023-07-04 THRU FRIDAY 2023-07-07: AGENTTESLA TO MY HONEYPOT EMAIL ACCOUNTS NOTES: - AgentTesla stopped back in 2019, and...

CERT Ukraine

CERT-AGID

Malware PEC: dopo sLoad è la volta di Vidar Malware PEC: dopo sLoad è la volta di Vidar 06/07/2023 PEC vidar Nella giornata di ieri il CERT-AgID, insieme ai Gestori PEC interessati, ha contrastato una nuova campagna malware massiva, veicolata tramite PEC, che apparentemente sembra essere simile a quelle già osservate per sLoad. L’attacco, iniziato alle ore 00:02 del 05-07-2023 e terminato due ore dopo, ha sfruttato una serie di PEC precedentemente compromesse per inviare comunicazioni verso al...

Sintesi riepilogativa delle campagne malevole nella settimana del 01 – 07 luglio 2023 07/07/2023 riepilogo In questa settimana, il CERT-AgID ha riscontrato ed analizzato, nello scenario italiano di suo riferimento, un totale di 23 campagne malevole, di cui 18 con obiettivi italiani e 5 generiche che hanno comunque interessato l’Italia, mettendo a disposizione dei suoi enti accreditati i relativi 180 indicatori di compromissione (IOC) individuati. Riportiamo in seguito il dettaglio delle tipologi...

Check Point

Filter by: Select category Research (522) Security (807) Securing the Cloud (251) Harmony (111) Company and Culture (8) Innovation (5) Customer Stories (4) Horizon (1) Securing the Network (3) Connect SASE (4) Harmony Email (13) Artificial Intelligence (10) SecurityJuly 6, 2023 June 2023’s Most Wanted Malware: Qbot Most Prevalent Malware in First Half of 2023 and Mobile Trojan SpinOk Makes its Debut ByCheck Point Team Share Check Point Research reported that multipurpose Trojan Qbot has been the...

Yehuda Gelb at Checkmarx Security

Stopping Malicious Packages at their SourceYehuda Gelb·FollowPublished incheckmarx-security·6 min read·1 day ago--ListenShareIn late March 2023, a Malicious campaign targeting the NPM ecosystem occurred, causing a flood of spam, SEO poisoning, and malware infection.The attacks caused a Denial of Service (DoS) that made NPM unstable with sporadic “Service Unavailable” errors.The campaigns included a malware infection campaign, a referral scam campaign linked to AliExpress, and a crypto scam campa...

CISA

Release DateJuly 06, 2023 Alert CodeAA23-187A SUMMARY The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Canadian Centre for Cyber Security (CCCS) are releasing this joint Cybersecurity Advisory (CSA) in response to cyber threat actors leveraging newly identified Truebot malware variants against organizations in the United States and Canada. As recently as May 31, 2023,...

Cisco’s Talos

By Cisco Talos Thursday, July 6, 2023 08:07 On The Radar Attackers have long used commercial products developed by legitimate companies to compromise targeted devices. These products are known as commercial spyware. Commercial spyware operations mainly target mobile platforms with zero- or one-click zero-day exploits to deliver spyware. This threat initially came to light with the leaks of HackingTeam back in 2015, but gained new notoriety with public reporting on the NSO Group, and, in the year...

By William Largent Friday, July 7, 2023 17:07 Threat Roundup Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 30 and July 7. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.As a reminder, the information prov...

Cyberwarzone

Hey there, cyber guardians! We’re taking a dive into a topic that’s been buzzing around the cyber threat landscape: .JAR files and their role in malware distribution. So, buckle up and let’s get started! What is a .JAR File? First off, what is a .JAR file? Short and simple, a .JAR (Java Archive) is a package file format used to bundle together Java class files and their associated metadata and resources into a single file. Think of it as a zip file, but for Java applications. It’s used for softw...

AsyncRAT, A name that may be familiar to some, but always worth exploring in detail. What is AsyncRAT? AsyncRAT, or Asynchronous Remote Access Trojan, is a high-performance .NET RAT (Remote Access Trojan). It’s an open-source tool available on Github, providing cybercriminals an opportunity to wield it with modifications that suit their devious plans. Characteristics of AsyncRAT AsyncRAT is defined by its sophistication and stealth. It comes loaded with features such as remote desktop, file mana...

Azorult is one of those sneaky villains in the world of cybersecurity, a potent piece of malware, that leaves a path of digital destruction in its wake. In essence, it’s an information stealer and remote access Trojan (RAT), designed to harvest a variety of sensitive data from infected systems. The Origin Story of Azorult Azorult sprung up in 2016 as an information thief with an insatiable appetite for data. It makes off with browsing history, stored IDs and passwords, cryptocurrency details, an...

Combining the capabilities of ASNmap and TLSx provides threat hunters with powerful tools to uncover and combat phishing attacks, malware campaigns, and scams effectively. For The Threat Hunters ASNmap enables threat hunters to map organization network ranges using ASN information. By leveraging ASN to CIDR lookups and ORG to CIDR lookups, threat hunters can identify the network infrastructure associated with malicious entities behind these threats. This information aids in proactive monitoring,...

Cyble

July 5, 2023 Over 130K PV Measuring and Diagnostics Solutions exposed over the Internet With its increasing prominence and global adoption, green energy has emerged as a potential target for attackers, posing concerns for both State and Private entities in the near future. With the increasing adoption of renewable energy sources such as solar, wind, and hydroelectric power, the infrastructure supporting green energy becomes an attractive prospect for cyber threats. The interconnected nature of g...

July 5, 2023 New Ransomware Strain Lists Victims’ Host Information in a Ransom Note The rapid proliferation of new ransomware strains and the establishment of fresh ransomware groups underscore the ease with which cybercriminals can extort money from their victims. While new ransomware variants continue to emerge, the alarming trend of encrypting files and leaking data remains a persistent practice among these cybercriminals. This combination of evolving threats and the consistent exploitation o...

July 6, 2023 Ransomware Operators Thrive in the Shadows ARCrypter ransomware, also known as ChileLocker, emerged in August 2022 and gained attention following an attack on an entity located in Chile. Subsequently, researchers revealed that this ransomware started targeting organizations worldwide. The Threat Actors (TA)s responsible for this group do not maintain a leak site for extorting their victims. It has been observed that ARCrypter ransomware targets both Windows and Linux operating syste...

Cyborg Security

Cyfirma

Share : Ransomware of the Week CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – which could be relevant to your organization. Type: Ransomware. Target Technologies: MS Windows. Target Geography: Australia, Brazil, Canada, China, France, Germany, India, Italy, Mexico, Netherlands, Peru, Poland, South Africa, Spain, Sri Lanka, the United Kingdom, the U...

Jörg Abraham at EclecticIQ

8Base Ransomware Surge; SmugX Targeting European Governments, Russian-Linked DDoS Warning This issue of the analyst prompt addresses the surge in 8Base ransomware operations and its potential connections to Phobos and RansomHouse families. Simultaneously, SmugX - a Chinese cyber threat campaign targets European governments, while CISA issues a warning on DDoS attacks allegedly linked to a Russian-connected group. Jörg Abraham – July 5, 2023 Surge in 8Base Ransomware Operations Raises Questions o...

ENISA

Navigation menu News from the same period Checking-up on Health: Ransomware Accounts for 54% of Cybersecurity Threats Checking-up on Health: Ransomware Accounts for 54% of Cybersecurity Threats The European Union Agency for Cybersecurity (ENISA) releases today its first cyber threat landscape for the health sector. The report found that ransomware accounts for 54% of cybersecurity threats in the health sector. //www.enisa.europa.eu/news/checking-up-on-health-ransomware-accounts-for-54-of-cyberse...

Esentire

BY eSentire Threat Response Unit (TRU) June 21, 2023 | 6 MINS READ Attacks/Breaches Threat Intelligence Threat Response Unit TRU Positive/Bulletin Want to learn more on how to achieve Cyber Resilience? TALK TO AN EXPERT Adversaries don’t work 9-5 and neither do we. At eSentire, our 24/7 SOCs are staffed with Elite Threat Hunters and Cyber Analysts who hunt, investigate, contain and respond to threats within minutes. We have discovered some of the most dangerous threats and nation state attacks i...

→ Jun 21, 2023 Persistent Connection Established: Nitrogen Campaign Leverages DLL… → VIEW BLOG → Resources Case Studies → Videos → Reports → Webinars → Data Sheets → Cybersecurity Tools → Glossary → EXPLORE LIBRARY → SECURITY ADVISORIES Jun 20, 2023 Update on MOVEit Transfer Vulnerabilities THE THREAT Progress Software has disclosed a third critical vulnerability impacting the MOVEit Transfer application within the past month. The newest MOVEit vulnerability is tracked as… READ NOW View Advisori...

Malcolm Heath at F5 Labs

Other commands may of course be run, which allows attackers to read files, navigate the file system, start processes, and possibly other things, all with the privilege level of the web server process. While the above example is perhaps the most minimal web shell that the author could think of, there are quite sophisticated ones available from many sources. Kali Linux, a popular penetration testing distribution, provides fourteen different examples, written in the PHP, perl, jsp, cfm, aspx, and a...

Fortinet

Ransomware Roundup - Rancoz By James Slaughter and Shunichi Imano | July 06, 2023 On a bi-weekly basis, FortiGuard Labs gathers data on ransomware variants of interest that have been gaining traction within our datasets and the OSINT community. The Ransomware Roundup report aims to provide readers with brief insights into the evolving ransomware landscape and the Fortinet solutions that protect against those variants. This latest edition of the Ransomware Roundup covers the Rancoz ransomware. Af...

FourCore

Written by Jones MartinSecurity Engineer @ FourCore What is Clop Ransomware The infamous Clop ransomware, mainly known as Cl0p, targets various industries and organizations, extorting data for a considerable ransom. It advances actively with new emerging campaigns. The Clop ransomware is associated with the Russian threat group TA505, which primarily operates as a (RaaS) ransomware-as-a-service. It is also seen that the threat group has been using various zero-day exploits for its campaigns, whi...

Huntress

Previous Post Next Post Share on Twitter Share on LinkedIn Share on Facebook Share on Reddit We all have thoughts that keep us up at night. Will the ticking noise the car made end up being an expensive repair? When will YouTube superstar John Hammond respond to my posted fanfiction? And are there user agents in Microsoft 365’s security telemetry that we can use to detect potential business email compromise (BEC)? It’s the latter one that kept me up at 3am, recently. If the curl command leaves a ...

Previous Post Share on Twitter Share on LinkedIn Share on Facebook Share on Reddit In late May 2023, customers running the popular MOVEit file transfer software faced multiple, unexplained intrusions. As previously documented by Huntress, MOVEit customers found themselves the victim of an actively exploited zero-day vulnerability, since tracked as CVE-2023-34362. Following the initial discovery, the criminal entity typically referred to as cl0p took credit for the widespread exploitation of MOVE...

InfoSec Write-ups

Paritosh·FollowPublished inInfoSec Write-ups·3 min read·Jun 20--ListenShareIn the digital world , where every tool can have a dual nature, even the most benevolent features can be misused by adversaries. Volume Shadow Files (VSS), known for their ability to safeguard against data loss, are no exception.Image Credits : HereIn this article, we will explore the potential misuse of Volume Shadow Files by adversaries and discuss measures to protect against their stealthy exploitation.Lets Beginnn…Sha...

Paritosh·FollowPublished inInfoSec Write-ups·4 min read·Jun 21--1ListenShareThe rise of ransomware attacks has become a looming threat to individuals, organizations, and even nations worldwide. These malicious cyber incidents can cause significant disruption, financial losses, and compromised data security. Investigating ransomware attacks requires a comprehensive approach, combining technical expertise, proactive measures, and a careful analysis of various factors.Image Credit : HereIn this art...

Hackthebox Fawn Writeup, Traffic and Log Analysis, Python Automatic Exploit, Hardening and Vulnerability ReportingAnil Yelken·FollowPublished inInfoSec Write-ups·5 days ago--ListenSharePhoto by Alex Chumak on UnsplashFawn writeup video:Traffic Analysis:Log Analysis:Hardening:Python Automatic Exploit:Vulnerability Reporting:HacktheboxRed TeamBlue TeamPurple TeamHtb Writeup----FollowWritten by Anil Yelken561 Followers·Writer for InfoSec Write-upsPentester, threat hunter, researcher //www.youtube.c...

Ali AK·FollowPublished inInfoSec Write-ups·5 min read·Jun 30--ListenShareHello Friend :)In this part, we will learn about the basics of how malware is investigated & tools/techniques used during the investigation.Prerequisite: Basic knowledge of Computers, networks, OS & Coding is required.So, Let’s begin with some common terminologies you will hear as a malware analyst.Malware — A general term used to describe any software that is designed to harm, steal or disrupt computer systems.Virus — A ty...

Open in appSign upSign InWriteSign upSign InCyberTalents — Malware Reverse Engineering (RE): Find the Pass for BeginnersRUFUS PELIGEY·FollowPublished inInfoSec Write-ups·6 min read·Jun 28--1ListenSharesource://www.cybertalents.comFind the Pass is a malware reverse engineering challenge on cyber talent that is rated as basic by the author but rated a little above basic by the community. The Challenge will help you understand reverse engineering basics and understand code flow from assembly instru...

Intel471

Jul 04, 2023 Cybercriminals are compromising computer networks at a greater scale than ever before. The growth of cybercrime is attributable to the availability of services and digital goods offered by cybercriminals to other cybercriminals. In the legitimate economy, this relationship is known as business-to-business commerce. In the illicit economy, it’s known as cybercrime-as-a-service. The availability of these services allows fraudsters to focus on their specialty, whether that be ransomwar...

Intrusion Truth

One man and his lasers intrusiontruth in #apt31, Russia China July 7, 2023June 30, 2023 748 Words Article 1 left some tantalizing breadcrumbs about the manager of our main character organization from this article series, Wuhan Xiaoruizhi. ‘What is he up to?’ We hear you cry. ‘And what is up with all the lasers?’ So, without further ado. Introducing: Deng Zhiyong. Deng at surface glance is the manager and CEO of Wuhan Xiaoruizhi Science and Technology. As a reminder, this is a supposed informatio...

Jeffrey Appel

0 Onboard Defender for Endpoint without Azure Arc via Direct onboarding 11 Microsoft Defender Threat Intelligence (Defender TI) integrations with Microsoft Sentinel 2 Block gTLD (.zip)/ FQDN domains with Windows Firewall and Defender for Endpoint 9 How works Microsoft Defender Threat Intelligence / Defender TI – and what is the difference between free and paid 1 Block C2 communication with Defender for Endpoint 1 This website uses cookies to provide an optimal user experience. Got it! 0 HomeSecu...

Kostas

Public Opinion Survey Results: You’re PwnedKostas·Follow9 min read·3 days ago--ListenShareI am starting these short-form blog posts that aim to provide insights into attackers’ actions once they gain access to a network. Although the intrusions I will cover do not require lengthy reports, they are still useful for understanding the mindset behind the adversaries’ actions.One of my main goals is to provide resources for newcomers in the field and help them develop their investigative skills with ...

Lares Labs

Introducing Slinky Cat - Living off the AD Land Slinky Cat has been developed to automate some of the methods introduced in living off the land and to supplement ScrapingKit. To help security and IT teams reduce their AD exposures and uncover quick wins and fixes designed for pen-testers and defenders alike. Andy Gill, Neil Lines Jul 7, 2023 • 6 min read Slinky Cat has been developed to automate some of the methods introduced in our previous blog post //labs.lares.com/living-off-the-land/. It al...

The Offensive Sysadmin Suite provides a comprehensive set of tools presented in PowerShell and C#. This post dives into the functions of each. Neil Lines, Andy Gill Jul 8, 2023 • 7 min read The Offensive Sysadmin Suite provides a comprehensive set of tools presented in PowerShell and C#.These tools were designed to uncover vulnerabilities and misconfigurations within active directory domains. Whether you're a red teamer aiming to expose vulnerabilities or a defender committed to fortifying your ...

Microsoft Security

Your current User-Agent string appears to be from an automated process, if this is incorrect, please click this link:United States English Microsoft Homepage

Elizabeth Davies at PhishLabs

Proofpoint

Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware Share with your network! July 06, 2023 Joshua Miller, Pim Trouerbach, and the Proofpoint Threat Research Team Key Takeaways TA453 continues to adapt its malware arsenal, deploying novel file types and targeting new operating systems, specifically sending Mac malware to one of its recent targets. TA453 in May 2023 began deploying LNK infection chains instea...

Vinay Kumar at Quick Heal

Red Alert

Monthly Threat Actor Group Intelligence Report, May 2023 (KOR) 2023년 4월 21일에서 2023년 5월 20일까지 NSHC ThreatRecon팀에서 수집한 데이터와 정보를 바탕으로 분석한 해킹 그룹(Threat Actor Group)들의 활동을 요약 정리한 내용이다. 이번 5월에는 총 34개의 해킹 그룹들의 활동이 확인되었으며, SectorA 그룹이 23%로 가장 많았으며, SectorC 그룹의 활동이 그 뒤를 이었다. 이번 5월에 발견된 해킹 그룹들의 해킹 활동은 정부기관과 상업 시설 분야에 종사하는 관계자 또는 시스템들을 대상으로 가장 많은 공격을 수행했으며, 지역별로는 유럽(Europe)과 북아메리카(North America)에 위치한 국가들을 대상으로 한 해킹 활동이 가장 많은 것으로 확인된다. 1. SectorA 그룹 활동 특징 2023년 5월에는 총 5개 해킹 그룹의 활동이 발견되었으며, 이들은 SectorA01, Se...

Megan Roddie at SANS

Megan Roddie Ransomware in the Cloud Learn about the evolution of ransomware into cloud environments, and how to defend against and prepare for attacks. July 5, 2023 On a recent episode of Wait Just an Infosec, Ryan Chapman and I discussed the concept of ransomware and cyber extortion in the cloud. This blog post provides insights on the topic based on our discussion. Specifically, we’ll discuss what exactly ransomware in the cloud looks like, the common tactics, techniques, and procedures (TT...

SANS Internet Storm Center

Izzmier Izzuddin Zulkepli at Security Investigation

Emotet Malware with Microsoft OneNote- How to Block emails based on… How DMARC is used to reduce spoofed emails ? Hackers Use New Static Expressway Phishing Technique on Lucidchart Weird Trick to Block Password-Protected Files to Combat Ransomware Home E-Mail Attack How To Check Malicious Phishing Links E-Mail Attack How To Check Malicious Phishing Links By Izzmier Izzuddin Zulkepli - July 9, 2023 0 How to check if the links/URLs are malicious/phishing or not? Malicious URL: /rxqsd[.]com/9n4fbg ...

SentinelOne

July 3, 2023 by Pol Thill PDF In partnership with vx-underground, SentinelOne recently ran its first Malware Research Challenge, in which we asked researchers across the cybersecurity community to submit previously unpublished work to showcase their talents and bring their insights to a wider audience. Today’s post marks the start of a series highlighting the best entries, beginning with the winner from Pol Thill, Cyber Threat Intelligence Analyst at QuoIntelligence. This in-depth and meticulous...

July 5, 2023 by Phil Stokes PDF Back in April, researchers at JAMF detailed a sophisticated APT campaign targeting macOS users with multi-stage malware that culminated in a Rust backdoor capable of downloading and executing further malware on infected devices. ‘RustBucket’, as they labeled it, was attributed with strong confidence to the BlueNoroff APT, generally assumed to be a subsidiary of the wider DPRK cyber attack group known as Lazarus. In May, ESET tweeted details of a second RustBucket ...

SOCRadar

Puja Mahendru at Sophos

New insights into how ransomware impacts the retail sector, including the frequency, root causes of attacks, and data recovery costs. Written by Puja Mahendru July 05, 2023 Products & Services Ransomware Retail Solutions Sophos has released the State of Ransomware in Retail 2023, an insightful report based on a survey of 355 IT/cybersecurity professionals across 14 countries working in the retail sector. The findings reveal the reality of the ransomware challenge facing the sector. Rate of attac...

Rianna MacLeod at Sucuri

Threatmon

WeLiveSecurity

Here are some of the key insights on the evolving data breach landscape as revealed by Verizon’s analysis of more than 16,000 incidents Phil Muncaster 3 Jul 2023 - 11:30AM Share Here are some of the key insights on the evolving data breach landscape as revealed by Verizon’s analysis of more than 16,000 incidents Contrary to common perception, small and medium-sized businesses (SMBs) are often the target of cyberattacks. That’s understandable, as in the US and UK, they comprise over 99% of busine...

A brief summary of what happened with Emotet since its comeback in November 2021 Jakub Kaloč 6 Jul 2023 - 11:30AM Share A brief summary of what happened with Emotet since its comeback in November 2021 Emotet is a malware family active since 2014, operated by a cybercrime group known as Mealybug or TA542. Although it started as a banking trojan, it later evolved into a botnet that became one of the most prevalent threats worldwide. Emotet spreads via spam emails; it can exfiltrate information fro...