What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
The_Hackers_News.webp 2024-01-25 12:51:00 New Cherryloader Malware imite Cherrytree pour déployer des exploits PRIVESC
New CherryLoader Malware Mimics CherryTree to Deploy PrivEsc Exploits
(lien direct)
Un nouveau chargeur de logiciels malveillants basée sur GO appelée & nbsp; Cherryloader & nbsp; a été découvert par les chasseurs de menaces dans la nature pour fournir des charges utiles supplémentaires sur des hôtes compromis pour l'exploitation de suivi. L'Arctic Wolf Labs, qui a découvert le nouvel outil d'attaque dans deux intrusions récentes, a déclaré que l'icône et le nom du chargeur \\ se sont masqué
A new Go-based malware loader called CherryLoader has been discovered by threat hunters in the wild to deliver additional payloads onto compromised hosts for follow-on exploitation. Arctic Wolf Labs, which discovered the new attack tool in two recent intrusions, said the loader\'s icon and name masquerades as the legitimate CherryTree note-taking application to dupe potential victims
Malware Tool Threat ★★★
SocRadar.webp 2024-01-25 12:47:19 Sceau de malware 101: Comprendre les différentes variantes et familles
Stealer Malware 101: Understanding the Different Variants and Families
(lien direct)
> Dans le domaine de la cybersécurité, les logiciels malveillants (malware) continue d'évoluer, avec différents types ciblant ...
>In the realm of cybersecurity, malicious software (malware) continues to evolve, with various types targeting...
Malware ★★★
Blog.webp 2024-01-25 12:02:44 QR Code phishing monte 587%: les utilisateurs sont victimes de victimes d'escroqueries en génie social
QR Code Phishing Soars 587%: Users Falling Victim to Social Engineering Scams
(lien direct)
> Par deeba ahmed QR Le phishing du code a bondi par 587%, les escrocs l'exploitant pour voler des informations d'identification de connexion et déployer des logiciels malveillants. Ceci est un article de HackRead.com Lire le post original: QR Code Phishing monte 587%: les utilisateurs sont victimes d'escroqueries d'ingénierie sociale
>By Deeba Ahmed QR Code Phishing has surged by a staggering 587%, with scammers exploiting it to steal login credentials and deploy malware. This is a post from HackRead.com Read the original post: QR Code Phishing Soars 587%: Users Falling Victim to Social Engineering Scams
Malware ★★★
AlienVault.webp 2024-01-25 11:00:00 Le côté obscur de la cybersécurité 2023: évolution des logiciels malveillants et cyber-menaces
The dark side of 2023 Cybersecurity: Malware evolution and Cyber threats
(lien direct)
In the ever-evolving cybersecurity landscape, 2023 witnessed a dramatic surge in the sophistication of cyber threats and malware. AT&T Cybersecurity Alien Labs reviewed the big events of 2023 and how malware morphed this year to try new ways to breach and wreak havoc. This year\'s events kept cybersecurity experts on their toes, from expanding malware variants to introducing new threat actors and attack techniques. Here are some of the most compelling developments, highlighting malware\'s evolving capabilities and the challenges defenders face. Highlights of the year: Emerging trends and notable incidents As the year unfolded, several trends and incidents left an indelible mark on the cybersecurity landscape: Exploiting OneNote for malicious payloads Cybercriminals leveraged Microsoft OneNote to deliver many malicious payloads to victims, including Redline, AgentTesla, Quasar RAT, and others. This previously underutilized Office program became a favored tool due to its low suspicion and widespread usage. SEO poisoning and Google Ads Malicious actors resorted to SEO poisoning tactics, deploying phishing links through Google Ads to deceive unsuspecting victims. These links led to cloned, benign web pages, avoiding Google\'s detection and remaining active for extended periods. Prominent malware families, including Raccoon Stealer and IcedID, capitalized on this strategy. Exploiting geopolitical events Cybercriminals exploited the geopolitical climate, particularly the Middle East conflict, as a lure for their attacks. This trend mirrored the previous year\'s Ukraine-related phishing campaigns and crypto scams. APTs: State-sponsored espionage continues to present challenges Advanced Persistent Threats (APTs) continued to pose a significant threat in 2023: Snake: CISA reported on the Snake APT, an advanced cyber-espionage tool associated with the Russian Federal Security Service (FSB). This malware had been in use for nearly two decades. Volt Typhoon: A campaign targeting critical infrastructure organizations in the United States was attributed to Volt Typhoon, a state-sponsored actor based in China. Their focus lay on espionage and information gathering. Storm-0558: This highly sophisticated intrusion campaign, orchestrated by the Storm-0558 APT from China, infiltrated the email accounts of approximately 25 organizations, including government agencies. Ransomware\'s relentless rise Ransomware remained a prevalent and lucrative threat throughout the year: Cuba and Snatch: Ransomware groups like Cuba and Snatch targeted critical infrastructure in the United States, causing concern for national security. ALPHV/BlackCat: Beyond SEO poisoning, this group compromised the computer systems of Caesar and MGM casinos. They also resorted to filing complaints with the US Securities and Exchange Commission (SEC) against their victims, applying additional pressure to pay ransoms. Exploiting new vulnerabilities: Cybercriminals wasted no time exploiting newly discovered vulnerabilities, such as CVE-2023-22518 in Atlassian\'s Confluence, CVE-2023-4966 (Citrix bleed), and others. These vulnerabilities became gateways for ransomware attacks. Evolving ransom Ransomware Spam Malware Tool Vulnerability Threat Prediction Guam ★★★
SocRadar.webp 2024-01-25 10:35:39 Écrire des règles Yara avec des GPT personnalisés et une plate-forme Socradar
Writing YARA Rules with Custom GPTs and SOCRadar Platform
(lien direct)
> Les règles YARA se distinguent comme des instruments essentiels pour identifier et classer les logiciels malveillants.Ces règles sont ...
>YARA rules stand out as essential instruments for identifying and classifying malware. These rules are...
Malware ★★★
RiskIQ.webp 2024-01-24 20:59:31 Mimo CoinMiner and Mimus Ransomware Installed via Vulnerability Attacks (lien direct) #### Description Ahnlab Security Intelligence Center (ASEC) a récemment observé les circonstances d'un acteur de menace de Coinmin appelé MIMO exploitant diverses vulnérabilités pour installer des logiciels malveillants.MIMO, également surnommé HezB, a été retrouvé pour la première fois lorsqu'ils ont installé des co -miners grâce à une exploitation de vulnérabilité Log4Shell en mars 2022. L'acteur MIMO Threat a installé divers logiciels malveillants, notamment MIMUS Ransomware, Proxyware et Inverse Shell MALWWare, en plus du mimo de mineur.La majorité des attaques de l'acteur de menace de MIMO ont été des cas qui utilisent XMRIG Coinmin, mais des cas d'attaque par ransomware ont également été observés en 2023. Le ransomware Mimus a été installé avec le malware par lots et a été fabriqué sur la base du code source révélé sur GitHub par le développeur «Mauri870» qui a développé les codes à des fins de recherche.Le ransomware a été développé en Go, et l'acteur de menace l'a utilisé pour développer des ransomwares et l'a nommé Mimus Ransomware.MIMUS Ransomware n'a pas de différences particulières par rapport au code source de Mauricrypt \\.Seule l'adresse C&C de l'acteur de menace, l'adresse du portefeuille, l'adresse e-mail et d'autres données de configuration ont été modifiées. #### URL de référence (s) 1. https://asec.ahnlab.com/en/60440/ #### Date de publication 17 janvier 2024 #### Auteurs) Sanseo
#### Description AhnLab SEcurity intelligence Center (ASEC) recently observed circumstances of a CoinMiner threat actor called Mimo exploiting various vulnerabilities to install malware. Mimo, also dubbed Hezb, was first found when they installed CoinMiners through a Log4Shell vulnerability exploitation in March 2022. The Mimo threat actor has installed various malware, including Mimus ransomware, proxyware, and reverse shell malware, besides the Mimo miner. The majority of the Mimo threat actor\'s attacks have been cases that use XMRig CoinMiner, but ransomware attack cases were also observed in 2023. The Mimus ransomware was installed with the Batch malware and was made based on the source code revealed on GitHub by the developer “mauri870” who developed the codes for research purposes. The ransomware was developed in Go, and the threat actor used this to develop ransomware and named it Mimus ransomware. Mimus ransomware does not have any particular differences when compared to MauriCrypt\'s source code. Only the threat actor\'s C&C address, wallet address, email address, and other configuration data were changed. #### Reference URL(s) 1. https://asec.ahnlab.com/en/60440/ #### Publication Date January 17, 2024 #### Author(s) Sanseo
Ransomware Malware Vulnerability Threat ★★
InfoSecurityMag.webp 2024-01-24 17:15:00 Chatgpt Cybercrime Surge révélé dans 3000 articles Web sombres
ChatGPT Cybercrime Surge Revealed in 3000 Dark Web Posts
(lien direct)
Kaspersky a déclaré que les cybercriminels exploraient des schémas pour implémenter le chatppt dans le développement de logiciels malveillants
Kaspersky said cybercriminals are exploring schemes to implement ChatGPT in malware development
Malware ChatGPT ★★
News.webp 2024-01-24 06:26:08 Les avertissements NCSC de GCHQ \\ de la possibilité réaliste \\ 'AI aideront à détection d'évasion des logiciels malveillants soutenus par l'État
GCHQ\\'s NCSC warns of \\'realistic possibility\\' AI will help state-backed malware evade detection
(lien direct)
Cela signifie que les espions britanniques veulent la capacité de faire exactement cela, hein? L'idée que l'IA pourrait générer des logiciels malveillants super potentiels et indétectables a été bandé depuis des années & # 8211;et aussi déjà démystifié .Cependant, un article Publié aujourd'hui par le Royaume-Uni National Cyber Security Center (NCSC) suggère qu'il existe une "possibilité réaliste" que d'ici 2025, les attaquants les plus sophistiqués \\ 's'amélioreront considérablement grâce aux modèles d'IA informés par des données décrivant une cyber-cyberHits.… Malware Tool ChatGPT ★★★
Blog.webp 2024-01-24 00:03:25 Distribution de Venomrat (asyncrat) imitation des sociétés informatiques coréennes
Distribution of VenomRAT (AsyncRAT) Impersonating Korean IT Companies
(lien direct)
Ahnlab Security Intelligence Center (ASEC) a trouvé un fichier de raccourci (.lnk) qui télécharge Asyncrat (Venomrat).Pour que le fichier LNK se déguise en fichier Word normal, il a été distribué avec le nom & # 8216; Survey.docx.lnk & # 8217;à l'intérieur d'un fichier compressé qui contenait également un fichier texte normal.Surtout, les utilisateurs doivent rester vigilants, car le fichier exécutable (blues.exe) utilisé dans l'attaque est déguisé en certificat coréen.Le processus de fonctionnement global du malware est comme indiqué ci-dessous ....
AhnLab SEcurity intelligence Center (ASEC) found a shortcut file (.lnk) that downloads AsyncRAT (VenomRAT). In order for the LNK file to disguise itself as a normal Word file, it was distributed with the name ‘Survey.docx.lnk’ inside a compressed file which also contained a normal text file. Above all, users need to remain vigilant, as the executable file (blues.exe) used in the attack is disguised as a Korean company’s certificate. The overall operation process of the malware is as shown below....
Malware ★★
DarkReading.webp 2024-01-23 21:00:00 MacOS malware cible Bitcoin, Exodus cryptowallets
MacOS Malware Targets Bitcoin, Exodus Cryptowallets
(lien direct)
Le malware remplace les applications authentiques par des versions compromises, permettant aux attaquants de piloter des informations d'identification et des phrases de récupération, accédant ainsi aux portefeuilles et à leur contenu.
The malware substitutes genuine apps with compromised versions, enabling attackers to pilfer credentials and recovery phrases, thus gaining access to wallets and their contents.
Malware ★★
The_Hackers_News.webp 2024-01-23 20:03:00 Vextrio: The Uber of Cybercrime - Broking Malware pour plus de 60 affiliés
VexTrio: The Uber of Cybercrime - Brokering Malware for 60+ Affiliates
(lien direct)
Les acteurs de la menace derrière Clearfake, Socgholish et des dizaines d'autres acteurs ont établi des partenariats avec une autre entité connue sous le nom de & nbsp; Vextrio & nbsp; dans le cadre d'un «programme d'affiliation criminelle» massif », révèlent les nouvelles conclusions d'Infoblox. Le dernier développement démontre "l'étendue de leurs activités et la profondeur de leurs liens au sein de l'industrie de la cybercriminalité", a déclaré la société,
The threat actors behind ClearFake, SocGholish, and dozens of other actors have established partnerships with another entity known as VexTrio as part of a massive "criminal affiliate program," new findings from Infoblox reveal. The latest development demonstrates the "breadth of their activities and depth of their connections within the cybercrime industry," the company said,
Malware Threat Uber ★★★★
The_Hackers_News.webp 2024-01-23 17:57:00 Alerte "Activateur": MacOS malware se cache dans des applications fissurées, ciblant les portefeuilles crypto
"Activator" Alert: MacOS Malware Hides in Cracked Apps, Targeting Crypto Wallets
(lien direct)
Des logiciels fissurés ont été observés en infectant les utilisateurs d'Apple MacOS avec un malware de voleur auparavant sans papiers capable de récolter des informations sur le système et des données de portefeuille de crypto-monnaie. Kaspersky, qui a identifié les artefacts dans la nature, & nbsp; dit & nbsp; ils sont conçus pour cibler des machines exécutant macOS Ventura 13.6 et plus tard, indiquant la capacité du malware \\ à infecter les Mac sur Intel et
Cracked software have been observed infecting Apple macOS users with a previously undocumented stealer malware capable of harvesting system information and cryptocurrency wallet data. Kaspersky, which identified the artifacts in the wild, said they are designed to target machines running macOS Ventura 13.6 and later, indicating the malware\'s ability to infect Macs on both Intel and
Malware ★★
ProofPoint.webp 2024-01-23 12:51:12 Le paysage des menaces est toujours en train de changer: à quoi s'attendre en 2024
The Threat Landscape Is Always Changing: What to Expect in 2024
(lien direct)
Gather \'round, cyber friends, and I\'ll let you in on a little secret: no one knows what the Next Big Thing on the threat landscape will be. But we can look back on 2023, identify notable changes and actor behaviors, and make educated assessments about what 2024 will bring.   This month on the DISCARDED podcast my co-host Crista Giering and I sat down with our Threat Research leaders Daniel Blackford, Alexis Dorais-Joncas, Randy Pargman, and Rich Gonzalez, leaders of the ecrime, advanced persistent threat (APT), threat detection, and Emerging Threats teams, respectively. We discussed what we learned over the last year, and what\'s on the horizon for the future. While the discussions touched on different topics and featured different opinions on everything from artificial intelligence (AI) to living off the land binaries (LOLBins) to vulnerability exploitation to ransomware, there were some notable themes that are worth writing down. We can\'t say for sure what surprises are in store, but with our cyber crystals balls fully charged – and a deep knowledge of a year\'s worth of threat actor activity based on millions of email threats per day – we can predict with high confidence what\'s going to be impactful in the coming year.   1: Quick response (QR) codes will continue to proliferate  2023 was the year of the QR code. Although not new, QR codes burst on the scene over the last year and were used in many credential phishing and malware campaigns. The use was driven by a confluence of factors, but ultimately boiled down to the fact that people are now way more accustomed to scanning QR codes for everything from instructions to menus. And threat actors are taking advantage. Proofpoint recently launched new in-line sandboxing capabilities to better defend against this threat, and our teams anticipate  seeing more of it in 2024. Notably, however, Dorais-Joncas points out that QR codes still just exist in the realm of ecrime – APT actors have not yet jumped on the QR code bandwagon. (Although, some of those APT actors bring ecrime energy to their campaigns, so it\'s possible they may start QR code phishing, too.)  2: Zero-day and N-day vulnerability exploitation  A theme that appeared throughout our conversations was the creative use of vulnerabilities – both known and unreported – in threat actor activity. APT actors used a wide variety of exploits, from TA473 exploiting publicly-facing webmail servers to espionage actors using a zero-day in an email security gateway appliance that ultimately forced users to rip out and reinstall physical hardware. But ecrime actors also exploited their share of vulnerabilities, including the MOVEit file transfer service vulnerability from the spring of 2023 that had cascading repercussions, and the ScreenConnect flaw announced in the fall of 2023 – both of which were used by ecrime actors before being officially published. Proofpoint anticipates vulnerability exploitation will continue, driven in part by improved defense making old school techniques – like macro-enabled documents – much less useful, as well as the vast financial resources now available to cybercriminals that were once just the domain of APT. Pargman says the creativity from ecrime threat actors is a direct response of defenders imposing cost on our adversaries.   3: Continuing, unexpected behavior changes  Avid listeners of the podcast know I have regularly said the ecrime landscape is extremely chaotic, with TA577 demonstrating the most chaotic vibes of them all. The tactics, techniques, and procedures (TTPs) of some of the most sophisticated actors continue to change. The cost imposed on threat actors that Pargman mentioned – from law enforcement takedowns of massive botnets like Qbot to improved detections and automated defenses – have forced threat actors, cybercriminals in particular, to regularly change their behaviors to figure out what is most effective. For example, recently Proofpoint has observed the increased use of: traffic dis Ransomware Malware Tool Vulnerability Threat Prediction ★★★
ComputerWeekly.webp 2024-01-23 12:23:00 Comment éviter les logiciels malveillants sur les systèmes Linux
How to avoid malware on Linux systems
(lien direct)
Gather \'round, cyber friends, and I\'ll let you in on a little secret: no one knows what the Next Big Thing on the threat landscape will be. But we can look back on 2023, identify notable changes and actor behaviors, and make educated assessments about what 2024 will bring.   This month on the DISCARDED podcast my co-host Crista Giering and I sat down with our Threat Research leaders Daniel Blackford, Alexis Dorais-Joncas, Randy Pargman, and Rich Gonzalez, leaders of the ecrime, advanced persistent threat (APT), threat detection, and Emerging Threats teams, respectively. We discussed what we learned over the last year, and what\'s on the horizon for the future. While the discussions touched on different topics and featured different opinions on everything from artificial intelligence (AI) to living off the land binaries (LOLBins) to vulnerability exploitation to ransomware, there were some notable themes that are worth writing down. We can\'t say for sure what surprises are in store, but with our cyber crystals balls fully charged – and a deep knowledge of a year\'s worth of threat actor activity based on millions of email threats per day – we can predict with high confidence what\'s going to be impactful in the coming year.   1: Quick response (QR) codes will continue to proliferate  2023 was the year of the QR code. Although not new, QR codes burst on the scene over the last year and were used in many credential phishing and malware campaigns. The use was driven by a confluence of factors, but ultimately boiled down to the fact that people are now way more accustomed to scanning QR codes for everything from instructions to menus. And threat actors are taking advantage. Proofpoint recently launched new in-line sandboxing capabilities to better defend against this threat, and our teams anticipate  seeing more of it in 2024. Notably, however, Dorais-Joncas points out that QR codes still just exist in the realm of ecrime – APT actors have not yet jumped on the QR code bandwagon. (Although, some of those APT actors bring ecrime energy to their campaigns, so it\'s possible they may start QR code phishing, too.)  2: Zero-day and N-day vulnerability exploitation  A theme that appeared throughout our conversations was the creative use of vulnerabilities – both known and unreported – in threat actor activity. APT actors used a wide variety of exploits, from TA473 exploiting publicly-facing webmail servers to espionage actors using a zero-day in an email security gateway appliance that ultimately forced users to rip out and reinstall physical hardware. But ecrime actors also exploited their share of vulnerabilities, including the MOVEit file transfer service vulnerability from the spring of 2023 that had cascading repercussions, and the ScreenConnect flaw announced in the fall of 2023 – both of which were used by ecrime actors before being officially published. Proofpoint anticipates vulnerability exploitation will continue, driven in part by improved defense making old school techniques – like macro-enabled documents – much less useful, as well as the vast financial resources now available to cybercriminals that were once just the domain of APT. Pargman says the creativity from ecrime threat actors is a direct response of defenders imposing cost on our adversaries.   3: Continuing, unexpected behavior changes  Avid listeners of the podcast know I have regularly said the ecrime landscape is extremely chaotic, with TA577 demonstrating the most chaotic vibes of them all. The tactics, techniques, and procedures (TTPs) of some of the most sophisticated actors continue to change. The cost imposed on threat actors that Pargman mentioned – from law enforcement takedowns of massive botnets like Qbot to improved detections and automated defenses – have forced threat actors, cybercriminals in particular, to regularly change their behaviors to figure out what is most effective. For example, recently Proofpoint has observed the increased use of: traffic dis Malware ★★★
RiskIQ.webp 2024-01-22 20:39:42 Livraison de logiciels malveillants de l'installateur MSIX à la hausse
MSIX Installer Malware Delivery on the Rise
(lien direct)
#### Description À partir de juillet 2023, Red Canary a commencé à enquêter sur une série d'attaques par des adversaires tirant parti des fichiers MSIX pour fournir des logiciels malveillants.MSIX est un format d'installation de packages d'applications Windows que les équipes et les développeurs informatiques utilisent de plus en plus pour fournir des applications Windows au sein des entreprises. Les adversaires de chaque intrusion semblaient utiliser une publicité malveillante ou un empoisonnement SEO pour attirer les victimes, qui pensaient qu'ils téléchargeaient des logiciels légitimes tels que Grammarly, Microsoft Teams, Notion et Zoom.Les victimes s'étendent sur plusieurs industries, ce qui suggère que les attaques de l'adversaire sont opportunistes plutôt que ciblées. #### URL de référence (s) 1. https://redcanary.com/blog/msix-installers/ #### Date de publication 16 janvier 2024 #### Auteurs) Tony Lambert
#### Description Starting in July 2023, Red Canary began investigating a series of attacks by adversaries leveraging MSIX files to deliver malware. MSIX is a Windows application package installation format that IT teams and developers increasingly use to deliver Windows applications within enterprises. The adversaries in each intrusion appeared to be using malicious advertising or SEO poisoning to draw in victims, who believed that they were downloading legitimate software such as Grammarly, Microsoft Teams, Notion, and Zoom. Victims span multiple industries, suggesting that the adversary\'s attacks are opportunistic rather than targeted. #### Reference URL(s) 1. https://redcanary.com/blog/msix-installers/ #### Publication Date January 16, 2024 #### Author(s) Tony Lambert
Malware Threat ★★
Blog.webp 2024-01-22 17:41:52 The Fake Fix: New Chae 4,1 $ de logiciels malveillants dans les téléchargements de pilotes
The Fake Fix: New Chae$ 4.1 Malware Hides in Driver Downloads
(lien direct)
> Par deeba ahmed Le dernier CHAE 4,1 $ envoie un message direct aux chercheurs en cybersécurité de Morphisec dans le code source. Ceci est un article de HackRead.com Lire la publication originale: la fausse correction: nouveau chae 4,1 $ de logiciels malveillants dans les téléchargements de pilotes
>By Deeba Ahmed The latest Chae$ 4.1 sends a direct message to the cybersecurity researchers at Morphisec within the source code. This is a post from HackRead.com Read the original post: The Fake Fix: New Chae$ 4.1 Malware Hides in Driver Downloads
Malware ★★★
bleepingcomputer.webp 2024-01-22 17:27:24 Les applications macOS fissurées vidaient les portefeuilles à l'aide de scripts récupérés à partir des enregistrements DNS
Cracked macOS apps drain wallets using scripts fetched from DNS records
(lien direct)
Les pirates utilisent une méthode furtive pour livrer aux logiciels malveillants de vol d'informations sur les utilisateurs de MacOS via des enregistrements DNS qui masquent les scripts malveillants.[...]
Hackers are using a stealthy method to deliver to macOS users information-stealing malware through DNS records that hide malicious scripts. [...]
Malware ★★★
The_Hackers_News.webp 2024-01-22 16:52:00 NS-Stealer utilise Discord Bots pour exfiltrer vos secrets des navigateurs populaires
NS-STEALER Uses Discord Bots to Exfiltrate Your Secrets from Popular Browsers
(lien direct)
Les chercheurs en cybersécurité ont découvert un nouveau voleur d'informations "sophistiqué" basé sur Java qui utilise un bot Discord pour exfiltrer les données sensibles des hôtes compromis. Le malware, nommé & nbsp; ns-voleur, se propage via des archives ZIP se faisant passer pour un logiciel craqué, le chercheur en sécurité Trellix Gurumoorthhi Ramanathan & nbsp; dit & nbsp; dans une analyse publiée la semaine dernière. Le fichier zip contient
Cybersecurity researchers have discovered a new Java-based "sophisticated" information stealer that uses a Discord bot to exfiltrate sensitive data from compromised hosts. The malware, named NS-STEALER, is propagated via ZIP archives masquerading as cracked software, Trellix security researcher Gurumoorthi Ramanathan said in an analysis published last week. The ZIP file contains
Malware ★★
InfoSecurityMag.webp 2024-01-22 16:30:00 De nouveaux cibles malware macOS ciblent les applications fissurées
New macOS Malware Targets Cracked Apps
(lien direct)
Kaspersky a déclaré que le malware ciblait MacOS Ventura 13.6 et les versions plus récentes
Kaspersky said the malware targeted macOS Ventura 13.6 and newer versions
Malware ★★★
Fortinet.webp 2024-01-22 16:00:00 Packages de vol d'informations cachés dans PYPI
Info Stealing Packages Hidden in PyPI
(lien direct)
Un auteur de malware PYPI de vol d'informations a été identifié de téléchargement discrètement des packages malveillants.Apprendre encore plus.
An info-stealing PyPI malware author was identified discreetly uploading malicious packages. Learn more.
Malware ★★★
Checkpoint.webp 2024-01-22 13:00:52 Un guide étape par étape pour repérer et prévenir les injections de cadre
A Step-by-Step Guide to Spotting and Preventing Frame Injections
(lien direct)
> Imaginez une jungle numérique florissante où les applications sur le Web sont la faune abondante, et les cybercriminels qui se cachent sont des cybercriminels, toujours prêts à bondir.Parmi leurs méthodes astucieuses, il y a & # 8216; injection de cadre, & # 8217;Une tactique sournoise qui transforme les applications Web en pavés de lancement pour le phishing et les logiciels malveillants s'ils ne sont pas rapidement détectés et écrasés.Considérez Rapid7, une sentinelle de cybersécurité basée dans le Massachusetts.Ils ont récemment découvert et corrigé un dangereux défaut d'injection SQL dans Nexpose, leur logiciel de gestion des vulnérabilités local.Si ce trou était resté caché, il pourrait être devenu la scène parfaite pour une attaque XSS.Heureusement, il existe des méthodes pour atténuer efficacement les attaques d'injection de cadre.Armé [& # 8230;]
>Imagine a thriving digital jungle where web-based applications are the abundant wildlife, and lurking amongst them are cybercriminals, ever ready to pounce. Among their crafty methods is ‘frame injection,’ a sneaky tactic that turns web applications into launchpads for phishing and malware if not quickly detected and squashed. Consider Rapid7, a cybersecurity sentinel based in Massachusetts. They recently discovered and fixed a dangerous SQL injection flaw in Nexpose, their home-grown vulnerability management software. If this hole had stayed hidden, it could’ve become the perfect stage for an XSS attack. Thankfully, there are methods to mitigate frame injection attacks effectively. Armed […]
Malware Vulnerability ★★★
SecureList.webp 2024-01-22 08:00:49 Le logiciel fissuré bat Gol
Cracked software beats gold: new macOS backdoor stealing cryptowallets
(lien direct)
Nous passons en revue une nouvelle porte dérobée macOS qui se reproduit sur un logiciel Cracked pour remplacer les portefeuilles Bitcoin et Exodus par des logiciels malveillants.
We review a new macOS backdoor that piggybacks on cracked software to replace Bitcoin and Exodus wallets with malware.
Malware ★★★
ProofPoint.webp 2024-01-22 06:00:26 Types de menaces et d'attaques d'identité que vous devez être consciente
Types of Identity Threats and Attacks You Should Be Aware Of
(lien direct)
It\'s easy to understand why today\'s cybercriminals are so focused on exploiting identities as a key step in their attacks. Once they have access to a user\'s valid credentials, they don\'t have to worry about finding creative ways to break into an environment. They are already in.   Exploiting identities requires legwork and persistence to be successful. But in many ways this tactic is simpler than exploiting technical vulnerabilities. In the long run, a focus on turning valid identities into action can save bad actors a lot of time, energy and resources. Clearly, it\'s become a favored approach for many attackers. In the past year, 84% of companies experienced an identity-related security breach.  To defend against identity-based attacks, we must understand how bad actors target the authentication and authorization mechanisms that companies use to manage and control access to their resources. In this blog post, we will describe several forms of identity-based attacks and methods and offer an overview of some security controls that can help keep identity attacks at bay.  Types of identity-based attacks and methods  Below are eight examples of identity attacks and related strategies. This is not an exhaustive list and, of course, cybercriminals are always evolving their techniques. But this list does provide a solid overview of the most common types of identity threats.   1. Credential stuffing  Credential stuffing is a type of brute-force attack. Attackers add pairs of compromised usernames and passwords to botnets that automate the process of trying to use the credentials on many different websites at the same time. The goal is to identify account combinations that work and can be reused across multiple sites.   Credential stuffing is a common identity attack technique, in particular for widely used web applications. When bad actors find a winning pair, they can steal from and disrupt many places at once. Unfortunately, this strategy is highly effective because users often use the same passwords across multiple websites.  2. Password spraying  Another brute-force identity attack method is password spraying. A bad actor will use this approach to attempt to gain unauthorized access to user accounts by systematically trying commonly used passwords against many usernames.   Password spraying isn\'t a traditional brute-force attack where an attacker attempts to use many passwords against a single account. It is a more subtle and stealthy approach that aims to avoid account lockouts. Here\'s how this identity attack usually unfolds:  The attacker gathers a list of usernames through public information sources, leaked databases, reconnaissance activities, the dark web and other means.  They then select a small set of commonly used or easily guessable passwords.  Next, the attacker tries each of the selected passwords against a large number of user accounts until they find success.  Password spraying is designed to fly under the radar of traditional security detection systems. These systems may not flag these identity-based attacks due to the low number of failed login attempts per user. Services that do not implement account lockout policies or have weak password policies are at risk for password spraying attacks.   3. Phishing  Here\'s a classic and very effective tactic that\'s been around since the mid-1990s. Attackers use social engineering and phishing to target users through email, text messages, phone calls and other forms of communication. The aim of a phishing attack is to trick users into falling for the attacker\'s desired action. That can include providing system login credentials, revealing financial data, installing malware or sharing other sensitive data.   Phishing attack methods have become more sophisticated over the years, but they still rely on social engineering to be effective.   4. Social engineering   Social engineering is more of an ingredient in an identity attack. It\'s all about the deception and manipulation of users, and it\'s a feature in Malware Vulnerability Threat Patching Technical ★★
ProofPoint.webp 2024-01-20 14:36:08 Invoice Phishing Alert: TA866 Deploys WasabiSeed & Screenshotter Malware (lien direct) It\'s easy to understand why today\'s cybercriminals are so focused on exploiting identities as a key step in their attacks. Once they have access to a user\'s valid credentials, they don\'t have to worry about finding creative ways to break into an environment. They are already in.   Exploiting identities requires legwork and persistence to be successful. But in many ways this tactic is simpler than exploiting technical vulnerabilities. In the long run, a focus on turning valid identities into action can save bad actors a lot of time, energy and resources. Clearly, it\'s become a favored approach for many attackers. In the past year, 84% of companies experienced an identity-related security breach.  To defend against identity-based attacks, we must understand how bad actors target the authentication and authorization mechanisms that companies use to manage and control access to their resources. In this blog post, we will describe several forms of identity-based attacks and methods and offer an overview of some security controls that can help keep identity attacks at bay.  Types of identity-based attacks and methods  Below are eight examples of identity attacks and related strategies. This is not an exhaustive list and, of course, cybercriminals are always evolving their techniques. But this list does provide a solid overview of the most common types of identity threats.   1. Credential stuffing  Credential stuffing is a type of brute-force attack. Attackers add pairs of compromised usernames and passwords to botnets that automate the process of trying to use the credentials on many different websites at the same time. The goal is to identify account combinations that work and can be reused across multiple sites.   Credential stuffing is a common identity attack technique, in particular for widely used web applications. When bad actors find a winning pair, they can steal from and disrupt many places at once. Unfortunately, this strategy is highly effective because users often use the same passwords across multiple websites.  2. Password spraying  Another brute-force identity attack method is password spraying. A bad actor will use this approach to attempt to gain unauthorized access to user accounts by systematically trying commonly used passwords against many usernames.   Password spraying isn\'t a traditional brute-force attack where an attacker attempts to use many passwords against a single account. It is a more subtle and stealthy approach that aims to avoid account lockouts. Here\'s how this identity attack usually unfolds:  The attacker gathers a list of usernames through public information sources, leaked databases, reconnaissance activities, the dark web and other means.  They then select a small set of commonly used or easily guessable passwords.  Next, the attacker tries each of the selected passwords against a large number of user accounts until they find success.  Password spraying is designed to fly under the radar of traditional security detection systems. These systems may not flag these identity-based attacks due to the low number of failed login attempts per user. Services that do not implement account lockout policies or have weak password policies are at risk for password spraying attacks.   3. Phishing  Here\'s a classic and very effective tactic that\'s been around since the mid-1990s. Attackers use social engineering and phishing to target users through email, text messages, phone calls and other forms of communication. The aim of a phishing attack is to trick users into falling for the attacker\'s desired action. That can include providing system login credentials, revealing financial data, installing malware or sharing other sensitive data.   Phishing attack methods have become more sophisticated over the years, but they still rely on social engineering to be effective.   4. Social engineering   Social engineering is more of an ingredient in an identity attack. It\'s all about the deception and manipulation of users, and it\'s a feature in Malware ★★★
The_Hackers_News.webp 2024-01-20 07:46:00 Alerte de phishing de la facture: TA866 déploie un logiciel malveillant Wasabiseed & Capethotter
Invoice Phishing Alert: TA866 Deploys WasabiSeed & Screenshotter Malware
(lien direct)
L'acteur de menace a suivi comme & nbsp; TA866 & nbsp; a refait surface après une interruption de neuf mois avec une nouvelle campagne de phishing en grand volume pour livrer des familles de logiciels malveillants connues telles que Wasabseed et Capshotter. La campagne, observée plus tôt ce mois-ci et bloquée par Proofpoint le 11 janvier 2024, a consisté à envoyer des milliers d'e-mails sur le thème des factures ciblant l'Amérique du Nord portant des fichiers PDF leurres. "Les PDF
The threat actor tracked as TA866 has resurfaced after a nine-month hiatus with a new large-volume phishing campaign to deliver known malware families such as WasabiSeed and Screenshotter. The campaign, observed earlier this month and blocked by Proofpoint on January 11, 2024, involved sending thousands of invoice-themed emails targeting North America bearing decoy PDF files. "The PDFs
Malware Threat ★★
RiskIQ.webp 2024-01-19 21:05:18 Le groupe de menaces russes Coldriver étend son ciblage des responsables occidentaux pour inclure l'utilisation de logiciels malveillants
Russian Threat Group COLDRIVER Expands its Targeting of Western Officials to Include the Use of Malware
(lien direct)
#### Description Le groupe de menaces russes Coldriver, également connu sous le nom de UNC4057, Star Blizzard et Callisto, a élargi son ciblage des responsables occidentaux pour inclure l'utilisation de logiciels malveillants.Le groupe s'est concentré sur les activités de phishing des conférences contre des personnes de haut niveau dans les ONG, les anciens officiers de renseignement et militaire et les gouvernements de l'OTAN.Coldriver a utilisé des comptes d'identité pour établir un rapport avec la cible, augmentant la probabilité du succès de la campagne de phishing \\, et finit par envoyer un lien ou un document de phishing contenant un lien. Coldriver a été observé en envoyant des cibles des documents PDF bénins à partir de comptes d'identité, présentant ces documents comme un nouveau éditorial ou un autre type d'article que le compte d'identité cherche à publier, demandant des commentaires de la cible.Lorsque l'utilisateur ouvre le PDF bénin, le texte apparaît crypté.Si l'objectif répond qu'ils ne peuvent pas lire le document chiffré, le compte d'identité Coldriver répond par un lien, généralement hébergé sur un site de stockage cloud, à un utilitaire de «décryptage» à l'utilisation de la cible.Cet utilitaire de décryptage, tout en affichant un document de leurre, est en fait une porte dérobée, suivie en tant que SPICA, donnant à Coldriver l'accès à la machine de la victime. #### URL de référence (s) 1. https://blog.google/thereat-analysis-group/google-tag-coldriver-russian-phishing-malware/ #### Date de publication 18 janvier 2024 #### Auteurs) Wesley Shields
#### Description Russian threat group COLDRIVER, also known as UNC4057, Star Blizzard, and Callisto, has expanded its targeting of Western officials to include the use of malware. The group has been focused on credential phishing activities against high-profile individuals in NGOs, former intelligence and military officers, and NATO governments. COLDRIVER has been using impersonation accounts to establish a rapport with the target, increasing the likelihood of the phishing campaign\'s success, and eventually sends a phishing link or document containing a link. COLDRIVER has been observed sending targets benign PDF documents from impersonation accounts, presenting these documents as a new op-ed or other type of article that the impersonation account is looking to publish, asking for feedback from the target. When the user opens the benign PDF, the text appears encrypted. If the target responds that they cannot read the encrypted document, the COLDRIVER impersonation account responds with a link, usually hosted on a cloud storage site, to a “decryption” utility for the target to use. This decryption utility, while also displaying a decoy document, is in fact a backdoor, tracked as SPICA, giving COLDRIVER access to the victim\'s machine. #### Reference URL(s) 1. https://blog.google/threat-analysis-group/google-tag-coldriver-russian-phishing-malware/ #### Publication Date January 18, 2024 #### Author(s) Wesley Shields
Malware Threat Cloud ★★
The_Hackers_News.webp 2024-01-19 18:18:00 Les experts mettent en garde contre la porte dérobée macOS cachée dans les versions piratées de logiciels populaires
Experts Warn of macOS Backdoor Hidden in Pirated Versions of Popular Software
(lien direct)
Des applications piratées ciblant les utilisateurs d'Apple MacOS ont été observées contenant une porte dérobée capable d'accorder des attaquants à distance aux machines infectées. "Ces applications sont hébergées sur des sites de piratage chinois afin de gagner des victimes", a déclaré les chercheurs de Lamf Threat Labs Ferdous Saljooki et Jaron Bradley & NBSP. "Une fois explosé, le malware téléchargea et exécutera plusieurs charges utiles
Pirated applications targeting Apple macOS users have been observed containing a backdoor capable of granting attackers remote control to infected machines. "These applications are being hosted on Chinese pirating websites in order to gain victims," Jamf Threat Labs researchers Ferdous Saljooki and Jaron Bradley said. "Once detonated, the malware will download and execute multiple payloads
Malware Threat ★★★
itsecurityguru.webp 2024-01-19 14:30:52 71 millions de courriels ajoutés pour avoir été à partir de la liste de compte naz.api volée
71 Million Emails Added to Have I Been Pwned From Naz.API Stolen Account List
(lien direct)
Près de 71 millions d'adresses e-mail liées à des comptes compromis de l'ensemble de données NAZ.API ont été incorporés dans le service de notification de violation de données.L'ensemble de données NAZ.API, composé de 1 milliard d'identification, est une compilation approfondie dérivée des listes de rembourrage des informations d'identification et des données pilinées par des logiciels malveillants de vol d'information.Les listes de bourrage d'identification comprennent la connexion [& # 8230;] Le message 71 millions de courriels ajoutés pour que je sois venu de la liste de compte naz.api apparu pour la première fois sur Guru de sécurité informatique.
Almost 71 million email addresses linked to compromised accounts from the Naz.API dataset have been incorporated into the data breach notification service of Have I Been Pwned. The Naz.API dataset, consisting of 1 billion credentials, is an extensive compilation derived from credential stuffing lists and data pilfered by information-stealing malware. Credential stuffing lists comprise login […] The post 71 Million Emails Added to Have I Been Pwned From Naz.API Stolen Account List first appeared on IT Security Guru.
Data Breach Malware ★★★
InfoSecurityMag.webp 2024-01-19 11:00:00 Les pirates russes Coldriver déploient des logiciels malveillants pour cibler les responsables occidentaux
Russian Coldriver Hackers Deploy Malware to Target Western Officials
(lien direct)
Google a averti que le Coldriver lié à la Russie a élargi son ciblage des responsables occidentaux en déployant des logiciels malveillants pour exfiltrer des données sensibles
Google has warned that the Russia-linked Coldriver has expanded its targeting of Western officials by deploying malware to exfiltrate sensitive data
Malware ★★
Blog.webp 2024-01-19 00:32:31 Distribution de smokeloader ciblant le gouvernement et les entreprises ukrainiens
Distribution of SmokeLoader Targeting Ukrainian Government and Companies
(lien direct)
Ahnlab Security Intelligence Center (ASEC) a découvert que plusieurs souches de malware smokeloder sont distribuées au gouvernement ukrainien etentreprises.Il semble que le nombre d'attaques ciblant l'Ukraine ait récemment augmenté.Les objectifs confirmés jusqu'à présent comprennent le ministère ukrainien de la Justice, les institutions publiques, les compagnies d'assurance, les institutions médicales, les entreprises de construction et les entreprises de fabrication.L'e-mail distribué suit le format illustré à la figure 1 écrite en ukrainien.Le corps comprenait des informations liées à une facture, incitant le lecteur à exécuter ...
AhnLab SEcurity intelligence Center (ASEC) discovered that multiple SmokeLoader malware strains are being distributed to the Ukrainian Government and companies. It seems that the number of attacks targeting Ukraine has increased recently. The targets confirmed so far include the Ukrainian Department of Justice, public institutions, insurance companies, medical institutions, construction companies, and manufacturing companies. The distributed email follows the format shown in Figure 1 written in Ukrainian. The body included information related to an invoice, prompting the reader to execute...
Malware Medical ★★★
DarkReading.webp 2024-01-18 23:00:00 Google: Coldriver apt de Russie \\ se déchaîne \\ 'spica \\' malware
Google: Russia\\'s ColdRiver APT Unleashes Custom \\'Spica\\' Malware
(lien direct)
Juste à temps pour la saison électorale américaine, l'un des groupes d'espionnage de hack-and-fuite préférés du Kremlin - Star Blizzard - a développé sa toute première porte dérobée personnalisée.
Just in time for the US election season, one of the Kremlin\'s favorite hack-and-leak spy groups - Star Blizzard - has developed its very first custom backdoor.
Malware ★★
The_Hackers_News.webp 2024-01-18 22:01:00 Nouveau docker malware vole le processeur pour la crypto et le trafic de faux site Web
New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic
(lien direct)
Les services vulnérables Docker sont ciblés par une nouvelle campagne dans laquelle les acteurs de la menace déploient un mineur de crypto-monnaie XMRIG ainsi que le logiciel du téléspectateur 9HITS dans le cadre d'une stratégie de monétisation à plusieurs volets. "Il s'agit du premier cas documenté de logiciels malveillants déploiement de l'application 9HITS en tant que charge utile", a déclaré Cado, la société de sécurité cloud, ajoutant que le développement est un signe que les adversaires sont
Vulnerable Docker services are being targeted by a novel campaign in which the threat actors are deploying XMRig cryptocurrency miner as well as the 9Hits Viewer software as part of a multi-pronged monetization strategy. "This is the first documented case of malware deploying the 9Hits application as a payload," cloud security firm Cado said, adding the development is a sign that adversaries are
Malware Threat Cloud ★★
The_Hackers_News.webp 2024-01-18 20:19:00 Les pirates russes Coldriver se développent au-delà du phishing avec des logiciels malveillants personnalisés
Russian COLDRIVER Hackers Expand Beyond Phishing with Custom Malware
(lien direct)
L'acteur de menace lié à la Russie connue sous le nom de Coldriver a été observé, a fait évoluer son métier pour aller au-delà de la récolte d'identification pour livrer ses tout premiers logiciels malveillants personnalisés écrits dans le langage de programmation de la rouille. Le groupe d'analyse des menaces de Google (TAG), qui a partagé les détails de la dernière activité, a déclaré que les chaînes d'attaque exploitent les PDF en tant que documents de leurre pour déclencher la séquence d'infection.Les leurres sont
The Russia-linked threat actor known as COLDRIVER has been observed evolving its tradecraft to go beyond credential harvesting to deliver its first-ever custom malware written in the Rust programming language. Google\'s Threat Analysis Group (TAG), which shared details of the latest activity, said the attack chains leverage PDFs as decoy documents to trigger the infection sequence. The lures are
Malware Threat ★★★
TechRepublic.webp 2024-01-18 18:44:20 AndroxGH0st malware botnet vole AWS, les informations d'identification Microsoft et plus
Androxgh0st Malware Botnet Steals AWS, Microsoft Credentials and More
(lien direct)
Le botnet malware AndroxGH0st est utilisé pour l'identification et l'exploitation des victimes dans les réseaux ciblés, ainsi que pour la collecte des informations d'identification.Lisez les conseils du FBI / CISA \\ pour protéger contre cette menace malveillante.
The Androxgh0st malware botnet is used for victim identification and exploitation in targeted networks, as well as credentials collection. Read the FBI/CISA\'s tips for protecting against this malware threat.
Malware Threat ★★
InfoSecurityMag.webp 2024-01-18 16:30:00 Une nouvelle campagne de logiciels malveillants exploite 9hits dans Docker Assault
New Malware Campaign Exploits 9hits in Docker Assault
(lien direct)
Découvert par Cado Security, la campagne déploie deux conteneurs à des instances de Docker vulnérables
Discovered by Cado Security, the campaign deploys two containers to vulnerable Docker instances
Malware ★★
DarkReading.webp 2024-01-18 15:44:00 Nouveau nouveau macOS MacOs Backdoor sur les sites Web chinois
Stealthy New macOS Backdoor Hides on Chinese Websites
(lien direct)
Les logiciels malveillants modifiés du projet open source KHEPRI qui partage des similitudes avec le voleur de données Zuru récoltent les données et diminuent des charges utiles supplémentaires.
Modified malware from the Khepri open source project that shares similarities with the ZuRu data stealer harvests data and drops additional payloads.
Malware ★★★
DarkReading.webp 2024-01-18 15:15:00 \\ 'chaes \\' Le code d'infostealer contient des notes d'amour de chasse à la menace cachée
\\'Chaes\\' Infostealer Code Contains Hidden Threat Hunter Love Notes
(lien direct)
L'analyse de l'infostaler malware version 4.1 comprend un art ASCII caché et un cri remerciant des chercheurs en cybersécurité.
Analysis of the infostealer malware version 4.1 includes hidden ASCII art and a shout-out thanking cybersecurity researchers.
Malware Threat ★★
RecordedFuture.webp 2024-01-18 15:00:00 Google: des pirates d'État russes déploient des logiciels malveillants dans des attaques d'espionnage à travers l'Europe
Google: Russian state hackers deploying malware in espionage attacks around Europe
(lien direct)
Les pirates d'État russes tentent de plus en plus de déployer des délais sur les appareils des cibles dans les pays de l'OTAN et l'Ukraine, selon Nouvelles recherches du groupe d'analyse des menaces de Google \\.Les chercheurs ont constaté que les tactiques des pirates du Centre 18, une unité au sein du Federal Security Service (FSB) de Russie, ont évolué ces derniers mois à des derniers mois
Russian state hackers are increasingly attempting to deploy backdoors on the devices of targets in NATO countries and Ukraine, according to new research from Google\'s Threat Analysis Group. The researchers found that the tactics of hackers from Center 18, a unit within Russia\'s Federal Security Service (FSB), have evolved in recent months to more sophisticated
Malware Threat ★★
SecurityWeek.webp 2024-01-18 14:06:53 L'APT russe connu pour les attaques de phishing développe également des logiciels malveillants, prévient Google
Russian APT Known for Phishing Attacks Is Also Developing Malware, Google Warns
(lien direct)
> Le groupe de menaces russes Colriver a développé SPICA, un malware qui lui permet de compromettre les systèmes et de voler des informations.
>Russian threat group ColdRiver has developed Spica, a malware that enables it to compromise systems and steal information. 
Malware Threat ★★★
News.webp 2024-01-18 14:00:11 Google Tag: Kremlin Cyber Spies se déplace dans les logiciels malveillants avec une porte dérobée personnalisée
Google TAG: Kremlin cyber spies move into malware with a custom backdoor
(lien direct)
Les menaces que les chasseurs croient que Coldriver utilise SPICA depuis au moins novembre 2022 Les cyberespaces russes liées au Federal Security Service (FSB) du Kremlin \\ passent au-delà de leurs bouffonneries de phishing et ont développé et développées habituelles et ont développé et développéUne porte dérobée personnalisée qu'ils ont commencé à livrer par e-mail dès le novembre 2022, selon le groupe d'analyse des menaces de Google.…
The threat hunters believe COLDRIVER has used SPICA since at least November 2022 Russian cyberspies linked to the Kremlin\'s Federal Security Service (FSB) are moving beyond their usual credential phishing antics and have developed a custom backdoor that they started delivering via email as far back as November 2022, according to Google\'s Threat Analysis Group.…
Malware Threat ★★
Blog.webp 2024-01-18 12:00:45 Les logiciels malveillants exploitent 9HIT
Malware Exploits 9Hits, Turns Docker Servers into Traffic Boosted Crypto Miners
(lien direct)
> Par deeba ahmed 9Hits, double coup: malware imite l'outil Web pour exploiter la crypto, générer un faux trafic de site Web. Ceci est un article de HackRead.com Lire le post original: Les logiciels malveillants exploitent 9HITS, transforment les serveurs Docker en mineurs de cryptographie boostés du trafic
>By Deeba Ahmed 9Hits, Double Hit: Malware Mimics Web Tool to Mine Crypto, Generate Fake Website Traffic. This is a post from HackRead.com Read the original post: Malware Exploits 9Hits, Turns Docker Servers into Traffic Boosted Crypto Miners
Malware Tool ★★
Blog.webp 2024-01-18 10:52:24 FBI: AndroxGH0st MALware Building Mega-Botnet pour un vol d'identification
FBI: Androxgh0st Malware Building Mega-Botnet for Credential Theft
(lien direct)
> Par deeba ahmed Le malware AndroxGH0st a été initialement signalé en décembre 2022. Ceci est un article de HackRead.com Lire le post original: FBI: AndroxGH0st MALware Building Mega-Botnet pour vol d'identification
>By Deeba Ahmed The AndroxGh0st malware was initially reported in December 2022. This is a post from HackRead.com Read the original post: FBI: Androxgh0st Malware Building Mega-Botnet for Credential Theft
Malware ★★
bleepingcomputer.webp 2024-01-18 09:00:00 Google: les pirates de FSB russes déploient de nouveaux logiciels malveillants SPICA Backdoor
Google: Russian FSB hackers deploy new Spica backdoor malware
(lien direct)
Google dit que le groupe de piratage à dos russe Coldriver pousse des logiciels malveillants de porte dérobée auparavant inconnus en utilisant des charges utiles se faisant passer pour un outil de décryptage PDF.[...]
Google says the ColdRiver Russian-backed hacking group is pushing previously unknown backdoor malware using payloads masquerading as a PDF decryption tool. [...]
Malware Tool ★★
IndustrialCyber.webp 2024-01-18 08:00:31 Le FBI et la CISA émettent des conseils sur AndroxGH0st malware et botnet menace pour les réseaux
FBI and CISA issue advisory on Androxgh0st malware and botnet threat to networks
(lien direct)
> Le Federal Bureau of Investigation (FBI) et la Cybersecurity and Infrastructure Security Agency (CISA) ont publié mardi un ...
>The U.S. Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) published Tuesday a...
Malware Threat ★★
Blog.webp 2024-01-18 07:10:53 MIMO COINMINER ET MIMUS RANSOMWALIES installées via des attaques de vulnérabilité
Mimo CoinMiner and Mimus Ransomware Installed via Vulnerability Attacks
(lien direct)
Ahnlab Security Intelligence Center (ASEC) a récemment observé les circonstances d'un acteur de menace de Coinmin appelé MIMO exploitant diverses vulnérabilités àinstaller des logiciels malveillants.MIMO, également surnommé HEZB, a été retrouvé pour la première fois lorsqu'ils ont installé des co -miners grâce à une exploitation de vulnérabilité Log4Shell en mars 2022. Jusqu'à présent, tous les cas d'attaque impliquaient l'installation de XMRIG Coinmin, appelé MIMO Miner Bot dans l'étape finale.Cependant, il y avait d'autres cas pertinents où le même acteur de menace a installé Mimus Ransomware, Proxyware et Reverse Shell ...
AhnLab SEcurity intelligence Center (ASEC) recently observed circumstances of a CoinMiner threat actor called Mimo exploiting various vulnerabilities to install malware. Mimo, also dubbed Hezb, was first found when they installed CoinMiners through a Log4Shell vulnerability exploitation in March 2022. Up until now, all of the attack cases involved the installation of XMRig CoinMiner called Mimo Miner Bot in the final stage. However, there were other pertinent cases where the same threat actor installed Mimus ransomware, proxyware, and reverse shell...
Ransomware Malware Vulnerability Threat ★★★
ProofPoint.webp 2024-01-18 05:00:52 Mémoire de sécurité: TA866 revient avec une grande campagne de messagerie
Security Brief: TA866 Returns with a Large Email Campaign
(lien direct)
What happened  Proofpoint researchers identified the return of TA866 to email threat campaign data, after a nine-month absence. On January 11, 2024, Proofpoint blocked a large volume campaign consisting of several thousand emails targeting North America. Invoice-themed emails had attached PDFs with names such as “Document_[10 digits].pdf” and various subjects such as “Project achievements”.  The PDFs contained OneDrive URLs that, if clicked, initiated a multi-step infection chain eventually leading to the malware payload, a variant of the WasabiSeed and Screenshotter custom toolset.  Screenshot of an email with an attached PDF.  If the user clicked on the OneDrive URL inside the PDF, they were:  Served a JavaScript file hosted on OneDrive.  The JavaScript, if run by the user, downloaded and ran an MSI file.   The MSI file executed an embedded WasabiSeed VBS script.  The WasabiSeed VBS script then downloaded and executed a second MSI file as well as continued polling for additional payloads in a loop. The additional payloads are currently unknown.   Finally, the second MSI file contained components of the Screenshotter screenshot utility which took a screenshot of the desktop and sent it the C2.  Attack chain summary: Email > PDF > OneDrive URL > JavaScript > MSI / VBS (WasabiSeed) > MSI (Screenshotter). The attack chain was similar to the last documented email campaign using this custom toolset observed by Proofpoint on March 20, 2023. The similarities helped with attribution. Specifically, TA571 spam service was similarly used, the WasabiSeed downloader remained almost the same, and the Screenshotter scripts and components remained almost the same. (Analyst Note: While Proofpoint did not initially associate the delivery TTPs with TA571 in our first publication on TA866, subsequent analysis attributed the malspam delivery of the 2023 campaigns to TA571, and subsequent post-exploitation activity to TA866.)  One of the biggest changes in this campaign from the last observed activity was the use of a PDF attachment containing a OneDrive link, which was completely new. Previous campaigns used macro-enabled Publisher attachments or 404 TDS URLs directly in the email body.  Screenshot of “TermServ.vbs” WasabiSeed script whose purpose is to execute an infinite loop, reaching out to C2 server and attempting to download and run an MSI file (empty lines were removed from this script for readability).  Screenshot of “app.js”, one of the components of Screenshotter. This file runs “snap.exe”, a copy of legitimate IrfanView executable, (also included inside the MSI) to save a desktop screenshot as “gs.jpg”.  Screenshot of “index.js”, another Screenshotter component. This code is responsible for uploading the desktop screenshot ”gs.jpg” to the C2 server.  Attribution  There are two threat actors involved in the observed campaign. Proofpoint tracks the distribution service used to deliver the malicious PDF as belonging to a threat actor known as TA571. TA571 is a spam distributor, and this actor sends high volume spam email campaigns to deliver and install a variety malware for their cybercriminal customers.  Proofpoint tracks the post-exploitation tools, specifically the JavaScript, MSI with WasabiSeed components, and MSI with Screenshotter components as belonging to TA866. TA866 is a threat actor previously documented by Proofpoint and colleagues in [1][2] and [3]. TA866 is known to engage in both crimeware and cyberespionage activity. This specific campaign appears financially motivated.  Proofpoint assesses that TA866 is an organized actor able to perform well thought-out attacks at scale based on their availability of custom tools, and ability and connections to purchase tools and services from other actors.  Why it matters  The following are notable characteristics of TA866\'s return to email threat data:  TA866 email campaigns have been missing from the landscape for over nine months (although there are indications that the actor was meanwhile Spam Malware Tool Threat ★★
RiskIQ.webp 2024-01-17 21:58:17 Avant de pointe: cibles suspectées APT Ivanti Connect Secure VPN dans une nouvelle exploitation zéro-jour |Mandiant
Cutting Edge: Suspected APT Targets Ivanti Connect Secure VPN in New Zero-Day Exploitation | Mandiant
(lien direct)
#### Description Le 10 janvier 2024, Ivanti a révélé deux vulnérabilités, CVE-2023-46805 et CVE-2024-21887, impactant Ivanti Connect Secure VPN («CS», anciennement Secure Secure) et Ivanti Policy Secure («PS»).Une exploitation réussie pourrait entraîner un contournement d'authentification et une injection de commandement, entraînant un autre compromis en aval d'un réseau de victimes.Mandiant a identifié l'exploitation zéro-jour de ces vulnérabilités à l'état sauvage dès décembre 2023 par un acteur présumé de menace d'espionnage, actuellement suivi de l'UNC5221. Mandiant partage les détails de cinq familles de logiciels malveillants associés à l'exploitation des appareils CS et PS.Ces familles permettent aux acteurs de la menace de contourner l'authentification et de fournir un accès de porte dérobée à ces appareils. #### URL de référence (s) 1. https://www.mandiant.com/resourceS / Blog / suspecté-APT-Targets-Ivanti-Zero-Day #### Date de publication 17 janvier 2024 #### Auteurs) Tyler McLellan John Wolfram Gabby Rconcone Matt Lin Robert Wallace Dimiter Andonov
#### Description On January 10, 2024, Ivanti disclosed two vulnerabilities, CVE-2023-46805 and CVE-2024-21887, impacting Ivanti Connect Secure VPN (“CS”, formerly Pulse Secure) and Ivanti Policy Secure (“PS”) appliances. Successful exploitation could result in authentication bypass and command injection, leading to further downstream compromise of a victim network. Mandiant has identified zero-day exploitation of these vulnerabilities in the wild beginning as early as December 2023 by a suspected espionage threat actor, currently being tracked as UNC5221. Mandiant is sharing details of five malware families associated with the exploitation of CS and PS devices. These families allow the threat actors to circumvent authentication and provide backdoor access to these devices. #### Reference URL(s) 1. https://www.mandiant.com/resources/blog/suspected-apt-targets-ivanti-zero-day #### Publication Date January 17, 2024 #### Author(s) Tyler Mclellan John Wolfram Gabby Roncone Matt Lin Robert Wallace Dimiter Andonov
Malware Vulnerability Threat ★★★★
DarkReading.webp 2024-01-17 21:24:00 80 millions de dollars en crypto disparaissent dans un enfer de malware drainer en tant que service
$80M in Crypto Disappears into Drainer-as-a-Service Malware Hell
(lien direct)
La campagne "Infernal Drainer" représente une évolution dangereuse dans les crypto-drainers, l'usurpation de Coinbase crédible et le maintien d'une vaste infrastructure pour la biz.
"Infernal Drainer" campaign represents a dangerous evolution in crypto-drainers, credibly spoofing Coinbase and maintaining a vast infrastructure-for-rent biz.
Malware ★★
RiskIQ.webp 2024-01-17 21:00:08 Anneaux de voleur atomique dans la nouvelle année avec une version mise à jour
Atomic Stealer Rings in the New Year with Updated Version
(lien direct)
#### Description Les utilisateurs de Mac doivent être conscients d'une campagne de distribution active via des publicités malveillantes fournissant un voleur atomique.La dernière itération du malware a ajouté le chiffrement et l'obscurcissement de son code.Le malware a été distribué via des campagnes de malvertisation et des sites compromis.En janvier 2024, une campagne de malvertising a été identifiée à l'aide de publicités Google Search pour attirer les victimes via un site Web de leurre imitant Slack.Les acteurs de la menace tirent parti des modèles de suivi pour filtrer le trafic et l'ouvrir à travers quelques redirectes avant de charger la page de destination.Le fichier DMG malveillant contient des instructions pour les utilisateurs pour ouvrir le fichier ainsi qu'une fenêtre de boîte de dialogue leur demandant de saisir le mot de passe de leur système.Cela permettra au voleur atomique de collecter des mots de passe et d'autres fichiers sensibles qui sont généralement liés à l'accès.Les voleurs continuent d'être une menace supérieure pour les utilisateurs de Mac, et il est important de télécharger des logiciels à partir de sites de confiance. #### URL de référence (s) 1. https://www.malwarebytes.com/blog/thereat-intelligence/2024/01/atomic-staleer-rings-in-the-new-year-with-updated-version #### Date de publication 10 janvier 2024 #### Auteurs) MalwareBytes Mende Intelligence Team J & eacute; r & ocirc; moi segura
#### Description Mac users should be aware of an active distribution campaign via malicious ads delivering Atomic Stealer. The latest iteration of the malware added encryption and obfuscation of its code. he malware was distributed via malvertising campaigns and compromised sites. In January 2024, a malvertising campaign was identified using Google search ads to lure victims via a decoy website impersonating Slack. The threat actors are leveraging tracking templates to filter traffic and route it through a few redirects before loading the landing page. The malicious DMG file contains instructions for users to open the file as well as a dialog window asking them to enter their system password. This will allow Atomic Stealer to collect passwords and other sensitive files that are typically access-restricted. Stealers continue to be a top threat for Mac users, and it is important to download software from trusted locations. #### Reference URL(s) 1. https://www.malwarebytes.com/blog/threat-intelligence/2024/01/atomic-stealer-rings-in-the-new-year-with-updated-version #### Publication Date January 10, 2024 #### Author(s) Malwarebytes Threat Intelligence Team Jérôme Segura
Malware Threat ★★★
Blog.webp 2024-01-17 19:33:02 L'outil Ishutdown de Kaspersky \\ détecte les logiciels espions Pegasus sur les appareils iOS
Kaspersky\\'s iShutdown Tool Detects Pegasus Spyware on iOS Devices
(lien direct)
par waqas Kaspersky a récemment lancé un outil appelé Ishutdown, conçu non seulement pour détecter le logiciel spymétrique de Pegasus notoire, mais aussi pour identifier d'autres menaces de logiciels malveillants sur les appareils iOS. Ceci est un article de HackRead.com Lire la publication originale: L'outil Ishutdown de Kaspersky détecte les logiciels espions Pegasus sur les appareils iOS
By Waqas Kaspersky has recently launched a tool called iShutdown, designed not only to detect the notorious Pegasus spyware but also to identify other malware threats on iOS devices. This is a post from HackRead.com Read the original post: Kaspersky’s iShutdown Tool Detects Pegasus Spyware on iOS Devices
Malware Tool ★★★
Last update at: 2024-05-08 22:08:15
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter