text stringlengths 8 115k |
|---|
# OceanLotus — 数字海洋的游猎者
## 第一章 OceanLotus 概述
2012年4月起,某境外黑客组织对中国政府、科研院所、海事机构、海域建设、航运企业等相关重要领域展开了有组织、有计划、有针对性的长时间不间断攻击。该组织主要通过鱼叉攻击和水坑攻击等方法,配合多种社会工程学手段进行渗透,向境内特定目标人群传播特种木马程序,秘密控制部分政府人员、外包商和行业专家的电脑系统,窃取系统中相关领域的机密资料。
根据该组织的某些攻击特点,我们将其命名为 OceanLotus。目前已经捕获的与 OceanLotus 相关的第一个特种木马出现在2012年4月。在此后的3年中,我们又先后捕获了与该组织相关的4种不同形态的特... |
# Tracking Elirks Variants in Japan: Similarities to Previous Attacks
Kaoru Hayashi
A recent, well-publicized attack on a Japanese business involved two malware families, PlugX and Elirks, that were found during the investigation. PlugX has been used in a number of attacks since first being discovered in 2012, and we... |
# Rise of Banking Trojan Dropper in Google Play
The Zscaler ThreatLabz team has recently discovered the Xenomorph banking trojan embedded in a lifestyle app in the Google Play store. The app is “Todo: Day manager,” and has over 1,000 downloads. This is the latest in a disturbing string of hidden malware in the Google ... |
# Peace through Pegasus: Jordanian Human Rights Defenders and Journalists Hacked with Pegasus Spyware
**Key Findings**
- Phones belonging to four Jordanian human rights defenders, lawyers, and journalists were hacked with NSO Group’s Pegasus spyware between August 2019 and December 2021.
- At least two of the four ta... |
# Whitefly: Espionage Group has Singapore in Its Sights
The group behind the SingHealth breach is also responsible for a string of other attacks in the region. In July 2018, an attack on Singapore’s largest public health organization, SingHealth, resulted in a reported 1.5 million patient records being stolen. Until n... |
# The Titan Stealer: Notorious Telegram Malware Campaign
## Overview
The Uptycs threat research team recently discovered a campaign involving the Titan Stealer malware, marketed and sold by a threat actor (TA) through a Telegram channel for cybercrime purposes. The stealer is capable of stealing a variety of informat... |
# Onion Dog: A 3-Year-Old APT Focused on the Energy and Transportation Industries in Korean-Language Countries
**BEIJING, March 8, 2016** — The Helios Team at 360 SkyEye Labs recently revealed that a hacker group named OnionDog has been infiltrating and stealing information from the energy, transportation, and other i... |
# Avast Threat Research: Tempting Cedar Spyware
**Threat Intelligence Team, 21 February 2018**
Avast tracks down Tempting Cedar, a spyware that uses social engineering to trick Facebook users into downloading an Advanced Persistent Threat (APT) disguised as the Kik Messenger app. A few months ago, one of our customer... |
# ScarCruft continues to evolve, introduces Bluetooth harvester
**By GReAT**
## Executive summary
After publishing our initial series of blog posts back in 2016, we have continued to track the ScarCruft threat actor. ScarCruft is a Korean-speaking and allegedly state-sponsored threat actor that usually targets organ... |
# Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain
**April 19, 2016**
**By Mark Mager**
Ransomware quickly gained national headlines in February after the Hollywood Presbyterian Medical Center in Los Angeles paid $17,000 in bitcoins to regain access to its systems. Since th... |
# ASERT Threat Intelligence Report – Uncovering the Seven Pointed Dagger
## Executive Summary
Previously, Arbor ASERT discovered indicators of the PlugX APT malware being used in a manner that suggested the country of Myanmar may have been a target, or involved in staging other campaigns towards other targets. Strate... |
# The New and Improved macOS Backdoor from OceanLotus
**By Erye Hernandez and Danny Tsechansky**
**June 22, 2017**
**Category:** Unit 42
**Tags:** backdoor, macOS, OceanLotus, threat intelligence
## Introduction
Recently, we discovered a new version of the OceanLotus backdoor in our WildFire cloud analysis p... |
# CDS 2018 | Unmasking APT X
About Press Copyright Contact us Creators Advertise Developers Terms Privacy Policy & Safety How YouTube works Test new features
© 2022 Google LLC |
# New Destructive Wiper “ZeroCleare” Targets Energy Sector in the Middle East
IBM X-Force Incident Response and Intelligence Services (IRIS)
January 2020
## New Malware “ZeroCleare” Used in Destructive Attacks
IBM® X-Force® has been researching and tracking destructive malware in the Middle East, particularly in t... |
# How to use the Emsisoft Decrypter for Philadelphia
**IMPORTANT!** Make sure you remove the malware from your system first. Otherwise, it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. If your system was compromised through the Windows Remote Desktop feature, w... |
# Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation
Cyber espionage threat actors continue to target technologies that do not support endpoint detection and response (EDR) solutions such as firewalls, IoT devices, hypervisors, and VPN technologies (e.g., Fortinet, SonicWall, P... |
# Zooming into Darknet Threats Targeting Japanese Organizations
In light of rising cyberattacks and ahead of the 2021 Tokyo Games, Japan is investing in cybersecurity efforts, including the establishment of a government entity dubbed the Digital Agency. This decision follows recent fraud involving Japanese bank accoun... |
# Research, News, and Perspectives
## Celebrating 15 Years of Pwn2Own
Join Erin Sindelar, Mike Gibson, Brian Gorenc, and Dustin Childs as they discuss Pwn2Own's 15th anniversary, what we've learned, and how the program will continue to serve the cybersecurity community in the future.
**Latest News** May 25, 2022
##... |
# DHL Invoice Malspam - Various Subject Lines
**Associated Files:**
- ZIP archive of the pcap: `2017-04-03-DHL-malspam-traffic.pcap.zip` (9.2 MB, 9,156,384 bytes)
- `2017-04-03-DHL-malspam-traffic.pcap` (10,643,014 bytes)
- ZIP archive of the malware: `2017-04-03-DHL-and-image-malspam-and-artifacts.zip` (694 kB, 684,2... |
# ESD Systems Recommendations for Emergency Shutdown and Related Safety Systems (Second Edition 2021)
## Introduction and Scope
### Introduction
Emergency shutdown (ESD) is a design feature used in process systems to reduce risk. In the liquefied gas industry, ESD is a safety system designed to minimize the consequen... |
# Analysis of NoCry: A variant of the Judge ransomware
By Gijs Rijnders
May 16, 2021
In January this year, we published a blog post on our analysis of the Judge ransomware. We announced a free decryptor for Judge victims in this blog post, which is available through the NoMoreRansom initiative. Our decryptor has be... |
# Indra — Hackers Behind Recent Attacks on Iran
**August 14, 2021**
## Introduction
These days, when we think of nation-state level damage, we immediately think of the nation-state level actor that must be responsible for it. While most attacks against a nation’s sensitive networks are indeed the work of other gover... |
# Damballa discovers new toolset linked to Destover
**Attacker’s arsenal helps them to broaden attack surface**
November 18, 2015
Tags: Destover, malware, trojan
Destover is best known as the malware used in the attack on Sony Pictures Entertainment in November 2014, and also for its relationship based on its w... |
# Incorporating the Cyberspace Domain: How Russia and China Exploit Asymmetric Advantages in Great Power Competition
March 15, 2021
Editor’s note: This article is the first in a series, “Full-Spectrum: Capabilities and Authorities in Cyber and the Information Environment.” The series endeavors to present expert comme... |
# CrowdStrike Cracks PartyTicket Ransomware Targeting Ukraine
CrowdStrike's analysis of the new ransomware, also known as HermeticRansom, that affected Ukrainian organizations revealed that files encrypted with PartyTicket are recoverable.
While a new ransomware strain was used in "destructive attacks" that targeted ... |
# First Clipper Malware Discovered on Google Play
Cryptocurrency stealers that replace a wallet address in the clipboard are no longer limited to Windows or shady Android app stores.
Cryptocurrency stealers that replace a wallet address in the clipboard are no longer limited to Windows or shady Android app stores. Fo... |
# SkyRAT
github.com/YSCHGroup/SkyRAT
YSCHGroup
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository. You can’t perform that action at this time. You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or windo... |
# Operation Sharpshooter
## Campaign Targets Global Defense, Critical Infrastructure
The McAfee® Advanced Threat Research team and McAfee Labs Malware Operations Group, employing McAfee® Global Threat Intelligence, have discovered a new global campaign targeting nuclear, defense, energy, and financial companies. This... |
# New "SockDetour" Fileless, Socketless Backdoor Targets U.S. Defense Contractors
Cybersecurity researchers have taken the wraps off a previously undocumented and stealthy custom malware called SockDetour that targeted U.S.-based defense contractors with the goal of being used as a secondary implant on compromised Win... |
# Trucking Giant Forward Air Hit by New Hades Ransomware Gang
Trucking and freight logistics company Forward Air has suffered a ransomware attack by a new ransomware gang that has impacted the company's business operations. Forward Air is a leading trucking and air freight logistics company based out of Tennessee, USA... |
```markdown
Case 2:16-mj-00551-JPD
Document 1
Filed 12/23/16
Page 1 of 16
Page 2 of 16
Page 3 of 16
Page 4 of 16
Page 5 of 16
Page 6 of 16
Page 7 of 16
Page 8 of 16
Page 9 of 16
Page 10 of 16
Page 11 of 16
Page 12 of 16
Page 13 of 16
Page 14 of 16
Page 15 of 16
Page 16 of 16
``` |
# Statement on Solar Winds Orion Cyberattacks
15.04.2021
Poland has received with great concern the information provided by the U.S. Government regarding the cyberattacks conducted by the Russian Federation using Solar Winds Orion systems and software. The impact of these attacks extends beyond the US and affects Eur... |
# In-Memory Shellcode Decoding to Evade AVs/EDRs
Askar
2020-07-26
Estimated Reading Time: 9 minutes
During the previous week, I was doing some research about Win32 APIs and how we can use them during weaponizing our attack. I already did some work related to process injection in the past, but I was looking for... |
# Russian Financial Cybercrime: How It Works
By Ruslan Stoyanov on November 19, 2015
## Introduction
The Russian-language cybercrime market is known all over the world. By ‘Russian-language market’ we mean cybercriminals who are citizens of the Russian Federation and some former USSR countries, predominantly Ukraine... |
# G DATA SecurityLabs Case Study: Operation “TooHash”
## Executive Summary
The experts of G DATA’s SecurityLabs discovered a cyber-espionage campaign that perfectly exemplifies how targeted attacks work. The purpose of this campaign was to steal valuable documents from the targeted entity, which we entitle “TooHash.” ... |
# Operation Poisoned News: Hong Kong Users Targeted With Mobile Malware via Local News Links
**Posted on:** March 24, 2020 at 5:01 am
**Posted in:** Malware, Mobile
**Author:** Trend Micro
A recently discovered watering hole attack has been targeting iOS users in Hong Kong. The campaign uses links posted on mul... |
# 日本企業を狙う高度なサイバー攻撃の全貌
企業内システムに潜む脅威を狩り出す「標的型攻撃ハンティングサービス」を日本において実施した結果、複数の日本企業に対して同一サイバー攻撃グループによるものと思われる標的型攻撃が行われていることが観測され、深刻な被害につながっていることが確認されました。
この標的型攻撃の活動として、2015年に顕在化した日本年金機構を含む複数の国内組織が被害に遭った標的型攻撃(Emdiviマルウェアを使った攻撃)と同様に、いくつかの国内組織におけるシステムの奥深くまで侵入しているものが多く発見されています。被害に遭った企業組織の多くは、警察など第三者から通報があるまで標的型攻撃を受けていることを認識できず... |
# SystemdMiner: When a Botnet Borrows Another Botnet’s Infrastructure
**JiaYu**
**May 7, 2019**
**Category: Botnet**
## Update (2019.4.26 17:30)
About 3 hours after the release of this article, we found that the attacker took down the URL of some payload downloads. The following URLs have expired:
- aptgetgxq... |
# Analyzing APT19 Malware Using a Step-by-Step Method
## Summary
In this blog post, we present a full analysis of a DLL backdoor also reported publicly as Derusbi. This particular piece of malware is associated with the actor known as APT19 (Codoso, C0d0so, Sunshop Group). APT19, also known as C0d0so or Deep Panda, i... |
# Tracking and Combatting an Evolving Danger: Ransomware Extortion
Ransomware gangs have intensified their impact by attempting, and often succeeding, in stealing data to coerce payments. The onset of the COVID-19 pandemic offered a catalyst for this tactic with its accompanying weakened organizational security and in... |
# CloudEye (GuLoader) Analysis
CloudEye (originally GuLoader) is a small malware downloader written in Visual Basic that's used in delivering all sorts of malicious payloads to victim machines. Its primary function is to download, decrypt, and run an executable binary off a server (commonly a legitimate one like Googl... |
# FontOnLake: Previously Unknown Malware Family Targeting Linux
ESET researchers have discovered a previously unknown malware family that utilizes custom and well-designed modules, targeting systems running Linux. Modules used by this malware family, which we dubbed FontOnLake, are constantly under development and pro... |
# Dynamically Extracting the Encryption Key from a Simple Ransomware
Init Discord Partners |
# Operation Ke3chang and TidePool Malware Analysis
Posted by: Micah Yates, Mike Scott, Brandon Levene, Jen Miller-Osborn, and Tom Keigher on May 22, 2016
Little has been published on the threat actors responsible for Operation Ke3chang since the report was released more than two years ago. However, Unit 42 has recent... |
# Static Unpacker and Decoder for Hello Kitty Packer
**Brenton Morris**
*April 25, 2022*
During a recent incident response engagement, the Profero IR team observed a sample of Hello Kitty ransomware. This version of ransomware is intriguing as this sample is packed with a packer written in Go. This packer decrypts ... |
# Meet GozNym: The Banking Malware Offspring of Gozi ISFB and Nymaim
IBM X-Force Research uncovered a Trojan hybrid spawned from the Nymaim and Gozi ISFB malware. It appears that the operators of Nymaim have recompiled its source code with part of the Gozi ISFB source code, creating a combination that is being activel... |
# Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure
## SUMMARY
This joint Cybersecurity Advisory (CSA)—authored by the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA)—is part of our cont... |
# Behind the Scenes of Business Email Compromise: Using Cross-Domain Threat Data to Disrupt a Large BEC Campaign
June 14, 2021
Microsoft 365 Defender researchers recently uncovered and disrupted a large-scale business email compromise (BEC) infrastructure hosted in multiple web services. Attackers used this cloud-bas... |
FREE SERVICE: Get trending cyber vulnerabilities delivered to your inbox every day.
SUBSCRIBE
Menu |
# Whois Numbered Panda
**Adam Meyers**
**March 29, 2013**
Last week’s Intelligence blog post featured Anchor Panda, one of the many adversary groups that CrowdStrike tracks. The adversary is the human component in an attack that one should focus on. It is not sufficient to simply identify ‘Chinese-based hackers’; i... |
# Phoenix: The Tale of the Resurrected Keylogger
**Written By**
Cybereason Nocturnus
November 20, 2019 | 11 minute read
Research by: Assaf Dahan
## Introduction: Keylogger Malware
Cybereason’s Nocturnus team is tracking a new keylogger gaining traction among cybercriminals called Phoenix. The keylogger first... |
# Necro Python Botnet Goes After Vulnerable VisualTools DVR
In the last week of September 2021, Juniper Threat Labs detected a new activity from Necro Python (a.k.a N3Cr0m0rPh, Freakout, Python.IRCBot) that is actively exploiting some services, including a new exploit added to its arsenal. This new exploit targets Vis... |
# KBOT: Sometimes They Come Back
**Authors**
Anna Malina
Although by force of habit many still refer to any malware as a virus, this once extremely common class of threats is gradually becoming a thing of the past. However, there are some interesting exceptions to this trend: we recently discovered malware that spr... |
# SteelCloverによるGoogle広告経由でマルウェアを配布する攻撃の活発化について
本日の記事は、SOCアナリスト小池倫太郎の記事です。
2023年1月初めから複数の日本企業において、Google広告経由でマルウェアをダウンロードするインシデントが急増しています。IcedIDやAurora Stealerを配布するものなど、観測されている攻撃キャンペーンは数多く存在しますが、特に私たちがSteelCloverと呼んでいる攻撃グループによるものが多くなっています。本稿では、直近で観測されたGoogle広告経由でのマルウェア配布事例の中から、SteelCloverによる攻撃の最新動向を共有します。
## SteelCl... |
# Cyberespionage Actor Deploying Malware Using Excel
Researchers have found that cyberespionage actor UAC-0056, also known as SaintBear, UNC2589, and TA471, is now using a macro-embedded Excel document to target several entities in Ukraine, including ICTV, a private TV channel.
"Unlike previous attacks that were tryi... |
# When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors
**By Mike Harbison and Peter Renals**
**July 5, 2022**
**Category:** Threat Advisory/Analysis
**Tags:** APT 29, brute ratel c4, pentest tool, red teaming tool
## Executive Summary
Unit 42 continuously hunts for new and unique m... |
# The PhishLabs Blog
Get The Latest Insights |
# What's Behind the Increase in Ransomware Attacks This Year?
**Andy Auld**
Head of Cyber Crime Intelligence, Cyber Threat Operations, PwC United Kingdom
In May, we reported a spike in cyber security incidents which had caused a significant impact on organisations already dealing with the challenges posed by the CO... |
# White Paper: Remediation and Hardening Strategies for Microsoft 365 to Defend Against UNC2452
## Overview
### Background
In December 2020, FireEye uncovered and publicly disclosed a widespread campaign conducted by the threat group we track as UNC2452. In some intrusions associated with this campaign, the attacker ... |
# Threat Research: CVE-2017-8759 Exploitation
FireEye recently detected a malicious Microsoft Office RTF document that leveraged CVE-2017-8759, a SOAP WSDL parser code injection vulnerability. This vulnerability allows a malicious actor to inject arbitrary code during the parsing of SOAP WSDL definition contents. Fire... |
# Destructive Malware Targeting Organizations in Ukraine
## SUMMARY
Leading up to Russia’s unprovoked attack against Ukraine, threat actors deployed destructive malware against organizations in Ukraine to destroy computer systems and render them inoperable.
- On January 15, 2022, the Microsoft Threat Intelligence Ce... |
# Bedep Lurking in Angler's Shadows
This post is authored by Nick Biasini.
In October 2015, Talos released our detailed investigation of the Angler Exploit Kit which outlined the infrastructure and monetary impact of an exploit kit campaign delivering ransomware. During the investigation, we found that two thirds of ... |
# Russian State-Sponsored Cyber Actors Gain Network Access by Exploiting Default Multifactor Authentication Protocols and “PrintNightmare” Vulnerability
## Summary
### Multifactor Authentication (MFA): A Cybersecurity Essential
- MFA is one of the most important cybersecurity practices to reduce the risk of intrusion... |
# Kaseya Supply Chain Ransomware Attack - Technical Analysis of the REvil Payload
On July 2, 2021, Kaseya, an IT Management software firm, disclosed a security incident impacting their on-premises version of Kaseya's Virtual System Administrator (VSA) software. Kaseya VSA is a cloud-based Managed Service Provider (MSP... |
# RIG EK SENDS BUNITU TROJAN
## ASSOCIATED FILES:
- Zip archive of the email and malware: **2017-05-09-Rig-EK-sends-Bunitu.pcap.zip** (462 kB)
- **2017-05-09-Rig-EK-sends-Bunitu.pcap** (554,307 bytes)
- Zip archive of the malware: **2017-05-09-Rig-EK-sends-Bunitu-artifacts.zip** (247 kB)
- **2017-05-09-Rig-EK-artifa... |
# A Hacker Tried to Poison a Florida City's Water Supply, Officials Say
Around 8 am on Friday morning, an employee of a water treatment plant in the 15,000-person city of Oldsmar, Florida, noticed that his mouse cursor was moving strangely on his computer screen, out of his control, as local police would later tell it... |
# North Korea (DPRK) Cyber Operations Groups
After Russia, US, and China, here is my mapping of known APT groups with (offensive) cyber operations capabilities from DPRK (commonly referred to as North Korea). As always, please let me know if you notice any mistakes, errors, or missing information since this is suppose... |
# A Gentle Introduction to Building a Threat Intelligence Team
|
# Phish, Phished, Phisher: A Quick Peek Inside a Telegram Harvester
The tale is told by many: to access this document, “Sign in to your account.” During our daily Managed Detection and Response operations, NVISO handles hundreds of user-reported phishing threats that made it past commercial anti-phishing solutions. To... |
# LAPSUS$: Recent Techniques, Tactics and Procedures
**Authored by:** David Brown, Michael Matthews and Rob Smallridge
**Date:** April 28, 2022
## tl;dr
This post describes the techniques, tactics, and procedures observed during recent LAPSUS$ incidents. Our findings can be summarised as below:
- Access and scra... |
# The Locking Egregor
**Analysis of TTPs employed by Egregor operators**
Oleg Skulkin
Senior DFIR Analyst at Group-IB
Roman Rezvukhin
Deputy head of the DFIR lab at Group-IB
Semyon Rogachev
Malware Analyst at Group-IB
Regardless of a cybersecurity role in your organization, whether you are a SOC analyst... |
# Ransomware Spotlight: RansomEXX
RansomEXX is a ransomware variant that gained notoriety after a spate of attacks in 2020 and continues to be active today. With its targeted nature and history for choosing high-profile victims, we shine our spotlight on RansomEXX to reveal its tactics, techniques, and procedures.
Ra... |
# Onboarding Threat Indicators into Splunk Enterprise Security: SolarWinds Continued
As your team responds to the SolarWinds security advisory, we wanted to provide additional guidance to help you more effectively ingest threat indicators to combat the Sunburst Backdoor malware in Splunk Enterprise Security (ES). Afte... |
# Global ATM Malware Wall
| Hash | Signature | Date |
|----------------------------------------------------------------------|-------------------|------------|
| 3fc60a83ef20e211458314b964dd532fa2ddedf042b508f5512b41f05f731116 | DispCashBR ... |
# Endpoint Protection
A longstanding cyberespionage campaign has been targeting mainly Japanese organizations with its own custom-developed malware (Backdoor.Daserf). The group, known to Symantec as Tick, has maintained a low profile, appearing to be active for at least 10 years prior to discovery.
In its most recent... |
# New Operators Usurp Elite Russian Hacker Forum "Verified"
On February 17, 2021, the elite Russian hacker forum, “Verified,” resurfaced abruptly, stood up with new web domains and new, unnamed admins claiming ownership. The speed and erratic nature of these developments, along with the peculiar nature of the new admi... |
# Operation Cobalt Kitty
## Threat Actor Profile & Indicators of Compromise
### Attribution
In this APT, the threat actor was very aware of the risks of exposure and tried to combat attribution as much as possible. This is often the case in large-scale cyber espionage operations. At the time of the attack, there... |
# More Russian Language Malspam Pushing Shade (Troldesh) Ransomware
## Introduction
Russian language spam pushing Shade ransomware (also known as Troldesh ransomware) has remained active since my previous ISC diary about it on 2018-11-29. However, sometime in February 2019, this malicious spam (malspam) altered its t... |
# Exploits in the Wild for WordPress File Manager RCE Vulnerability (CVE-2020-25213)
**By Nadav Markus, Efi Barkayev, Gal De Leon**
**February 5, 2021**
**Category: Unit 42**
**Tags: cryptojacking, Cryptominers, CVE-2020-25213, Kinsing, Remote Code Execution, vulnerabilities, WordPress**
## Executive Summary
I... |
# Ursnif Leverages Cerberus Android Malware to Automate Fraudulent Bank Transfers in Italy
IBM Trusteer researchers continually monitor the evolution and attack tactics in the banking sector. In a recent analysis, our team found that an Ursnif (aka Gozi) banking Trojan variant is being used in the wild to target onlin... |
# Let's Learn: In-Depth Reversing of Qakbot "qbot" Banker Part 1
**Goal:** Reverse engineer and analyze the Qakbot banker with the focus on its core functionality, new configuration, and decoded template.
## Emotet and Qakbot
**Malware Sources:**
- Invoice-75301.doc (5f894602e88263e34dcdbb2eb2da3078)
- Original Sign... |
# Identifying Cobalt Strike Team Servers in the Wild
**February 26, 2019**
## Summary
On January 2, 2019, Cobalt Strike version 3.13 was released, which contained a fix for an “extraneous space.” This uncommon whitespace in its server responses represents one of the characteristics Fox-IT has been leveraging to iden... |
# Big Airline Heist
**APT41 likely behind a third-party attack on Air India**
**Nikita Rostovсev**
**10.06.2021**
## Executive Summary
In late May, Air India reported a massive passenger data breach. The announcement was preceded by data breaches in various airline companies, including Singapore Airlines and Mal... |
# 勒索軟體的威脅
近期全球籠罩在勒索軟體的威脅下,大到法人企業、小至個人用戶,無一倖免。從針對式的 APT 攻擊(Advanced Persistent Threat,進階持續性攻擊)到各式網路犯罪組織,使用的勒索手法越發精湛與多樣化,並發展出 Ransomware as a Service(RaaS)商業模式,實現了「一時勒索一時爽,一直勒索一直爽」的勒索大業。
本次分析的案例,攻擊手法屬於較被動的方式,透過微軟瀏覽器 IE (Internet Explorer)的弱點來進行勒索,而非從企業的脆弱點進行攻擊,進而入侵到核心系統大量散布勒索軟體。這種「願者上鉤」的攻擊方式,攻擊者等待受害單位使用 IE 瀏覽器造訪惡意網站,再發... |
# Russian Ransomware Takes Advantage of Windows PowerShell
By Anand Ajjan
05 Mar 2013
For us in SophosLabs, ransomware is a common sight. We see many different versions every day. But as to be expected, the authors think up a new gimmick that makes us take notice. This is one of those cases.
Recently we received a... |
# Let's Learn: In-Depth Dive into Gootkit Banker Version 4 Malware Analysis
## Goal
Analyze and reverse the Gootkit banking malware version 4 in depth.
## Background
While reviewing several latest malware spam campaigns reported by multiplier researchers, I took a deeper dive into malware analysis of the campaigns au... |
# Malware Headliners: Dridex
For this blog post, we're taking a dive into the initial stages of a prevalent banking trojan known as Dridex. Developed by Maksim Yakubets and leveraged by advanced e-crime threat groups such as TA505 and Indrik Spider, this malware is commonly delivered in a Microsoft Office document as ... |
# There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families
By Mark Lim and Riley Porter
June 24, 2022
## Executive Summary
Unit 42 has discovered Zloader and BazarLoader samples that had interesting implementations of a sandbox evasion technique. This b... |
# "In The Box" - Mobile Malware Webinjects Marketplace
## Cybercrime Intelligence
With the rapid growth of fraudulent activity in a post-pandemic world, bad actors continue to upgrade their tooling to attack customers of major financial institutions (FIs), e-commerce platforms, and online marketplaces. According to c... |
# Daxin Backdoor: In-Depth Analysis, Part Two
In the second of a two-part series of blogs, we examine the communications and networking features of Daxin. This is the concluding part of our in-depth analysis of Backdoor Daxin, advanced malware that is being used by a China-linked espionage group. In this blog, we will... |
# Analyzing a Brute Ratel Badger
09 Jul 2022
Nowadays, Brute Ratel (sometimes called the “Angry Monkey C2”) seems to be a hot topic within the information security community. There’s been lots of drama surrounding the author (ParanoidNinja), rumors of the C2 being backdoored, and even some blog posts from well-known ... |
# HANCITOR: Analysing The Malicious Document
HANCITOR (aka CHANITOR) is a prevalent malware loader that spreads through social engineering in the form of Word or DocuSign® documents. The infected document includes instructions for the victim to manually allow the malicious macro code to be executed. The HANCITOR execu... |
# Getting the Bacon from the Beacon
Kareem Hamdan and Lucas Miller
September 29, 2020
In recent months, CrowdStrike® Services has observed a continued increase in the use of Cobalt Strike by eCrime and nation-state adversaries to conduct their operations following the initial access to victims’ environments. Cobalt... |
# Brand-New HavanaCrypt Ransomware Poses as Google Software Update App, Uses Microsoft Hosting Service IP Address as C&C Server
We recently found a new ransomware family, which we have dubbed HavanaCrypt, that disguises itself as a Google Software Update application and uses a Microsoft web hosting service IP address ... |
# Woocommerce Credit Card Skimmer
Recently, a client’s customers were receiving a warning from their anti-virus software when they navigated to the checkout page of the client’s ecommerce website. Antivirus software such as Kaspersky and ESET would issue a warning but only once a product had been added to the cart and... |
# Surtr Malware Family Targeting the Tibetan Community
**August 2, 2013**
**By Katie Kleemola and Seth Hardy**
## Background
As part of our ongoing study into targeted attacks on human rights groups and civil society organizations, the Citizen Lab analyzed a malicious email sent to Tibetan organizations in June 20... |
# HOOKBOT – a new mobile malware
Surveys show that more than 90% of the population now owns a mobile phone, with smartphones running the Android operating system being the most popular. Criminals know this and are eager to exploit this fact to steal sensitive user data, which can ultimately be used for financial gain.... |
# New JSSLoader Trojan Delivered Through XLL Files
Posted by Hido Cohen on March 23, 2022
Morphisec Labs has observed a new wave of JSSLoader infections this year. We’ve tracked JSSLoader activity since December 2020 and published a thorough report on the Russian criminal hacking group FIN7’s JSSLoader: The Evolution... |
# PrivateLoader: The First Step in Many Malware Schemes
Pay-per-install (PPI) malware services have been an integral part of the cybercrime ecosystem for a considerable amount of time. A malware operator provides payment, malicious payloads, and targeting information, and those responsible for running the service outs... |
# How to Respond to Emotet Infection (FAQ)
Since October 2019, there has been a growing number of Emotet infection cases in Japan. JPCERT/CC issued a security alert regarding Emotet malware infection. The purpose of this entry is to provide instructions on how to check if you are infected with Emotet and what you can ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.