MoonPeak malware from North Korean actors unveils new details on attacker infrastructure
https://blog.talosintelligence.com/moonpeak-malware-infrastructure-north-korea/
#apt #moonpeak #xenorat #opensource #analysis
https://blog.talosintelligence.com/moonpeak-malware-infrastructure-north-korea/
#apt #moonpeak #xenorat #opensource #analysis
Cisco Talos Blog
MoonPeak malware from North Korean actors unveils new details on attacker infrastructure
Cisco Talos has uncovered a new remote access trojan (RAT) family we are calling “MoonPeak.” This a XenoRAT-based malware, which is under active development by a North Korean nexus cluster we are calling “UAT-5394.”
From Windows drivers to a almost fully working EDR
https://blog.whiteflag.io/blog/from-windows-drivers-to-a-almost-fully-working-edr/
#windows #edr #tutor
https://blog.whiteflag.io/blog/from-windows-drivers-to-a-almost-fully-working-edr/
#windows #edr #tutor
blog.whiteflag.io
From Windows drivers to a almost fully working EDR
In this article we will see how Windows drivers work, how to create one and, in the end, we will develope a custom EDR that will rely on kernel callback functions, static analysis and API hooking.
NGate Android malware relays NFC traffic to steal cash
https://www.welivesecurity.com/en/eset-research/ngate-android-malware-relays-nfc-traffic-to-steal-cash/
#mobile #android #nfc #analysis
https://www.welivesecurity.com/en/eset-research/ngate-android-malware-relays-nfc-traffic-to-steal-cash/
#mobile #android #nfc #analysis
Welivesecurity
NGate Android malware relays NFC traffic to steal cash
ESET Research uncovers Android malware that relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM.
Whitecat18/Rust-for-Malware-Development
https://github.com/Whitecat18/Rust-for-Malware-Development
#rust #opensource #samples
https://github.com/Whitecat18/Rust-for-Malware-Development
#rust #opensource #samples
GitHub
GitHub - Whitecat18/Rust-for-Malware-Development: Rust for malware Development is a repository for advanced Red Team techniques…
Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀 - Whitecat18/Rust-for-Malware-Development
New Linux Malware 'sedexp' Hides Credit Card Skimmers Using Udev Rules
https://thehackernews.com/2024/08/new-linux-malware-sedexp-hides-credit.html
#linux #udev #analysis
https://thehackernews.com/2024/08/new-linux-malware-sedexp-hides-credit.html
#linux #udev #analysis
Dissecting the Windows Defender Driver - WdFilter (Part 1)
https://n4r1b.com/posts/2020/01/dissecting-the-windows-defender-driver-wdfilter-part-1/
Dissecting the Windows Defender Driver - WdFilter (Part 2)
https://n4r1b.com/posts/2020/02/dissecting-the-windows-defender-driver-wdfilter-part-2/
#windows #defender #av #reverse
https://n4r1b.com/posts/2020/01/dissecting-the-windows-defender-driver-wdfilter-part-1/
Dissecting the Windows Defender Driver - WdFilter (Part 2)
https://n4r1b.com/posts/2020/02/dissecting-the-windows-defender-driver-wdfilter-part-2/
#windows #defender #av #reverse
N4R1B
Dissecting the Windows Defender Driver - WdFilter (Part 1)
In this series of posts I'll be explaining how the Windows Defender main Driver works, in this first post we will look into the initialization and the Process creation notifications among other things
Extract Windows Defender database from vdm files and unpack it
https://github.com/hfiref0x/WDExtract
#windows #defender #av #vdm #signuature #unpack
https://github.com/hfiref0x/WDExtract
#windows #defender #av #vdm #signuature #unpack
GitHub
GitHub - hfiref0x/WDExtract: Extract Windows Defender database from vdm files and unpack it
Extract Windows Defender database from vdm files and unpack it - hfiref0x/WDExtract
Defender Pretender: When Windows Defender Updates Become a Security Risk
https://www.safebreach.com/blog/defender-pretender-when-windows-defender-updates-become-a-security-risk/
#windows #defender #av #signature #vdm
https://www.safebreach.com/blog/defender-pretender-when-windows-defender-updates-become-a-security-risk/
#windows #defender #av #signature #vdm
SafeBreach
Windows Defender Security Risk: Defender Pretender | SafeBreach
SafeBreach exploited the Windows Defender update to deliver malicious updates & maintain persistence on systems as an unprivileged user
An unexpected journey into Microsoft Defender's signature World
https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world
#windows #defender #av #signature
https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world
#windows #defender #av #signature