MoonPeak malware from North Korean actors unveils new details on attacker infrastructure
https://blog.talosintelligence.com/moonpeak-malware-infrastructure-north-korea/
#apt #moonpeak #xenorat #opensource #analysis
https://blog.talosintelligence.com/moonpeak-malware-infrastructure-north-korea/
#apt #moonpeak #xenorat #opensource #analysis
Cisco Talos Blog
MoonPeak malware from North Korean actors unveils new details on attacker infrastructure
Cisco Talos has uncovered a new remote access trojan (RAT) family we are calling “MoonPeak.” This a XenoRAT-based malware, which is under active development by a North Korean nexus cluster we are calling “UAT-5394.”
From Windows drivers to a almost fully working EDR
https://blog.whiteflag.io/blog/from-windows-drivers-to-a-almost-fully-working-edr/
#windows #edr #tutor
https://blog.whiteflag.io/blog/from-windows-drivers-to-a-almost-fully-working-edr/
#windows #edr #tutor
blog.whiteflag.io
From Windows drivers to a almost fully working EDR
In this article we will see how Windows drivers work, how to create one and, in the end, we will develope a custom EDR that will rely on kernel callback functions, static analysis and API hooking.
NGate Android malware relays NFC traffic to steal cash
https://www.welivesecurity.com/en/eset-research/ngate-android-malware-relays-nfc-traffic-to-steal-cash/
#mobile #android #nfc #analysis
https://www.welivesecurity.com/en/eset-research/ngate-android-malware-relays-nfc-traffic-to-steal-cash/
#mobile #android #nfc #analysis
Welivesecurity
NGate Android malware relays NFC traffic to steal cash
ESET Research uncovers Android malware that relays NFC data from victims’ payment cards, via victims’ mobile phones, to the device of a perpetrator waiting at an ATM.
Whitecat18/Rust-for-Malware-Development
https://github.com/Whitecat18/Rust-for-Malware-Development
#rust #opensource #samples
https://github.com/Whitecat18/Rust-for-Malware-Development
#rust #opensource #samples
GitHub
GitHub - Whitecat18/Rust-for-Malware-Development: Rust for malware Development is a repository for advanced Red Team techniques…
Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀 - Whitecat18/Rust-for-Malware-Development
New Linux Malware 'sedexp' Hides Credit Card Skimmers Using Udev Rules
https://thehackernews.com/2024/08/new-linux-malware-sedexp-hides-credit.html
#linux #udev #analysis
https://thehackernews.com/2024/08/new-linux-malware-sedexp-hides-credit.html
#linux #udev #analysis
Dissecting the Windows Defender Driver - WdFilter (Part 1)
https://n4r1b.com/posts/2020/01/dissecting-the-windows-defender-driver-wdfilter-part-1/
Dissecting the Windows Defender Driver - WdFilter (Part 2)
https://n4r1b.com/posts/2020/02/dissecting-the-windows-defender-driver-wdfilter-part-2/
#windows #defender #av #reverse
https://n4r1b.com/posts/2020/01/dissecting-the-windows-defender-driver-wdfilter-part-1/
Dissecting the Windows Defender Driver - WdFilter (Part 2)
https://n4r1b.com/posts/2020/02/dissecting-the-windows-defender-driver-wdfilter-part-2/
#windows #defender #av #reverse
N4R1B
Dissecting the Windows Defender Driver - WdFilter (Part 1)
In this series of posts I'll be explaining how the Windows Defender main Driver works, in this first post we will look into the initialization and the Process creation notifications among other things
Extract Windows Defender database from vdm files and unpack it
https://github.com/hfiref0x/WDExtract
#windows #defender #av #vdm #signuature #unpack
https://github.com/hfiref0x/WDExtract
#windows #defender #av #vdm #signuature #unpack
GitHub
GitHub - hfiref0x/WDExtract: Extract Windows Defender database from vdm files and unpack it
Extract Windows Defender database from vdm files and unpack it - hfiref0x/WDExtract
Defender Pretender: When Windows Defender Updates Become a Security Risk
https://www.safebreach.com/blog/defender-pretender-when-windows-defender-updates-become-a-security-risk/
#windows #defender #av #signature #vdm
https://www.safebreach.com/blog/defender-pretender-when-windows-defender-updates-become-a-security-risk/
#windows #defender #av #signature #vdm
SafeBreach
Windows Defender Security Risk: Defender Pretender | SafeBreach
SafeBreach exploited the Windows Defender update to deliver malicious updates & maintain persistence on systems as an unprivileged user
An unexpected journey into Microsoft Defender's signature World
https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world
#windows #defender #av #signature
https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world
#windows #defender #av #signature
PEAKLIGHT: Decoding the Stealthy Memory-Only Malware | Google Cloud Blog
https://cloud.google.com/blog/topics/threat-intelligence/peaklight-decoding-stealthy-memory-only-malware/
#analysis #memonly
https://cloud.google.com/blog/topics/threat-intelligence/peaklight-decoding-stealthy-memory-only-malware/
#analysis #memonly
Google Cloud Blog
PEAKLIGHT: Decoding the Stealthy Memory-Only Malware | Google Cloud Blog
Mandiant identified a new memory-only dropper using a complex, multi-stage infection process.
Operation DevilTiger: 0day vulnerability techniques and tactics used by APT-Q-12 disclosed
https://ti.qianxin.com/blog/articles/operation-deviltiger-0day-vulnerability-techniques-and-tactics-used-by-apt-q-12-disclosed-en/
#analysis #apt
https://ti.qianxin.com/blog/articles/operation-deviltiger-0day-vulnerability-techniques-and-tactics-used-by-apt-q-12-disclosed-en/
#analysis #apt
Qianxin
奇安信威胁情报中心
Nuxt.js project
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/
#analysis #apt #exploit #wps #office
https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/
#analysis #apt #exploit #wps #office
Welivesecurity
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
ESET research uncovers a vulnerability in WPS Office for Windows (CVE-2024-7262), as it was being exploited by South Korea-aligned cyberespionage group APT-C-60 to target East Asian countries. Analysis of the vendor’s silently released patch led to the discovery…