Source Byte – Telegram
Source Byte
7.79K subscribers
852 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Forwarded from H
Hi
This is Hosien , currently i'm investigating a malware campaign targeting Iranian spoken users , exploiting winrar (likely cve-2025-6218 or cve-2025-8088) . the code they used are advanced and i think we face APT or skillful cyber-criminals .


i'm asking you to share this message so we can find out how this Threat Actor spread it's malware above images show .rar file & opened decoy .doc file
🔥21
2022 0-day In-the-Wild Exploitation…so far

As of June 15, 2022, there have been 18 0-days detected and disclosed as exploited in-the-wild in 2022. When we analyzed those 0-days, we found that at least nine of the 0-days are variants of previously patched vulnerabilities. At least half of the 0-days we’ve seen in the first six months of 2022 could have been prevented with more comprehensive patching and regression tests. On top of that, four of the 2022 0-days are variants of 2021 in-the-wild 0-days. Just 12 months from the original in-the-wild 0-day being patched, attackers came back with a variant of the original bug.

https://projectzero.google/2022/06/2022-0-day-in-wild-exploitationso-far.html
4
Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deobfuscation using symbolic execution, taint analysis and LLVM.

https://tigress.cs.arizona.edu/challenges.html
3
Forwarded from Sec Note
"It’s a pleasure and an honor to present to you once again."

#avast #av #reverse
8🔥3👏3
Backdoor code found in Trust Wallet browser extension, causing theft of tens of millions of dollars in assets
A new backdoor code was added to version 2.68 of the Trust Wallet cryptocurrency wallet's browser extension, which sends users' mnemonic phrases to attacker servers. Due to the automatic update mechanism, the impact was widespread. On Christmas Day, December 25th, attackers began transferring funds, and according to current estimates, more than tens of millions of dollars in assets have been stolen. The latest version 2.69 has now removed the backdoor code.
😁5👾2🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
Trust wallet users ;)
😁22🗿1
Forwarded from Sec Note
Analyzing Avast AV: Kernel Hooking and Driver Reverse Engineering
👾Presentation Video

Blog:
https://binary-win.github.io/2025/12/27/AVAST-Kernel-Hooks-and-AV-ANALYSIS.html
4🔥1
TAKBET data breach
@webamoozir may like it :)
😁7
Forwarded from APT IRAN
طبق بررسی‌هایی که انجام دادیم، از دیروز چندین آی‌پی از کشور امارات متحده عربی شروع به یک حمله سایبری سازمان‌یافته علیه سیستم ردیابی پیشرفته‌ای به نام MammutConnect کردند. این سیستم در واقع یک پلتفرم پیشرفته برای ردیابی و مدیریت ناوگان حمل‌ونقل سنگین و... در سطح کشور است که روی خودروهای سنگین مثل کامیون‌ها و اتوبوس‌ها نصب شده.

مهاجمین به سرورهای مرکزی این سیستم که روی سرویس ابری ایرانی "ابرآروان" قرار دارد، نفوذ کردند و اقدام به پاک‌سازی کامل اطلاعات (Data Wiping) کردند. این اطلاعات شامل موقعیت‌های لحظه‌ای خودروها، داده‌های فنی موتور، مصرف سوخت، رفتار رانندگان و سایر اطلاعات حیاتی بود
APT IRAN
Photo
Attribution base on IP address is bad idea

Here is cool report about UAE APT , "Stealth Falcon".

https://research.checkpoint.com/2025/stealth-falcon-zero-day/
3