Expanding the Investigation: Deep Dive into Latest TrickMo Samples
...a new variant of the Banking Trojan called TrickMo.. features:
- OTP interception
- Screen recording
- Data exfiltration
- Remote control
- Automatic permission granting and auto-click on prompts
- Accessibility service abuse
- Overlay display and credential theft
Research:
https://www.zimperium.com/blog/expanding-the-investigation-deep-dive-into-latest-trickmo-samples/
...a new variant of the Banking Trojan called TrickMo.. features:
- OTP interception
- Screen recording
- Data exfiltration
- Remote control
- Automatic permission granting and auto-click on prompts
- Accessibility service abuse
- Overlay display and credential theft
Research:
https://www.zimperium.com/blog/expanding-the-investigation-deep-dive-into-latest-trickmo-samples/
Zimperium
Expanding the Investigation: Deep Dive into Latest TrickMo Samples - Zimperium
Our analysis of TrickMo suggests that many of these samples remain undetected by the broader security community.
HijackLoader evolution: abusing genuine signing certificates
https://harfanglab.io/insidethelab/hijackloader-abusing-genuine-certificates/
https://harfanglab.io/insidethelab/hijackloader-abusing-genuine-certificates/
HarfangLab | Your endpoints, our protection
HijackLoader evolution: abusing genuine signing certificates
Our telemetry has revealed a significant increase in Lumma Stealer malware deployments via the HijackLoader malicious loader.
New Bumblebee Loader Infection Chain Signals Possible Resurgence
https://www.netskope.com/blog/new-bumblebee-loader-infection-chain-signals-possible-resurgence
https://www.netskope.com/blog/new-bumblebee-loader-infection-chain-signals-possible-resurgence
Netskope
New Bumblebee Loader Infection Chain Signals Possible Resurgence
Summary Bumblebee is a highly sophisticated downloader malware cybercriminals use to gain access to corporate networks and deliver other payloads such as
Exposing the Danger Within: Hardcoded Cloud Credentials in Popular Mobile Apps
https://www.security.com/threat-intelligence/exposing-danger-within-hardcoded-cloud-credentials-popular-mobile-apps
https://www.security.com/threat-intelligence/exposing-danger-within-hardcoded-cloud-credentials-popular-mobile-apps
Security
Exposing the Danger Within: Hardcoded Cloud Credentials in Popular Mobile Apps
Examining the hidden risks posed to user privacy and security due to presence of hardcoded credentials within popular mobile apps.
Программа на стадии формирования, но призы уже анонсированы :)
Конференция об информационной безопасности в Казахстане, 1 Ноября пройдет в Алматы
Главные темы: ИИ, Безопасность IoT, TI, Фрод и многое другое.
Конференция будет полезна любым гос. и коммерческим организациям, для которых важна информационная безопасность.
Нетворкинг обеспечен
Детали здесь - https://profitday.kz/security
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
macOS NotLockBit | Evolving Ransomware Samples Suggest a Threat Actor Sharpening Its Tools
https://www.sentinelone.com/blog/macos-notlockbit-evolving-ransomware-samples-suggest-a-threat-actor-sharpening-its-tools/
https://www.sentinelone.com/blog/macos-notlockbit-evolving-ransomware-samples-suggest-a-threat-actor-sharpening-its-tools/
SentinelOne
macOS NotLockBit | Evolving Ransomware Samples Suggest a Threat Actor Sharpening Its Tools
An unknown threat actor is developing ransomware to lock files and steal data on macOS, and it's not LockBit.
Microsoft Update Warning—400 Million Windows PCs Now At Risk
https://www.forbes.com/sites/zakdoffman/2024/10/30/warning-for-14-billion-microsoft-windows-10-windows-11-users-get-free-upgrade/
https://www.forbes.com/sites/zakdoffman/2024/10/30/warning-for-14-billion-microsoft-windows-10-windows-11-users-get-free-upgrade/
Forbes
Microsoft Update Warning—400 Million Windows PCs Now At Risk
Are you one of the millions of Windows users at risk—here’s what you need to know.
Storm-0940 uses credentials from password spray attacks from a covert network
https://www.forbes.com/sites/zakdoffman/2024/10/30/warning-for-14-billion-microsoft-windows-10-windows-11-users-get-free-upgrade/
https://www.forbes.com/sites/zakdoffman/2024/10/30/warning-for-14-billion-microsoft-windows-10-windows-11-users-get-free-upgrade/
Forbes
Microsoft Update Warning—400 Million Windows PCs Now At Risk
Are you one of the millions of Windows users at risk—here’s what you need to know.
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
qBittorrent fixes flaw exposing users to MitM attacks for 14 years
https://www.bleepingcomputer.com/news/security/qbittorrent-fixes-flaw-exposing-users-to-mitm-attacks-for-14-years/
https://www.bleepingcomputer.com/news/security/qbittorrent-fixes-flaw-exposing-users-to-mitm-attacks-for-14-years/
BleepingComputer
qBittorrent fixes flaw exposing users to MitM attacks for 14 years
qBittorrent has addressed a remote code execution flaw caused by the failure to validate SSL/TLS certificates in the application's DownloadManager, a component that manages downloads throughout the app.
RISK:STATION, an unauthenticated zero-click vulnerability allowing attackers to obtain root-level code execution on the popular Synology DiskStation and BeeStation NAS devices, affecting millions of devices
https://www.midnightblue.nl/research/riskstation
https://www.midnightblue.nl/research/riskstation
www.midnightblue.nl
RISK:STATION
A zero-day vulnerability in the Synology® DiskStation and BeeStation product line, known as CVE-2024-10443, granting remote code execution as root.
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Threat Campaign Spreads Winos4.0 Through Game Application
https://www.fortinet.com/blog/threat-research/threat-campaign-spreads-winos4-through-game-application
https://www.fortinet.com/blog/threat-research/threat-campaign-spreads-winos4-through-game-application
Fortinet Blog
Threat Campaign Spreads Winos4.0 Through Game Application
FortiGuard Labs reveals a threat actor spreads Winos4.0, infiltrating gaming apps and targeting the education sector. Learn more.…
Мистер Малой легенда хип-хопа, автор множества хитов, и мой знакомый. Известен топ-треком всех времен и народов Буду пАгибать мАлодым, создал новый топ-трек "Войти в АЙТИ", не могу пропустить это и с радостью и гордостью поздравляю и представляю трек всеобщему вниманию.
Как завести себе питона, и войти в АЙТИ можно узнать из официального трека представленного в канале Мистера Малого:
- Apple Music
- Spotify Track
- Vk Official
- Ya Music
Приятного всем! ✌️
P.S. Кто не знает. Все о Мистер Малом на оф. сайте mistermaloy.com
Как завести себе питона, и войти в АЙТИ можно узнать из официального трека представленного в канале Мистера Малого:
- Apple Music
- Spotify Track
- Vk Official
- Ya Music
Приятного всем! ✌️
P.S. Кто не знает. Все о Мистер Малом на оф. сайте mistermaloy.com
Malicious Python Package Typosquats Popular 'fabric' SSH Library, Exfiltrates AWS Credentials
https://socket.dev/blog/malicious-python-package-typosquats-fabric-ssh-library
https://socket.dev/blog/malicious-python-package-typosquats-fabric-ssh-library
Socket
Malicious Python Package Typosquats Popular 'fabric' SSH Lib...
The Socket Research Team uncovered a malicious Python package typosquatting the popular 'fabric' SSH library, silently exfiltrating AWS credentials fr...
Linux Foundation курс/сертификацию есть возможность получить бесплатно (а ценники там норм), еще есть время до конца недели. На всякий случаю дублирую сюда.
https://news.1rj.ru/str/sysadm_in_up/2272
https://news.1rj.ru/str/sysadm_in_up/2272
Telegram
Sys-Admin Up
🗣Конкурс результатом которого может быть 100% скидка на курс или экзамен от Linux Foundation
Выбирай не хочу:
— Курс
— Сертификат
Конкурс от core247.kz вполне может помочь в этом, ваучер применим к:
— онлайн-курсу
— сертификационному экзамену
— или пакету…
Выбирай не хочу:
— Курс
— Сертификат
Конкурс от core247.kz вполне может помочь в этом, ваучер применим к:
— онлайн-курсу
— сертификационному экзамену
— или пакету…
SpyNote: Unmasking a Sophisticated Android Malware
This version of SpyNote is being distributed as a fake Avast antivirus (Avastavv.apk) for the Android platform on a phishing site..:
https://www.cyfirma.com/research/spynote-unmasking-a-sophisticated-android-malware/
This version of SpyNote is being distributed as a fake Avast antivirus (Avastavv.apk) for the Android platform on a phishing site..:
https://www.cyfirma.com/research/spynote-unmasking-a-sophisticated-android-malware/
CYFIRMA
SpyNote: Unmasking a Sophisticated Android Malware - CYFIRMA
Executive Summary At Cyfirma, we are dedicated to providing current insights into prevalent threats and the strategies employed by malicious...
Attackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale
https://lab.wallarm.com/attackers-abuse-docusign-api-to-send-authentic-looking-invoices-at-scale/
https://lab.wallarm.com/attackers-abuse-docusign-api-to-send-authentic-looking-invoices-at-scale/
Wallarm
Attackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale
Cybercriminals exploit DocuSign API to send mass fake invoices, bypassing defenses with authentic-looking phishing attacks. Discover how to stay protected.
Hacker Leaks Employee Data from Amazon, McDonald’s, HSBC, HP, and Potentially 1000+ Other Companies
https://www.infostealers.com/article/massive-moveit-vulnerability-breach-hacker-leaks-employee-data-from-amazon-mcdonalds-hsbc-hp-and-potentially-1000-other-companies/
https://www.infostealers.com/article/massive-moveit-vulnerability-breach-hacker-leaks-employee-data-from-amazon-mcdonalds-hsbc-hp-and-potentially-1000-other-companies/
InfoStealers
Massive MOVEit Vulnerability Breach: Hacker Leaks Employee Data from Amazon, McDonald's, HSBC, HP, and Potentially 1000+ Other…
Discover the significant vulnerability breach that exposed extensive employee data from major organizations worldwide.
APT Actors Embed Malware within macOS Flutter Applications
https://www.jamf.com/blog/jamf-threat-labs-apt-actors-embed-malware-within-macos-flutter-applications/
https://www.jamf.com/blog/jamf-threat-labs-apt-actors-embed-malware-within-macos-flutter-applications/
Jamf
Jamf Threat Labs discovers a new threat targeting macOS
With malicious code hidden within, the new malware with ties to DPRK, has evaded detection by notable malware checking systems that may signal a new way of attacking macOS devices.
Forwarded from OpenBLD.net (Yevgeniy Goncharov)
🏎 OpenBLD.net – Engine for a Faster Internet
Increased throughput with the newest Gears in the racing engine of OpenBLD.net. Some Gears have been rewritten or built from scratch:
• Synchronous processing of block lists
• Caching of blocking events
• Updated caching system — the log enricher now has its own cache
• Enhanced request processing system
• New health-checking system for upstream servers, with response time detection
• Improved load balancing, routing requests to servers with the lowest response time
• Optimized parallel DNS request handling, delivering the fastest response
I hope these features will help us save valuable time online while the OpenBLD.net system's gears run smoothly under the hood.
What's Gears?
Gears are the components of the OpenBLD.net system that help to customize online experiences.
If you notice any “engine misfires,” please let me know. I’m always open to constructive feedback.
Wishing everyone a safe journey across the internet! ✌️
Increased throughput with the newest Gears in the racing engine of OpenBLD.net. Some Gears have been rewritten or built from scratch:
• Synchronous processing of block lists
• Caching of blocking events
• Updated caching system — the log enricher now has its own cache
• Enhanced request processing system
• New health-checking system for upstream servers, with response time detection
• Improved load balancing, routing requests to servers with the lowest response time
• Optimized parallel DNS request handling, delivering the fastest response
I hope these features will help us save valuable time online while the OpenBLD.net system's gears run smoothly under the hood.
What's Gears?
Gears are the components of the OpenBLD.net system that help to customize online experiences.
If you notice any “engine misfires,” please let me know. I’m always open to constructive feedback.
Wishing everyone a safe journey across the internet! ✌️
Stealthy Attributes of APT Lazarus: Evading Detection with Extended Attributes
https://www.group-ib.com/blog/stealthy-attributes-of-apt-lazarus/
https://www.group-ib.com/blog/stealthy-attributes-of-apt-lazarus/
Group-IB
Stealthy Attributes of APT Lazarus | Group-IB Blog
In this blog, we examine a fresh take on techniques regarding concealing codes in Extended Attributes in order to evade detection in macOS systems. This is a new technique that has yet to be included in the MITRE ATT&CK framework.
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
https://www.volexity.com/blog/2024/11/15/brazenbamboo-weaponizes-forticlient-vulnerability-to-steal-vpn-credentials-via-deepdata/
https://www.volexity.com/blog/2024/11/15/brazenbamboo-weaponizes-forticlient-vulnerability-to-steal-vpn-credentials-via-deepdata/
Volexity
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
In July 2024, Volexity identified exploitation of a zero-day credential disclosure vulnerability in Fortinet’s Windows VPN client that allowed credentials to be stolen from the memory of the client’s process. This vulnerability was discovered while analyzing…