Plus récents

Praying Mantis - A sophisticated, likely government-sponsored threat actor has been compromising major public and private organizations over the past year by exploiting deserialization flaws in public-facing ASP.NET applications to deploy fileless malware. The malware used by TG1021 shows a significant effort to avoid detection, both by actively interfering with logging mechanisms, successfully evading commercial EDRs and by silently awaiting incoming connections, rather than connecting back to a C2 channel and continuously generating traffic. Furthermore, the threat actor actively removed all disk-resident tools after using them, effectively giving up on persistency in exchange for stealth

Malware authors are increasingly using rarely spotted programming languages such as , , and in order to create new tools and to hinder analysis. Threat actors have begun to adopt them to rewrite known malware families or create tools for new sets

threatpost.com/malware-makers-

Chatter Indicates BlackMatter as , Successor - On July 19, 2021, a threat actor operating under the alias « BlackMatter » registered an account on the high-tier Russian-language illicit forums XSS and Exploit. The actor deposited 4 BTC (~$150,000 USD) into their escrow account. Large deposits on the forum indicate the seriousness of the threat actor. On July 21, 2021, the threat actor posted a notice on the forums, stating they are looking to purchase access to infected corporate networks in the , , , and the (Five Eyes), presumably for operations. The threat actor said they are looking for larger networks with revenues of over US $100 million.

flashpoint-intel.com/blog/chat

Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of and devices.

github.com/mvt-project/mvt

11: TPMs & Sovereignty - « We are here to remind you that the TPM requirement of Windows 11 furthers the agenda to protect the PC against you, its owner. »

secret.club/2021/06/28/windows

Password spraying and bruteforcing tool for Active Directory Domain Services

github.com/ShutdownRepo/smartb

Beaconator v1.1 is an aggressor script for Cobalt Strike used to generate a raw stageless and packing the generated shellcode using PEzor (an PE Packer)

github.com/capt-meelo/Beaconat

Axel Souchet (0vercl0k) recently open-sourced a promising new snapshot-based fuzzer. In his own words: « what the fuzz » or « wtf » is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and or kernel-mode targets running on Microsoft Windows. In this post, we will walk through the process of creating a fuzzer module for what the fuzz, allowing us to fuzz the packet parsing code of a popular triple-A multiplayer game title enjoyed by millions of active players.

blog.ret2.io/2021/07/21/wtf-sn

Command-Line Obfuscation : Project for identifying executables that have command-line options that can be obfuscated, possibly bypassing detection rules

github.com/wietze/windows-comm

Velociraptor - Windows.NTFS.MFT.HiveNightmare : This artifact uses Windows.NTFS.MFT to find several files created as part of the POC tooling for « HiveNightmare » (CVE-2021-36934)

docs.velociraptor.app/exchange

(CVE-2021-32749) fail2ban : The vulnerability, which could be massively exploited and lead to root-level code execution on multiple boxes, however this task is rather hard to achieve by regular person. It all has its roots in mailutils package and I've found it by a total accident when playing with command

research.securitum.com/fail2ba

The purpose of this post is to document what some Cobalt Strike techniques look like under the hood or to a defender's point of view. Realistically, this post is just breaking down a page straight from Cobalt Strike's website

hausec.com/2021/07/26/cobalt-s

Les criminalités n'ont cessés d'augmenter en : 85% de cas supplémentaires signalés. Les initiés estiment que le butin mondial de ces crimes se chiffre en centaines de milliards de dollars US par an. « Plus la ruse est élaborée, plus elle est difficile à détecter. » (Nicolas Mayencourt).

blick.ch/fr/news/suisse/85-de-

Le ministère des Transports du vient de demander au ministère de la Sécurité publique de rechercher des pirates informatiques qui ont attaqué le système (luongxanh.drvn.gov.vn) délivrant des certificats d'identification de véhicule avec code QR

fr.vietnamplus.vn/des-cyberatt

Classified documents, allegedly from , reveal secret research into how a attack could be used to sink a cargo ship or blow up a fuel pump at a petrol station. Internal files also include information on satellite communication devices used by the global shipping industry as well as a computer-based system that controls things like lights, heating and ventilation in smart buildings across the world. The papers appear to reveal a particular interest in researching companies and activities in western countries, including the , and . A security source with knowledge of the 57-page bundle of five research reports said it was compiled by a secret, offensive cyber unit called Shahid Kaveh, which is part of Iran's elite Islamic Revolutionary Guard Corps' (IRGC) cyber command

news.sky.com/story/irans-secre

Plus anciens