Plus récents

According to Dragos data, between 2018 and 2021 the number of ransomware attacks on industrial control systems (ICS) increased over 500 percent, with five percent of attacks impacting oil & gas entities.

dragos.com/blog/industry-news/

PHOREAL/RIZZO is a backdoor allowing initial victim characterization and follow-on post-exploitation operations to compromise the confidentiality of organizations' data. It has been reported in other research as being used exclusively by APT32 (AKA SeaLotus, OceanLotus, APT-C-00, Group G0050). APT32 largely targets victims with political or economic interests in Southeast Asia, specifically 🇻🇳 Vietnam.

elastic.github.io/security-res

This analysis will help organizations better understand the inner workings of 's organizational infrastructure.

breachquest.com/conti-leaks-in

🇹🇼 The Aviation Police Bureau had arrested 2 airport contract workers suspected of causing a power outage in Terminal 2 of Taiwan Taoyuan International Airport on March 11, allegedly by cutting electrical cables that power parts of the building.

focustaiwan.tw/society/2022031

🇺🇸 The 238 reported breaches since September 2021 impacted more than 2.4 million Texans, according to state data. (CBS Dallas)

youtube.com/watch?v=R2c3qSJ2YM

Branch History Injection. What makes BHI noteworthy is that it can bypass recent silicon-level BTI mitigations implemented by Intel (eIBRS, or enhanced Indirect Branch Restricted Speculation) and Arm, thus allowing information to leak across privilege boundaries. In other words, a rogue user-level application can use BHI to extract keys and other secrets from OS kernel memory, which should be out of bounds, and the built-in defenses on Intel and Arm-designed CPU cores won't work.

theregister.com/2022/03/15/spe

VT4Browsers allows SOC analysts, incident responders and threat researchers to contextualize every IoC in any web platform with threat intelligence.

blog.virustotal.com/2022/03/vt

Un incident de sécurité perturbe depuis ce lundi 14 mars 2022 le site web ainsi que des outils internes au groupe Darty (darty.com) - à suivre..

We believe with medium-high confidence that Kwampirs and Shamoon 2 are maintained by the same group. Cybercriminals of all types and with a range of attack vectors and malware variants are targeting the healthcare industry and supply chains. Motivations can vary from just industrial espionage (intellectual property, scientific research), exfiltration and exposure of PHI records (of dissidents or key personalities), to the damaging extreme of enabling the creation of a crippling cyber-physical impact through wiper attacks if things get really ugly in a war scenario.

resources.cylera.com/hubfs/Cyl

CaddyWiper is relatively smaller than previous wiper attacks we've seen in Ukraine such as « HermeticWiper » and « WhisperGate » with a compiled size of just 9KB.

blog.talosintelligence.com/202

Les opérateurs Pandora revendiquent un vol de 350 GB de données relatives aux activités de 🇺🇸 Rosewood Corporation

Un incident de sécurité a touché le site web officiel d'achat et de vente du groupe LEGO, Bricklink (bricklink.com). « We now know that no BrickLink data has been compromised, and therefore, all systems are up and running again. »

brickfanatics.com/bricklink-su

🐧 B1txor20, a backdoor using DNS tunnel technology for C2 communications is spreading via Log4j vulnerability.

blog.netlab.360.com/b1txor20-u

Le groupe pro-iranien Black Shadow, silencieux depuis novembre 2021, revendique un vol de données concernant les activités de Rubinstein (fantasy.mn). Pour l'heure, la maigreur de l'échantillon (33Mo) ne prouve pas grand chose.

The Security Service of Ukraine (SSU) detained a « hacker » who was providing technical assistance to Russian troops in by routing phone calls.

vice.com/en/article/v7djda/ukr

Plus anciens