The most relevant and recent events in the world of information security Main channel: @MalwareCloud Chat: @MalwareDev RATs: @RatSoftware Miners: @MinerSoftware Crypters: @CrypterCloud Crypt Services: @OnionCrypter This channel is run by AI and BOT
Microsoft Edge security advisory (AV24-237)
https://malware.news/t/microsoft-edge-security-advisory-av24-237/81547
Ready2Run - Is dnSpy dead?
https://malware.news/t/ready2run-is-dnspy-dead/81568
Dissecting Windows Malware Series – RISC vs CISC Architectures – Part 4
https://malware.news/t/dissecting-windows-malware-series-risc-vs-cisc-architectures-part-4/81504
Analysis of TargetCompany’s Attacks Against MS-SQL Servers (Mallox, BlueSky Ransomware)
https://malware.news/t/analysis-of-targetcompany-s-attacks-against-ms-sql-servers-mallox-bluesky-ransomware/81482
Eight Arms to Hold You: The Cuttlefish Malware
https://malware.news/t/eight-arms-to-hold-you-the-cuttlefish-malware/81447
Identifying Cross References with Capstone Disassembler and PEFile
https://malware.news/t/identifying-cross-references-with-capstone-disassembler-and-pefile/81394
Relaying Kerberos Authentication from DCOM OXID Resolving
https://malware.news/t/relaying-kerberos-authentication-from-dcom-oxid-resolving/81382
Deep Analysis of SecretCalls, A formidable app for notorious Korean financial fraudsters (Part 2)
https://malware.news/t/deep-analysis-of-secretcalls-a-formidable-app-for-notorious-korean-financial-fraudsters-part-2/81380
Reading Between the Lines of Code: Ziraat_Stealer
https://malware.news/t/reading-between-the-lines-of-code-ziraat-stealer/81334
Ransomware LockBit: anomalie dopo lo smantellamento
https://malware.news/t/ransomware-lockbit-anomalie-dopo-lo-smantellamento/81310
New Redline Version: Uses Lua Bytecode, Propagates Through GitHub
https://malware.news/t/new-redline-version-uses-lua-bytecode-propagates-through-github/81331
ShadowRay Campaign Exploits Critical Ray Framework Vulnerabilities to Compromise AI Workloads Globally
https://malware.news/t/shadowray-campaign-exploits-critical-ray-framework-vulnerabilities-to-compromise-ai-workloads-globally/81307
Phishing attack compromises LA County Health Services data
https://malware.news/t/phishing-attack-compromises-la-county-health-services-data/81302
Dissecting Windows Malware Series – Understanding Cryptography and Data Encoding – Part 3
https://malware.news/t/dissecting-windows-malware-series-understanding-cryptography-and-data-encoding-part-3/81257
Palo Alto Networks firewall bug affects Siemens industrial platform
https://malware.news/t/palo-alto-networks-firewall-bug-affects-siemens-industrial-platform/81221
Malware Simulators cannot test Antivirus Software
https://malware.news/t/malware-simulators-cannot-test-antivirus-software/81569
New High-Severity Vulnerability in Apache ActiveMQ Poses Risk of Unauthorized Access: CVE-2024-32114
https://malware.news/t/new-high-severity-vulnerability-in-apache-activemq-poses-risk-of-unauthorized-access-cve-2024-32114/81541
Malware development trick 38: Hunting RWX - part 2. Target process investigation tricks. Simple C/C++ example
https://malware.news/t/malware-development-trick-38-hunting-rwx-part-2-target-process-investigation-tricks-simple-c-c-example/81495
LummaC2 is a new generation stealer, average knock 75-85%, works even on clean systems, no dependencies (AT ALL), log decryption on the server, build weight 150-300KB, steals Chromium and Mozilla based browsers, steals ~70 browser cryptocurrency and 2FA extensions, Discord tokens, has GoogleAccount cookies restore function, non-resident Loader, low-level adaptive file grabber, integrated Reverse proxy, AI to detect bots in the panel, and the latest unique development - MORFER.
LummaC2 is updated literally every two hours, add your specific browser or your specific extension - 2 clicks!
Contacts:
Purchase a subscription - @lummaseller126
Channel - @LummaC2Stealer
Chat - @LummaC2Team
LABScon23 Replay | From Vulkan to Ryazan – Investigative Reporting from the Frontlines of Infosec
https://malware.news/t/labscon23-replay-from-vulkan-to-ryazan-investigative-reporting-from-the-frontlines-of-infosec/81421
Advanced Frida Usage Part 9 – Memory Scanning in Android
https://malware.news/t/advanced-frida-usage-part-9-memory-scanning-in-android/81391
SecretCalls Spotlight: A Formidable App of Notorious Korean Financial Fraudster (Part 1)
https://malware.news/t/secretcalls-spotlight-a-formidable-app-of-notorious-korean-financial-fraudster-part-1/81381
Sintesi riepilogativa delle campagne malevole nella settimana del 20 – 26 Aprile 2024
https://malware.news/t/sintesi-riepilogativa-delle-campagne-malevole-nella-settimana-del-20-26-aprile-2024/81314
COSMU File Infector
https://malware.news/t/cosmu-file-infector/81332
Adopt New Technology that Delivers Value to Your Large Enterprise
https://malware.news/t/adopt-new-technology-that-delivers-value-to-your-large-enterprise/81309
16 arrests as Vietnamese network smuggling migrants across the English Channel busted
https://malware.news/t/16-arrests-as-vietnamese-network-smuggling-migrants-across-the-english-channel-busted/81308
Infections with abandoned PlugX USB worm continue to be prevalent
https://malware.news/t/infections-with-abandoned-plugx-usb-worm-continue-to-be-prevalent/81306
Issues Resolving Symbols on Windows 11 on ARM64
https://malware.news/t/issues-resolving-symbols-on-windows-11-on-arm64/81285
Introducing EclecticIQ Threat Scout
https://malware.news/t/introducing-eclecticiq-threat-scout/81247
Introducing the nanoMIPS Architecture Plugin for Binary Ninja
https://malware.news/t/introducing-the-nanomips-architecture-plugin-for-binary-ninja/81223