Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 170 / 222
4427 résultats taggé EN  ✕
Winter Vivern | Uncovering a Wave of Global Espionage https://www.sentinelone.com/labs/winter-vivern-uncovering-a-wave-of-global-espionage/
05/04/2023 08:19:24
QRCode
archive.org
thumbnail

SentinelLabs uncover a previously unknown set of espionage campaigns conducted by Winter Vivern advanced persistent threat (APT) group.

sentinelone EN 2023 APT WinterVivern anallysis Russia
Rorschach – A New Sophisticated and Fast Ransomware https://research.checkpoint.com/2023/rorschach-a-new-sophisticated-and-fast-ransomware/
04/04/2023 14:31:31
QRCode
archive.org
thumbnail
  • Check Point Research (CPR) and Check Point Incident Response Team (CPIRT) encountered a previously unnamed ransomware strain, we dubbed Rorschach, deployed against a US-based company.
    Rorschach ransomware appears to be unique, sharing no overlaps that could easily attribute it to any known ransomware strain. In addition, it does not bear any kind of branding which is a common practice among ransomware groups.
  • The ransomware is partly autonomous, carrying out tasks that are usually manually performed during enterprise-wide ransomware deployment, such as creating a domain group policy (GPO). In the past, similar functionality was linked to LockBit 2.0.
  • The ransomware is highly customizable and contains technically unique features, such as the use of direct syscalls, rarely observed in ransomware. Moreover, due to different implementation methods, Rorschach is one of the fastest ransomware observed, by the speed of encryption.
  • The ransomware was deployed using DLL side-loading of a Cortex XDR Dump Service Tool, a signed commercial security product, a loading method which is not commonly used to load ransomware. The vulnerability was properly reported to Palo Alto Networks.
checkpoint research EN 2023 Rorschach ransomware DLL side-loading Cortex XDR
3CX Desktop App Compromised (CVE-2023-29059) https://www.fortinet.com/blog/threat-research/3cx-desktop-app-compromised
04/04/2023 08:17:12
QRCode
archive.org
thumbnail

FortiGuard Labs highlights how a digitally signed 3CX desktop app was reportedly used in a supply chain attack against 3CX Voice over Internet Protocol (VoIP) customers. Check back for analysis and coverage updates.

fortinet EN 2023 3CX FortiGuard-Lab supply-chain Threat-Research CVE-2023-29059 analysis
Android app from China executed 0-day exploit on millions of devices | Ars Technica https://arstechnica.com/information-technology/2023/03/android-app-from-china-executed-0-day-exploit-on-millions-of-devices/
03/04/2023 18:11:01
QRCode
archive.org
thumbnail

Fast-growing e-commerce app Pinduoduo had an EvilParcel stow-away.

arstechnica EN 2023 Pinduoduo EvilParcel 0-day exploit
Cyble — Cl0p Ransomware: Active Threat Plaguing Businesses Worldwide https://blog.cyble.com/2023/04/03/cl0p-ransomware-active-threat-plaguing-businesses-worldwide/
03/04/2023 16:32:20
QRCode
archive.org
thumbnail

Cyble Research & Intelligence Labs analyzes Cl0p ransomware which is rapidly gaining attention for its success in extorting businesses.

cyble EN 2023 Cl0p ransomware analysis
Western Digital discloses network breach, My Cloud service down https://www.bleepingcomputer.com/news/security/western-digital-discloses-network-breach-my-cloud-service-down/
03/04/2023 12:41:34
QRCode
archive.org
thumbnail

Western Digital announced today that its network has been breached and an unauthorized party gained access to multiple company systems.

The California-based computer drive maker and provider of data storage services says in a press release that the network security incident was identified last Sunday, on March 26.

An investigation is in early stages and the company is coordinating efforts with law enforcement authorities.

bleepingcomputer EN 2023 WD WesternDigital breached breach
New Money Message ransomware demands million dollar ransoms https://www.bleepingcomputer.com/news/security/new-money-message-ransomware-demands-million-dollar-ransoms/
03/04/2023 12:08:34
QRCode
archive.org
thumbnail

A new ransomware gang named 'Money Message' has appeared, targeting victims worldwide and demanding million-dollar ransoms not to leak data and release a decryptor.

bleepingcomputer EN 2023 Data-Theft Double-Extortion Encryption Money-Message Ransomware
Pinduoduo: One of China's most popular apps has the ability to spy on its users, say experts https://edition.cnn.com/2023/04/02/tech/china-pinduoduo-malware-cybersecurity-analysis-intl-hnk/index.html
03/04/2023 12:03:00
QRCode
archive.org
thumbnail

While many apps collect vast troves of user data, sometimes without explicit consent, experts say Chinese e-commerce giant Pinduoduo has taken violations of privacy and data security to the next level.

cnn EN 2023 Pinduoduo China US privacy spy
Analysis of In-the-wild Attack Samples Exploiting Outlook Privilege Escalation Vulnerability https://ti.qianxin.com/blog/articles/Analysis-of-In-the-wild-Attack-Samples-Exploiting-Outlook-Privilege-Escalation-Vulnerability-(CVE-2023-23397)-EN/
03/04/2023 07:19:20
QRCode
archive.org

QiAnXin Threat Intelligence Center's RedDrip team tracked the relevant events and discovered a batch of attack samples exploiting the CVE-2023-23397 vulnerability. After analyzing these samples and C2 servers, we believe that the exploitation of this vulnerability in the wild has been ongoing since March 2022. In the later stages of the attack, the attackers used Ubiquiti-EdgeRouter routers as C2 servers, and the victims of the attack activity were from multiple countries.

qianxin EN 2023 qianxin CVE-2023-23397 Ubiquiti-EdgeRouter analysis
Meet the FSB contractor: 0Day Technologies https://clement-briens.com/2023/04/01/meet-the-fsb-contractor-0day-technologies/
03/04/2023 07:18:41
QRCode
archive.org
thumbnail

An investigation into the FSB’s digital surveillance and disinformation contractor

clement-briens EN 2023 FSB Russia investigation disinformation contractor
Qakbot mechanizes distribution of malicious OneNote notebooks https://news.sophos.com/en-us/2023/02/06/qakbot-onenote-attacks/
03/04/2023 07:14:26
QRCode
archive.org
thumbnail

A large-scale "QakNote" attack deploys malicious .one files as a novel infection vector

sophos EN 2023 Qakbot QakNote malicious OneNote
Information on Attacks Involving 3CX Desktop App https://www.trendmicro.com/en_us/research/23/c/information-on-attacks-involving-3cx-desktop-app.html
02/04/2023 22:23:14
QRCode
archive.org
thumbnail

In this blog entry, we provide technical details and analysis on the 3CX attacks as they happen. We also discuss available solutions which security teams can maximize for early detection and mitigate the impact of 3CX attacks.

trendmicro EN 2023 3CX reports research
SEKOIA.IO analysis of the #VulkanFiles leak https://blog.sekoia.io/sekoia-io-analysis-of-the-vulkanfiles-leak/
01/04/2023 20:21:11
QRCode
archive.org
  • Exfiltrated Russian-written documents provide insights into cyber offensive tool projects contracted by Vulkan private firm for the Russian Ministry of Defense.

  • Scan-AS is a database used to map adversary networks in parallel or prior to cyber operations. Scan-AS is a subsystem of a wider management system used to conduct, manage and capitalize results of cyber operations.

  • Amezit is an information system aimed at managing the information flow on a limited geographical area. It allows communications interception, analysis and modification, and can create wide information campaigns through social media, email, altered websites or phone networks.

sekoia EN 2023 analysis vulkanfiles leaks Russia Scan-AS Amezit Vulkan
Creal: New Stealer Targeting Cryptocurrency Users Via Phishing Sites https://blog.cyble.com/2023/03/29/creal-new-stealer-targeting-cryptocurrency-users-via-phishing-sites/
01/04/2023 10:37:28
QRCode
archive.org
thumbnail

Open-Source Stealer Widely Abused by Threat Actors
The threat of InfoStealers is widespread and has been frequently employed by various Threat Actors (TA)s to launch attacks and make financial gains. Until now, the primary use of stealers by TAs has been to sell logs or to gain initial entry into a corporate network.

cyble 2023 EN report InfoStealer Creal
German Police Raid DDoS-Friendly Host ‘FlyHosting https://krebsonsecurity.com/2023/03/german-police-raid-ddos-friendly-host-flyhosting/
31/03/2023 21:20:55
QRCode
archive.org

Authorities in Germany this week seized Internet servers that powered FlyHosting, a dark web service that catered to cybercriminals operating DDoS-for-hire services. Fly Hosting first advertised on cybercrime forums in November 2022, saying it was a Germany-based hosting firm that…

krebsonsecurity EN 2023 Germany FlyHosting seized DDoS Police Raid
Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability
30/03/2023 22:38:23
QRCode
archive.org
thumbnail
  • Proofpoint has observed recent espionage-related activity by TA473, including yet to be reported instances of TA473 targeting US elected officials and staffers. TA473 is a newly minted Proofpoint threat actor that aligns with public reporting on Winter Vivern.
  • TA473 since at least February 2023 has continuously leveraged an unpatched Zimbra vulnerability in publicly facing webmail portals that allows them to gain access to the email mailboxes of government entities in Europe.
  • TA473 recons and reverse engineers bespoke JavaScript payloads designed for each government targets’ webmail portal.
  • Proofpoint concurs with Sentinel One analysis that TA473 targeting superficially aligns with the support of Russian and/or Belarussian geopolitical goals as they pertain to the Russia-Ukraine War.
proofpoint EN 2023 NATO proofpoint Zimbra CVE-2022-27926 WinterVivern Russia JavaScript payloads
Spyware vendors use 0-days and n-days against popular platforms https://blog.google/threat-analysis-group/spyware-vendors-use-0-days-and-n-days-against-popular-platforms/
30/03/2023 22:29:01
QRCode
archive.org
thumbnail

Google’s Threat Analysis Group (TAG) tracks actors involved in information operations (IO), government backed attacks and financially motivated abuse. For years, TAG has been tracking the activities of commercial spyware vendors to protect users. Today, we actively track more than 30 vendors with varying levels of sophistication and public exposure selling exploits or surveillance capabilities to government backed actors. These vendors are enabling the proliferation of dangerous hacking tools, arming governments that would not be able to develop these capabilities in-house. While use of surveillance technologies may be legal under national or international laws, they are often found to be used by governments to target dissidents, journalists, human rights workers and opposition party politicians.

GoogleTAG EN 2023 0-days Spyware Italy Malaysia Kazakhstan CVE-2022-42856 Webkit Samsung CVE-2022-4262 CVE-2023-0266
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics https://www.theguardian.com/technology/2023/mar/30/vulkan-files-leak-reveals-putins-global-and-domestic-cyberwarfare-tactics
30/03/2023 21:38:14
QRCode
archive.org
thumbnail

Vulkan engineers have worked for Russian military and intelligence agencies to support hacking operations, prepare for attacks on infrastructure and spread disinformation

theguardian EN 2023 Leak Vulkan Russian Russia military intelligence cyberwarfare VulkanLeaks
3CX VoIP Software Compromise & Supply Chain Threats https://www.huntress.com/blog/3cx-voip-software-compromise-supply-chain-threats
30/03/2023 15:18:36
QRCode
archive.org
thumbnail

The 3CX VoIP Desktop Application has been compromised to deliver malware via legitimate 3CX updates. Huntress has been investigating this incident and working to validate and assess the current supply chain threat to the security community.

huntress EN 2023 3CX VoIP Software Compromise supplychain analysis
3CX Security Alert for Electron Windows App https://www.3cx.com/blog/news/desktopapp-security-alert/
30/03/2023 11:17:11
QRCode
archive.org
thumbnail

A security issue arose on Update 7, version numbers 18.12.407 & 18.12.416 only for our Electron Windows App. Check this post for more info.

3CX EN official statement security
page 170 / 222
5046 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn