Tag: IoCs

  • Cloud Blog: Backscatter: Automated Configuration Extraction

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/backscatter-automated-configuration-extraction/ Source: Cloud Blog Title: Backscatter: Automated Configuration Extraction Feedly Summary: Written by: Josh Triplett Executive Summary Backscatter is a tool developed by the Mandiant FLARE team that aims to automatically extract malware configurations. It relies on static signatures and emulation to extract this information without dynamic execution, bypassing anti-analysis logic present in…

  • Threat Research Archives – Unit 42: Fighting Ursa Luring Targets With Car for Sale

    Source URL: https://unit42.paloaltonetworks.com/fighting-ursa-car-for-sale-phishing-lure/ Source: Threat Research Archives – Unit 42 Title: Fighting Ursa Luring Targets With Car for Sale Feedly Summary: AI Summary and Description: Yes Summary: The text presents a detailed account of a sophisticated cybersecurity threat from the Russian group Fighting Ursa, which targeted diplomats using a phishing campaign disguised as a car…

  • Threat Research Archives – Unit 42: Accelerating Analysis When It Matters

    Source URL: https://unit42.paloaltonetworks.com/accelerating-malware-analysis/ Source: Threat Research Archives – Unit 42 Title: Accelerating Analysis When It Matters Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the efficient methods for malware analysis implemented by security professionals, particularly through the use of automated tools like Advanced WildFire’s Malware Configuration Extraction (MCE). This process significantly accelerates…

  • Microsoft Security Blog: Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/12/11/frequent-freeloader-part-ii-russian-actor-secret-blizzard-using-tools-of-other-groups-to-attack-ukraine/ Source: Microsoft Security Blog Title: Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine Feedly Summary: Since January 2024, Microsoft has observed Secret Blizzard using the tools or infrastructure of other threat groups to attack targets in Ukraine and download its custom backdoors Tavdig and…

  • Hacker News: Researchers discover first UEFI bootkit malware for Linux

    Source URL: https://www.bleepingcomputer.com/news/security/researchers-discover-bootkitty-first-uefi-bootkit-malware-for-linux/ Source: Hacker News Title: Researchers discover first UEFI bootkit malware for Linux Feedly Summary: Comments AI Summary and Description: Yes Summary: The discovery of ‘Bootkitty,’ the first UEFI bootkit targeting Linux systems, signifies a concerning evolution in malware threats that traditionally focused on Windows. The research uncovers how Bootkitty operates beneath the…

  • Hacker News: RomCom exploits Firefox and Windows zero days in the wild

    Source URL: https://www.welivesecurity.com/en/eset-research/romcom-exploits-firefox-and-windows-zero-days-in-the-wild/ Source: Hacker News Title: RomCom exploits Firefox and Windows zero days in the wild Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides a detailed analysis of critical zero-day vulnerabilities discovered in Mozilla products, specifically Firefox, Thunderbird, and the Tor Browser, which are being exploited by a Russia-aligned cyber…

  • Krebs on Security: Fintech Giant Finastra Investigating Data Breach

    Source URL: https://krebsonsecurity.com/2024/11/fintech-giant-finastra-investigating-data-breach/ Source: Krebs on Security Title: Fintech Giant Finastra Investigating Data Breach Feedly Summary: The financial technology firm Finastra is investigating the alleged large-scale theft of information from its internal file transfer platform, KrebsOnSecurity has learned. Finastra, which provides software and services to 45 of the world’s top 50 banks, notified customers of…

  • The Register: China-linked group abuses Fortinet 0-day with post-exploit VPN-credential stealer

    Source URL: https://www.theregister.com/2024/11/19/china_brazenbamboo_fortinet_0day/ Source: The Register Title: China-linked group abuses Fortinet 0-day with post-exploit VPN-credential stealer Feedly Summary: No word on when or if the issue will be fixed Chinese government-linked snoops are exploiting a zero-day bug in Fortinet’s Windows VPN client to steal credentials and other information, according to memory forensics outfit Volexity.… AI…

  • Cloud Blog: Empowering Gemini for Malware Analysis with Code Interpreter and Google Threat Intelligence

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/gemini-malware-analysis-code-interpreter-threat-intelligence/ Source: Cloud Blog Title: Empowering Gemini for Malware Analysis with Code Interpreter and Google Threat Intelligence Feedly Summary: One of Google Cloud’s major missions is to arm security professionals with modern tools to help them defend against the latest threats. Part of that mission involves moving closer to a more autonomous, adaptive…