Tag: malware delivery

  • Cloud Blog: Mark Your Calendar: APT41 Innovative Tactics

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics/ Source: Cloud Blog Title: Mark Your Calendar: APT41 Innovative Tactics Feedly Summary: Written by: Patrick Whitsell Google Threat Intelligence Group’s (GTIG) mission is to protect Google’s billions of users and Google’s multitude of products and services. In late October 2024, GTIG discovered an exploited government website hosting malware being used to target…

  • Wired: 1 Million Third-Party Android Devices Have a Secret Backdoor for Scammers

    Source URL: https://www.wired.com/story/1-million-third-party-android-devices-badbox-2/ Source: Wired Title: 1 Million Third-Party Android Devices Have a Secret Backdoor for Scammers Feedly Summary: New research shows at least a million inexpensive Android devices—from TV streaming boxes to car infotainment systems—are compromised to allow bad actors to commit ad fraud and other cybercrime. AI Summary and Description: Yes Summary: The…

  • Unit 42: Uncovering .NET Malware Obfuscated by Encryption and Virtualization

    Source URL: https://unit42.paloaltonetworks.com/?p=138493 Source: Unit 42 Title: Uncovering .NET Malware Obfuscated by Encryption and Virtualization Feedly Summary: Malware authors use AES encryption and code virtualization to evade sandbox static analysis. We explore how this facilitates spread of Agent Tesla, XWorm and more. The post Uncovering .NET Malware Obfuscated by Encryption and Virtualization appeared first on…

  • Hacker News: The GitVenom campaign: cryptocurrency theft using GitHub

    Source URL: https://securelist.com/gitvenom-campaign/115694/ Source: Hacker News Title: The GitVenom campaign: cryptocurrency theft using GitHub Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the GitVenom campaign, which involves threat actors creating fake open-source projects on GitHub to distribute malicious code. These projects appear legitimate and lure unsuspecting users, emphasizing the need for…

  • Hacker News: Delivering Malware Through Abandoned Amazon S3 Buckets

    Source URL: https://www.schneier.com/blog/archives/2025/02/delivering-malware-through-abandoned-amazon-s3-buckets.html Source: Hacker News Title: Delivering Malware Through Abandoned Amazon S3 Buckets Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a concerning vulnerability in software supply chain security, specifically targeting abandoned Amazon S3 buckets that could serve as a platform for malware delivery. The research highlights the potential risks…

  • Unit 42: CL-STA-0048: An Espionage Operation Against High-Value Targets in South Asia

    Source URL: https://unit42.paloaltonetworks.com/?p=138128 Source: Unit 42 Title: CL-STA-0048: An Espionage Operation Against High-Value Targets in South Asia Feedly Summary: A Chinese-linked espionage campaign targeted entities in South Asia using rare techniques like DNS exfiltration, with the aim to steal sensitive data. The post CL-STA-0048: An Espionage Operation Against High-Value Targets in South Asia appeared first…

  • The Register: Security pros baited with fake Windows LDAP exploit traps

    Source URL: https://www.theregister.com/2025/01/09/security_pros_baited_by_fake/ Source: The Register Title: Security pros baited with fake Windows LDAP exploit traps Feedly Summary: Tricky attackers trying yet again to deceive the good guys on home territory Security researchers are once again being lured into traps by attackers, this time with fake exploits of serious Microsoft security flaws.… AI Summary and…