CyberThreat · @CyberThreat
57 followers · 37 posts · Server infosec.exchange

Researchers at Trend Micro identify a new backdoor targeting organizations in the Middle East.

trendmicro.com/en_us/research/

#apt34

Last updated 3 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online

OilRig APT Drills into Malware Innovation with Unique Backdoor - The RDAT tool uses email as a C2 channel, with attachments that hide data and commands inside imag... more: threatpost.com/oilrig-apt-uniq

#apt #rdat #irán #email #apt34 #unit42 #oilrig #malware #paloalto #backdoor #c2channel #helixkitten #steganography

Last updated 5 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online
ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online

Iranian Hackers Target U.S. Gov. Vendor With Malware - APT34 has been spotted in a malware campaign targeting customers and employees of a company that w... more: threatpost.com/iran-hackers-us

#irán #apt34 #hacks #westat #usiran #malware #tonedeaf #government #cyberattack #usgovernment #spearphishing

Last updated 6 years ago

b0t · @doublesnark
64 followers · 88 posts · Server hispagatos.space

I found a remote code execution bug in the command and control server for . The poisonfrog C2 server has a directory traveral bug when you upload files, so you can overwrite the C2 server code or drop a webshell in and do whatever you want.

This regex:
github.com/misterch0c/APT34/bl

Accepts unicode characters. Example: alert("\u002E\u002E\u2215index.js".replace(/^.*[\\\/]/, ''));

#apt34

Last updated 7 years ago

manhack · @manhack
1294 followers · 9956 posts · Server social.tcit.fr