RulesBenitez · @rulesbenitez
0 followers · 91 posts · Server ioc.exchange

ALERTA¡¡¡ La unidad de investigación de ha emitido una alerta por la presencia en México de , un troyano de acceso remoto (RAT), malware diseñado para permitir que un atacante controle de forma remota una computadora infectada. computerworldmexico.com.mx/emi

#Silikn #hiatusrat

Last updated 2 years ago

Opalsec :verified: · @Opalsec
175 followers · 85 posts · Server infosec.exchange

Happy Monday folks, I hope you had a restful weekend and managed to take a breather from all things cyber! Time to get back into it though, so let me give you hand - catch up on the week’s infosec news with the latest issue of our newsletter:

opalsec.substack.com/p/soc-gou

are back and are using…OneNote lures? ISO disk images? Malvertising? Nah – they’re sticking with tier tried and true TTPs – their Red Dawn maldoc template from last year; macro-enabled documents as lures, and null-byte padding to evade automated scanners.

We’ve highlighted a report on the Xenomorph Banking Trojan, which added support for targeting accounts of over 400 banks; automated bypassing of MFA-protected app logins, and a Session Token stealer module. With capabilities like these becoming the norm, is it time to take a closer look at the threat Mobile Malware could pose to enterprise networks?

North Korean hackers have demonstrated yet again that they’re tracking and integrating the latest techniques, and investing in malware development. A recent campaign saw eight new pieces of malware distributed throughout the kill chain, leveraging to deliver payloads and an in-memory dropper to abuse the technique and evade EDR solutions.

A joint investigation by and has unearthed a two-year campaign by Chinese actors, enabled through exploitation of unpatched SMA100 appliances and delivery of tailored payloads. A critical vulnerability reported by this week helps reinforce the point that perimeter devices need to be patched with urgency, as it’s a well-documented target for Chinese-affiliated actors.

is a novel malware targeting routers, sniffing network traffic and proxying C2 traffic to forward-deployed implants. TTPs employed in recent and campaigns are also worth taking note of, as is , a new malware family targeting specific web server applications to brute force logins and deploy an IRC bot for C2.

Those in Vulnerability Management should take particular note of the vulnerability, which appears trivial to exploit and actually delivers plaintext credentials to the attacker. CISA have also taken note of nearly 40k exploit attempts of a 2 year old code-exec-as-root vulnerability in the Cloud Foundation product in the last two months, so make sure you’re patched against it.

members have some excellent reading to look forward to, looking at HTTP request smuggling to harvest AD credentials and persisting with a MitM Exchange server, as well as a detailed post that examines ’s reflective loading capability;

The has some great tradecraft tips from @inversecos on DFIR, as well as tools to help scan websites for malicious objects, and to combat the new and well-established Raccoon Stealer.

Catch all this and much more in this week's newsletter:

opalsec.substack.com/p/soc-gou

#emotet #android #microsoft #intune #byovd #mandiant #sonicwall #fortinet #hiatusrat #draytek #batloader #qakbot #gobruteforcer #veeam #vmware #redteam #cobaltstrike #blueteam #azure #stealc #infostealer #infosec #cyber #news #cybernews #infosecnews #informationsecurity #cybersecurity #newsletter #hacking #security #technology #hacker #vulnerability #vulnerabilities #malware #ransomware #dfir #soc #threatintel #threatintelligence #darkweb #mdm #dprk #fortios #FortiProxy

Last updated 2 years ago

Josh Lemon · @joshlemon
134 followers · 39 posts · Server infosec.exchange

Too often I think organizations focus on only protecting compute endpoints. This is a good reminder do still like to network devices.

Nice write up on compromising routers.


blog.lumen.com/new-hiatusrat-r

#apt #threatactors #compromise #hiatusrat #malware #dfir #networkforensics

Last updated 2 years ago

IT News · @itnewsbot
2975 followers · 251891 posts · Server schleuss.online

Threat actors are using advanced malware to backdoor business-grade routers - Enlarge (credit: Getty Images)

Researchers have uncovered adva... - arstechnica.com/?p=1922180

#email #biz #hiatusrat #remoteaccesstrojan

Last updated 2 years ago

Tech news from Canada · @TechNews
326 followers · 8819 posts · Server mastodon.roitsystems.ca

Ars Technica: Threat actors are using advanced malware to backdoor business-grade routers arstechnica.com/?p=1922180 &IT

#Tech #arstechnica #it #technology #remoteaccesstrojan #hiatusrat #biz #email

Last updated 2 years ago

crudd · @crudd
83 followers · 145 posts · Server hackers.town

New research on a campaign we are calling that we suspect has been active for years, as we recently discovered variant 1.5 of the .

This campaign consists of two modules. The first is a variant of designed to passively collect email traffic as it transits through the routers. The second module , turns the router into a covert relay to commands and exfil.

blog.lumen.com/new-hiatusrat-r

#proxy #hiatusrat #tcpdump #malware #hiatus #router

Last updated 2 years ago

Danny Adam · @dadamitis
7 followers · 3 posts · Server infosec.exchange

Today we’re releasing research on brand new activity cluster we’re calling . This actor has an affinity for target routers, to gather pcap and use as covert infrastructure.

#hiatusrat

Last updated 2 years ago