Mr.Trunk · @mrtrunk
12 followers · 19428 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
12 followers · 19324 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
12 followers · 19220 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
5 followers · 9291 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
5 followers · 9190 posts · Server dromedary.seedoubleyou.me
Opalsec :verified: · @Opalsec
53 followers · 26 posts · Server infosec.exchange

Catch up on last week's infosec news with our latest newsletter: opalsec.substack.com/p/soc-gou

continues to improve its evasion mechanisms, extracting more data from victims in the Financial sector.

developers look to be dabbling in creating a Mac variant - but aren't quite there yet.

is being used increasingly over the past few months by heavy-hitting first stage malware such as Qakbot, IcedID and BumbleBee - make sure you understand how it works and how to spot it.

#RaspberryRobin #dridex #htmlsmuggling #infosec #cyberattack #hacked #cyber #cybernews #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #vulnerabilities

Last updated 2 years ago

ITSEC News · @itsecbot
1006 followers · 32860 posts · Server schleuss.online

HTML smugglers turn to SVG images - HTML smuggling is a technique attackers use to hide an encoded malicious script within an... blog.talosintelligence.com/htm

#qakbot #htmlsmuggling

Last updated 2 years ago

Brad · @malware_traffic
1633 followers · 55 posts · Server infosec.exchange

Found more files today (Tuesday, 2022-12-13) for leading to .

Same IP address for Cobalt Strike C2 server.

Same persistence method

But this time it's HTML file --> .js --> HTTP traffic for .ps1 --> Cobalt Strike C2.

Instead of the .ps1 file in a disk image, it's hosted on a web server retrieved (in this case) by the .js file smuggled through the HTML attachment.

IOCs from today available at: bit.ly/3Wh7PC8

#htmlsmuggling #cobaltstrike

Last updated 2 years ago

Brad · @malware_traffic
1410 followers · 43 posts · Server infosec.exchange

From Twitter: twitter.com/malware_traffic/st

2022-12-09 (Friday) - that led to () with a distribution/botnet tag of "azd"

Malware samples, , and IOCs available at: malware-traffic-analysis.net/2

I assume the HTML file I found on VT was sent through email, even though I have no proof. But where else would it have come from?

Distribution chain: HTML file (possibly from email) --> password-protected zip archive --> extracted ISO image with .img file extension.

Maybe distributors for Qakbot have stopped using .vhd images like they've been doing since December 1st.

#htmlsmuggling #qakbot #qbot #pcap

Last updated 2 years ago

Brad · @malware_traffic
1299 followers · 29 posts · Server infosec.exchange

2022-12-01 (Thursday) - obama224 distribution ()

Infection chain:

email --> HTML attachment --> password-protected zip archive --> extracted .vhd image --> Windows shortcut in .vhd image runs hidden Qakbot DLL in the same .vhd image

Three things about this Qakbot campaign using .vhd files:

1) You need administrative privileges to mount a .vhd file. Normal users in an AD environment cannot mount these.

2) Even when I used a domain admin password, those .vhd images wouldn't mount in an AD environment.

3) The .vhd images mounted just fine on a stand-alone Win 10 host.

Does the threat actor behind this wave of Qakbot want to get into a high-value AD environment? If so, this method won't be very effective.

A victim would have to infect a stand-alone host, then someone would have to connect that to an AD environment.

Maybe someone's personal laptop? I don't know how this would reasonably work.

#qakbot #bot #htmlsmuggling

Last updated 2 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online