Anonymous :anarchism: 🏴 · @YourAnonRiots
6071 followers · 37989 posts · Server mstdn.social

Malicious PDFs + Word files = Trouble!!

Hackers are now using a sneaky " in PDF" technique to hide malicious Word files within PDFs.

Find out how this dangerous attack works. thehackernews.com/2023/09/bewa

#Malware #CyberSecurity #maldoc

Last updated 1 year ago

ricardo :mastodon: · @governa
1395 followers · 9094 posts · Server fosstodon.org

Beware of in : A New Polyglot Attack Allowing Attackers to Evade Antivirus ⚠️

thehackernews.com/2023/09/bewa

#maldoc #pdf

Last updated 1 year ago

AKG_de_IT · @MK
120 followers · 1773 posts · Server troet.cafe

Polyglots sind Dateien, die zwei unterschiedliche Dateiformate enthalten, die je nach der Anwendung, die sie öffnet, als mehr als ein Dateityp interpretiert und ausgeführt werden können.

Angreifer machen sich das jetzt mit zunutze. t.co/ZBUxxp6Tbz

#maldoc

Last updated 1 year ago

Salvatore Lombardo · @Slvlombardo
5 followers · 313 posts · Server mstdn.social
Marcel SIneM(S)US · @simsus
217 followers · 5393 posts · Server social.tchncs.de

#maldoc #pdf #malware

Last updated 1 year ago

ottoto · @ottoto2017
129 followers · 2007 posts · Server prattohome.com

in - 検知回避を狙って悪性なWordファイルをPDFファイルへ埋め込む手法」: JPCERTCC

「JPCERT/CCは、7月に発生した攻撃に、検知回避を狙って悪性なWordファイルをPDFファイルへ埋め込む新しいテクニック(以降本記事ではMalDoc in PDFとする)が使用されたことを確認しました。」

blogs.jpcert.or.jp/ja/2023/08/

#maldoc #pdf #prattohome #jpcertcc

Last updated 1 year ago

Josh Lemon · @joshlemon
133 followers · 37 posts · Server infosec.exchange

Struggling with the wave of OneNote documents? Did you know you can block OneNote from launching an embedded file, which prevents the current wave of phishing docs.

bleepingcomputer.com/news/secu

#phishing #dfir #csirt #maldoc

Last updated 1 year ago

Sophos X-Ops · @SophosXOps
1349 followers · 131 posts · Server infosec.exchange

Our coverage of this campaign includes a breakdown of the attack chain, IOCs, and some other curious details. People unfamiliar with OneNote as a weaponized document format should get used to this; are probably here to stay. 6/6

news.sophos.com/en-us/2023/02/

#onenote #maldoc #malware #qaknote #maldocs

Last updated 2 years ago

Sophos X-Ops · @SophosXOps
1349 followers · 131 posts · Server infosec.exchange

All the documents in this case contain a static image that prompts the user to click a button in response to text that says "This document contains attachments from the cloud, to receive them, double click 'open.'" The notebook runs a script like this one. 5/6

#onenote #maldoc

Last updated 2 years ago

Sophos X-Ops · @SophosXOps
1349 followers · 131 posts · Server infosec.exchange

's threat actors typically use email messages as their initial attack vector, "injecting" a malicious email into the middle of existing conversational threads, replying to all parties with either a attachment or a link to a file. 3/6

#qakbot #maldoc #malware

Last updated 2 years ago

@SophosXOps All the documents in this case contain a static image that prompts the user to click a button in response to text that says "This document contains attachments from the cloud, to receive them, double click 'open.'"

When you open the document, it spawns an embedded HTML Application (eg., an .hta file) with an embedded script. The script retrieves a Qakbot DLL payload from a website and executes the initial infection command. 5/6

#onenote #maldoc

Last updated 2 years ago

@SophosXOps 's threat actors typically use email messages as their initial attack vector, "injecting" a malicious email into the middle of existing conversational threads, replying to all parties with either a attachment or a link to a file.

They're the worst kind of "reply guy" 3/6

#qakbot #maldoc #malware

Last updated 2 years ago

lazarusholic · @lazarusholic
0 followers · 3 posts · Server infosec.exchange

"정상 문서로 위장한 악성코드(kimsuky)" published by Ahnlab. , , , , asec.ahnlab.com/ko/47147/

#kimsuky #maldoc #cti #osint #lazarus

Last updated 2 years ago

Paul Rascagneres · @r00tbsd
1199 followers · 249 posts · Server infosec.exchange

I wrote a small Python library to extract metadata and embedded files in a documents (.one). The OneNote file format is not really documented but it seems to work on the files I tested.

It is published on the @volexity GitHub repository: github.com/volexity/threat-int
It can be used in or included easily on any .

#onenote #standalone #pipeline #cti #threathunting #maldoc #maliciousdocuments

Last updated 2 years ago

Dmitry Melikov · @DmitryMelikov
2 followers · 3 posts · Server infosec.exchange

A malicious doc on the name of Colombian GOV spread as a fake lawsuit and enforced collection.
@dimitribest

4a69b0a3796dd688d57e11658ac1058c <doc
9792c84f24e1492cc4d179523fdfcb9d < vbs
1e989e84f5967d84f40acabaad3395de < Njrat

IoCs:
hxxps://cdn.discordapp.com/attachments/1047544891632259145/1047971566543179936/2dode8002[.]vbs

hxxps://cdn.discordapp.com/attachments/1047543449777344516/1047971253056708729/2dode8002[.]txt

135d1da64932e6f858f7136f8c2b339f

#cti #maldoc

Last updated 2 years ago

Dmitry Melikov · @DmitryMelikov
7 followers · 4 posts · Server infosec.exchange

A malicious doc on the name of Colombian GOV spread as a fake lawsuit and enforced collection.
@dimitribest

4a69b0a3796dd688d57e11658ac1058c <doc
9792c84f24e1492cc4d179523fdfcb9d < vbs
1e989e84f5967d84f40acabaad3395de < Njrat

IoCs:
hxxps://cdn.discordapp.com/attachments/1047544891632259145/1047971566543179936/2dode8002[.]vbs

hxxps://cdn.discordapp.com/attachments/1047543449777344516/1047971253056708729/2dode8002[.]txt

135d1da64932e6f858f7136f8c2b339f

#cti #maldoc

Last updated 2 years ago

Paul Rascagneres · @r00tbsd
940 followers · 150 posts · Server infosec.exchange

We published a blog about . They are still abusing fake cryptocurrency applications but we also identified with (an inception of macros). The purpose is to deploy variants.

From point of view, they implemented an uncommon side-loading technique. The malicious DLL is not directly loaded by the IAT of a legit binary, but via a legitimate DLL from the System32 repository. More details on the @volexity blog : volexity.com/blog/2022/12/01/b

#post #lazarus #maldoc #macro #applejeus #reverse #cti #threatintel #threatintelligence

Last updated 2 years ago

ITSEC News · @itsecbot
856 followers · 32559 posts · Server schleuss.online

Emotet coming in hot - Emotet is a ubiquitous and well-known banking trojan that has evolved over the yea... blog.talosintelligence.com/emo

#maldoc #botnet #emotet #securex #topstory #crimeware #threatspotlight

Last updated 2 years ago

ITSEC News · @itsecbot
856 followers · 32559 posts · Server schleuss.online

New campaign uses government, union-themed lures to deliver Cobalt Strike beacons - By Chetan Raghuprasad and Vanja Svajcer. Cisco Talos discovered a malicious campai... blog.talosintelligence.com/202

#maldoc #threats #securex #cobaltstrike #informationstealers

Last updated 2 years ago

ITSEC News · @itsecbot
856 followers · 32559 posts · Server schleuss.online

Transparent Tribe begins targeting education sector in latest campaign - Cisco Talos has been tracking a new malicious campaign operated by the Transparent Tribe ... blog.talosintelligence.com/202

#apt #maldoc #threats #securex #malware

Last updated 2 years ago