Mr.Trunk · @mrtrunk
5 followers · 8781 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
5 followers · 8708 posts · Server dromedary.seedoubleyou.me
Mr.Trunk · @mrtrunk
5 followers · 8609 posts · Server dromedary.seedoubleyou.me
abuse.ch :verified: · @abuse_ch
1185 followers · 46 posts · Server ioc.exchange

XWorm spreading through WebDav server hosted at TheDriveHQ 🔥

LNK -> PowerShell -> WebDav -> ZIP -> bat

Malicious LNK:
📄 bazaar.abuse.ch/sample/a19a8e6

Payload:
📄 bazaar.abuse.ch/sample/9587ef7

C2:
📞 threatfox.abuse.ch/ioc/1139291

#xworm #botnet

Last updated 1 year ago

Scripter :verified_flashing: · @scripter
251 followers · 1252 posts · Server social.tchncs.de
· @twitter
1 followers · 46359 posts · Server mstdn.skullb0x.io

Referenced link: 0day.today/exploit/description
Originally posted by 0day Exploit Database 🌴 / @inj3ct0r@twitter.com: twitter.com/inj3ct0r/status/16

2.1 - Null Pointer Derefernce 0day.today/exploit/description

#0day #xworm #Trojan #dos #Vulnerability

Last updated 1 year ago

Rakesh Krishnan · @rakeshkrish12
0 followers · 2 posts · Server infosec.exchange

XWorm V3.1
-> doc.exe [ef549ca97123941f2f3cebc6618f4c22] (loader)
loads dll from
->http://babfahim[.]co[.]ke/panel/uploads/Bmihtpx.dll
exflitrate data via telegram

#xworm #rat #ioc

Last updated 2 years ago

Opalsec :verified: · @Opalsec
75 followers · 42 posts · Server infosec.exchange

This week's edition of SOC Goulash, our Weekend Wrap-Up of infosec news, is live and hot off the press!

opalsec.substack.com/p/soc-gou

Building on last week's flagging of the increase in abuse of , researchers have observed it being abused to deliver and payloads, as well as to harvest master passwords for Password Manager solutions like and .

ransomware have had their infrastructure seized in a multi-national law enforcement operation. The authorities lurked in their infrastructure for six months, gathering communications & information on their members and stealing 1,300 decryption keys that enabled them to avert ~$130 million in potential ransom payments.

North Korea's crypto-hunting actors have been agile in adopting emerging tradecraft and developing novel payloads. With $1 billion worth of funds brought into the hermit kingdom in 2022, orgs in the and space will need to be on guard coming into 2023.

malware continues to be developed, with new variants spotted in the wild capable of spreading via USB, upgrading old installations, and pilfering documents from hosed computers.

in the Realtek SDK have been exploited nearly 130 million times between August and December last year alone by botnets seeking to grow their numbers.

Security researchers Horizon3 intend to release a PoC for CVSS 9.8 RCE vulnerabilities in VMWare's vRealize Log Insight product this week - make sure you're patched!

For our paid subscribers, we've got some additional articles on:
1. The adoption of OneNote for payload delivery, and tips for analysis;
2. An overview of CVE-2022-34689, a critical Windows vulnerability that could be abused to intercept & decrypt encrypted communications or spoof code-signing of malicious executables;
3. A vulnerability/not-vulnerability in , with no patch and an unknown scope of impact, allowing attackers to dump plaintext credentials from the Password Manager.

As always, there's a tonne of additional goodies to be found in the newsletter that I couldn't cover here, so check it out here: opalsec.substack.com/p/soc-gou

#malvertising #AsyncRAT #xworm #bitwarden #1password #hive #cryptocurrency #defi #plugx #vulnerabilities #exploit #keepass #infosec #cyberattack #hacked #cyber #news #cybernews #infosecnews #informationsecurity #cybersecurity #hacking #security #technology #hacker #vulnerability #malware #ransomware #dfir #redteam #soc #threatintel #threatintelligence #passwordmanager #vmware #poc

Last updated 2 years ago