TomU | I'm still here... til the end ๐๏ธ๐จ๐ญ
@c_apt_ure
#InfoSec professional, husband & father of two (in random order). #BlueTeam #DFIR #APT #CTI #RedTeaming #BSidesZH (RT/Likes โ endorsement) ๐โก๏ธ#MalwareChallenge
ID: 205435856
http://c-apt-ure.blogspot.com/ 20-10-2010 21:56:04
15,15K Tweet
8,8K Followers
5,5K Following
๐ข๐๐๐น๐ผ๐ผ๐ธ ๐ฆ๐๐ฎ๐ฟ๐๐๐ฝ ๐ฃ๐ฒ๐ฟ๐๐ถ๐๐๐ฒ๐ป๐ฐ๐ฒ ๐๐ถ๐ฎ ๐ฅ๐ฒ๐ด๐ถ๐๐๐ฟ๐ ๐ ๐ผ๐ฑ๐ถ๐ณ๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป (T1112) Recent research (e.g., Splunkโs NotDoor Insights) highlights that adversaries can achieve persistence in Microsoft Outlook by modifying the registry key
๐Blog with full details & more updates can be found here: reversinglabs.com/blog/another-sโฆ #npm #OSS #SoftwareSupplyChainSecurity #Shaihulud Tomislav Pericin
The SHA1-Hulud npm mess keeps growing, so we added additional detections for it today - new YARA rules by my colleague Marius Benthin in our public signature-base - cover bun_environment.js / setup_bun.js and the malicious preinstall script variants from the Wiz / Aikido
๐ฆ GitLab i made a script to check repos in bulk gist.github.com/alexgreenland/โฆ
Huntress researchers Anna Pham (RussianPanda ๐ผ ๐บ๐ฆ) & Ben Folland detail a multi-stage malware execution chain, originating from a ClickFix lure, that leads to the delivery of infostealing malware, including LummaC2 & Rhadamanthys. huntress.com/blog/clickfix-โฆ