๐Ÿ“– As part of the #REWIND project, Alba Comino published โ€˜Intertwining Narrative and Technology: Reinterpreting European Cultural Heritage through the Voices of Latin American Women Writersโ€™ in the International Journal of Humanities and Arts Computing, where she describes the #methodology used in the project.

๐Ÿ”“ In #OpenAccess: https://www.euppublishing.com/doi/full/10.3366/ijhac.2024.0333

@histodons
@litstudies

#Histodons #DigitalHumanities #LitStudies #CulturalHeritage #Ontology #DeepData #SentimentAnalysis #WomenWriters

China-linked actor's malware DeepData exploits FortiClient VPN zero-day - Security Affairs

Chinese threat actors use custom post-exploitation toolkit 'DeepData' to exploit FortiClient VPN zero-day and steal credentials.

Security Affairs
Mal on Instagram: "APT41's DeepData: A New Era of Surveillance โš ๏ธ The Threat: โš ๏ธ APT41, a Chinese-linked hacking group, is using a powerful new surveillance toolkit called DeepData Framework to target organizations in South Asia. ๐Ÿ—บ๏ธ ๐Ÿ—บ๏ธ APT41's operations span globally, targeting a wide range of industries and individuals. DeepData's Capabilities: ๐Ÿ’ป๐Ÿ”’ DeepData is a highly modular toolkit with 12 plug-ins designed for specific malicious functions. ๐Ÿ“ฑ๐Ÿ”’ Steals communications from popular messaging apps like WhatsApp, Signal, Telegram, and WeChat. ๐Ÿ“๐Ÿ”’ Exfiltrates sensitive system information, Wi-Fi network data, and installed applications. ๐ŸŒ๐Ÿ”’ Steals browsing history, cookies, passwords from browsers, cloud services, and user emails/contacts. ๐ŸŽ™๏ธ๐Ÿ”’ Steals audio files from compromised systems. Modus Operandi: ๐Ÿ”ง Attackers manually control DeepData after gaining access to a target. ๐Ÿค๐ŸŒŽ APT41's operations are highly sophisticated and strategically planned for long-term intelligence gathering. Impact: ๐ŸŽฏ Targets include politicians, journalists, activists, and organizations across various sectors, including healthcare, media, government, and technology. ๐Ÿ“ขโŒ APT41's activities pose a significant threat to national security, intellectual property, and individual privacy. Recommended Mitigation: ๐Ÿ›ก๏ธ๐Ÿ”’ Block APT41's known command and control (C2) infrastructure. ๐ŸŒ๐Ÿ” Monitor networks and devices for suspicious audio recording activity. ๐Ÿ”’๐Ÿ”‘ Use secure communication channels for data transmission. ๐Ÿšจ Deploy detection rules for DeepData components. Key Takeaway: โš ๏ธ APT41's continuous evolution and sophisticated toolkit highlight the growing threat of cyber espionage. ๐Ÿค๐ŸŒŽ Organizations need to stay vigilant and implement comprehensive security measures to combat these advanced threats. #cybersecurity #APT41 #DeepData #surveillance #cyberespionage #securityawareness #datasecurity #cyberthreat #hackers #informationsecurity #technology #digitalsecurity #protection #safety #onlineprivacy"

0 likes, 0 comments - the_mal_where on November 18, 2024: "APT41's DeepData: A New Era of Surveillance โš ๏ธ The Threat: โš ๏ธ APT41, a Chinese-linked hacking group, is using a powerful new surveillance toolkit called DeepData Framework to target organizations in South Asia. ๐Ÿ—บ๏ธ ๐Ÿ—บ๏ธ APT41's operations span globally, targeting a wide range of industries and individuals. DeepData's Capabilities: ๐Ÿ’ป๐Ÿ”’ DeepData is a highly modular toolkit with 12 plug-ins designed for specific malicious functions. ๐Ÿ“ฑ๐Ÿ”’ Steals communications from popular messaging apps like WhatsApp, Signal, Telegram, and WeChat. ๐Ÿ“๐Ÿ”’ Exfiltrates sensitive system information, Wi-Fi network data, and installed applications. ๐ŸŒ๐Ÿ”’ Steals browsing history, cookies, passwords from browsers, cloud services, and user emails/contacts. ๐ŸŽ™๏ธ๐Ÿ”’ Steals audio files from compromised systems. Modus Operandi: ๐Ÿ”ง Attackers manually control DeepData after gaining access to a target. ๐Ÿค๐ŸŒŽ APT41's operations are highly sophisticated and strategically planned for long-term intelligence gathering. Impact: ๐ŸŽฏ Targets include politicians, journalists, activists, and organizations across various sectors, including healthcare, media, government, and technology. ๐Ÿ“ขโŒ APT41's activities pose a significant threat to national security, intellectual property, and individual privacy. Recommended Mitigation: ๐Ÿ›ก๏ธ๐Ÿ”’ Block APT41's known command and control (C2) infrastructure. ๐ŸŒ๐Ÿ” Monitor networks and devices for suspicious audio recording activity. ๐Ÿ”’๐Ÿ”‘ Use secure communication channels for data transmission. ๐Ÿšจ Deploy detection rules for DeepData components. Key Takeaway: โš ๏ธ APT41's continuous evolution and sophisticated toolkit highlight the growing threat of cyber espionage. ๐Ÿค๐ŸŒŽ Organizations need to stay vigilant and implement comprehensive security measures to combat these advanced threats. #cybersecurity #APT41 #DeepData #surveillance #cyberespionage #securityawareness #datasecurity #cyberthreat #hackers #informationsecurity #technology #digitalsecurity #protection #safety #onlineprivacy".

Instagram

"#DEEPDATA is a modular post-exploitation tool for the Windows operating system that is used to gather a wide range of information from target devices. Analysis of the sample revealed a plugin that was designed to extract credentials from #FortiClientVPN client process memory."

#fortinet

https://www.volexity.com/blog/2024/11/15/brazenbamboo-weaponizes-forticlient-vulnerability-to-steal-vpn-credentials-via-deepdata/

BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA

In July 2024, Volexity identified exploitation of a zero-day credential disclosure vulnerability in Fortinetโ€™s Windows VPN client that allowed credentials to be stolen from the memory of the clientโ€™s process. This vulnerability was discovered while analyzing a recent sample of the DEEPDATA malware family. DEEPDATA is a modular post-exploitation tool for the Windows operating system that is used to gather a wide range of information from target devices. Analysis of the sample revealed a plugin that was designed to extract credentials from FortiClient VPN client process memory. On July 18, 2024, Volexity notified Fortinet about this vulnerability. At the time of writing, the issue remains unresolved.

Volexity
Chinese hackergroep apt41 breidt surveillancecapaciteiten uit met nieuw malware toolkit https://www.trendingtech.news/trending-news/2024/11/47727/chinese-hackergroep-apt41-breidt-surveillancecapaciteiten-uit-met-nieuw-malware-toolkit #APT41 #DeepData Framework #cyber-espionage #Zuid-Aziรซ #malware toolkit #Trending #News #Nieuws