Banshee Stealer Quellcode geleakt: macOS-Malware unschädlich gemacht

Cyberkriminelle geben auf: Die Malware Banshee Stealer für MacOS wurde nach Veröffentlichung des Quellcodes aufgegeben.

TARNKAPPE.info
Patch Tuesday, October 2024 Edition – Krebs on Security

Patch Tuesday, October 2024 Edition - Microsoft today released security updates to fix at least 117 security holes in Wi... https://krebsonsecurity.com/2024/10/patch-tuesday-october-2024-edition/ #opensshforwindows;powerbi;windowshyper-v;windowsmobilebroadband #adobesubstance3dpainter #elasticsecuritylabs #substance3dstager #nikolascemerikic #adobeframemaker #latestwarnings #cve-2024-43572 #cve-2024-43573 #securitytools #immersivelabs #grimresource #satnamnarang #visualstudio #timetopatch
Patch Tuesday, October 2024 Edition – Krebs on Security

GhostEngine: Krypto-Mining-Angriff überlistet Sicherheitslösungen

GhostEngine ist eine raffinierte Krypto-Mining-Kampagne, die auf Computernetzwerke abzielt und Sicherheitssoftware austricksen kann.

Tarnkappe.info

"👻 GHOSTPULSE: A New Evasion Technique in the Wild 🌐"

Elastic Security Labs has unveiled details of a new campaign named GHOSTPULSE. This campaign employs defense evasion capabilities to compromise victims using malicious MSIX executables. The stealthy loader, GHOSTPULSE, decrypts and injects its payload to dodge detection. MSIX, a Windows app package format, is being exploited by adversaries, especially those with above-average resources, as it requires access to code signing certificates. The campaign tricks users into downloading malicious MSIX packages, often masquerading as popular software installers like Chrome, Brave, and WebEx. Once executed, a covert PowerShell script activates GHOSTPULSE on the victim's system. 🚫🔍

The GHOSTPULSE loader operates in multiple stages, with the final payload typically being an information stealer. Notably, payloads like SectopRAT, Rhadamanthys, and Lumma have been observed. The malware also employs techniques like "module stomping" and "Process Doppelgänging" for its operations. 🕵️‍♂️💼

For those in the research community, Elastic Security has provided a configuration extractor to aid in further investigations of this campaign. 🛠️🔬

Source: Elastic Security Labs

Tags: #GHOSTPULSE #CyberSecurity #EvasionTechniques #MSIX #MalwareAnalysis #ElasticSecurityLabs

Authors: Salim Bitam, Joe Desimone. Twitter Reference

Globally distributed stealers — Elastic Security Labs

This article describes our analysis of the top malware stealer families, unveiling their operation methodologies, recent updates, and configurations. By understanding the modus operandi of each family, we better comprehend the magnitude of their impact and can fortify our defences accordingly.

Malware analysis of malware family SOMNIRECORD, a backdoor malware that conceals identity masquerading as DNS using C2 (Command and Control) methods.

https://www.elastic.co/security-labs/not-sleeping-anymore-somnirecords-wakeup-call

#ElasticSecurityLabs #malware
#malwareanalysis #malwarebackdoor #dnshack

Not sleeping anymore: SOMNIRECORD's wake-up call

Elastic Blog
NAPLISTENER: more bad dreams from developers of SIESTAGRAPH

Elastic Blog

🔥🔥🤩 Check out this malware analysis report from Elastic Security Labs on a recent variant from the malware family ICEDID written by the MARE (Malware Analysis and Reverse Engineering) Team Senior Security Researchers Cyril F. and Daniel Stepanic !

#malwareanalysis #elastic #ElasticSecurityLabs #malware

https://www.elastic.co/security-labs/thawing-the-permafrost-of-icedid-summary

Thawing the permafrost of ICEDID Summary

Elastic Blog
Exploring the Future of Security with ChatGPT

Elastic Blog
Elastic Security Labs on Twitter

“We’re now live! Follow us here for the latest updates on open security, research on emerging threats, malware analysis, and more. Check it out → https://t.co/aeZ9PIKtFX”

Twitter