Bunt hier bei den schwarzen Massen!!

#SporthalleHamburg #Hamburg #LordoftheLost #LotL

πŸ“° SharePoint Flaw Chain Exploited to Deploy Warlock Ransomware

Ransomware alert: Storm-2603 exploits SharePoint flaws (CVE-2025-49706) to deploy Warlock ransomware. Attackers abuse the legitimate DFIR tool 'Velociraptor' to evade detection. Patch SharePoint now! ⚠️ #Ransomware #SharePoint #LotL

πŸ”— https://cyber.netsecops.io/articles/sharepoint-flaws-chained-to-deliver-warlock-ransomware/?utm_source=mastodon&utm_medium=social&utm_campaign=twitter_auto

SharePoint Flaw Chain Exploited to Deploy Warlock Ransomware

Threat actor Storm-2603 is exploiting SharePoint vulnerabilities (CVE-2025-49706, CVE-2025-49704) and abusing the Velociraptor DFIR tool to deploy Warlock ransomware.

CyberNetSec.io

Living off the Land: Как Π»Π΅Π³ΠΈΡ‚ΠΈΠΌΠ½Ρ‹Π΅ ΡƒΡ‚ΠΈΠ»ΠΈΡ‚Ρ‹ стали ΠΎΡ€ΡƒΠΆΠΈΠ΅ΠΌ Π² Ρ€ΡƒΠΊΠ°Ρ… Ρ…Π°ΠΊΠ΅Ρ€ΠΎΠ² Π½Π° ΠΏΡ€ΠΈΠΌΠ΅Ρ€Π΅ Rare Werewolf

Π’ ΠΌΠΈΡ€Π΅ кибСрбСзопасности ΡƒΠΆΠ΅ Π½Π΅ ΠΏΠ΅Ρ€Π²Ρ‹ΠΉ Π³ΠΎΠ΄ Π½Π°Π±ΠΈΡ€Π°Π΅Ρ‚ ΠΏΠΎΠΏΡƒΠ»ΡΡ€Π½ΠΎΡΡ‚ΡŒ Ρ‚Π°ΠΊΡ‚ΠΈΠΊΠ° Β«Living off the LandΒ» (LOTL) β€” Β«ΠΆΠΈΠ²ΡƒΡ‰ΠΈΠ΅ Π·Π° счёт Π·Π΅ΠΌΠ»ΠΈΒ». Π•Ρ‘ ΡΡƒΡ‚ΡŒ Π·Π°ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ Π² Ρ‚ΠΎΠΌ, Ρ‡Ρ‚ΠΎΠ±Ρ‹ максимально ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ Π»Π΅Π³ΠΈΡ‚ΠΈΠΌΠ½ΠΎΠ΅ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ½ΠΎΠ΅ обСспСчСниС ΠΈ встроСнныС Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΈ ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы для достиТСния Π·Π»ΠΎΠ½Π°ΠΌΠ΅Ρ€Π΅Π½Π½Ρ‹Ρ… Ρ†Π΅Π»Π΅ΠΉ. Π­Ρ‚ΠΎ позволяСт Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΠ°ΠΌ эффСктивно ΠΌΠ°ΡΠΊΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒΡΡ Π½Π° Π·Π°Ρ€Π°ΠΆΡ‘Π½Π½ΠΎΠΉ систСмС, вСдь Π°ΠΊΡ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌ Π²Ρ€ΠΎΠ΄Π΅ curl.exe, AnyDesk.exe ΠΈΠ»ΠΈ установщика WinRAR Ρ€Π΅Π΄ΠΊΠΎ Π²Ρ‹Π·Ρ‹Π²Π°Π΅Ρ‚ подозрСния Ρƒ рядовых ΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚Π΅Π»Π΅ΠΉ ΠΈ Π΄Π°ΠΆΠ΅ Ρƒ Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Ρ… систСм Π·Π°Ρ‰ΠΈΡ‚Ρ‹. Π”Π°Π²Π°ΠΉΡ‚Π΅ Π΄Π΅Ρ‚Π°Π»ΡŒΠ½ΠΎ Ρ€Π°Π·Π±Π΅Ρ€Ρ‘ΠΌ ΠΎΠ΄ΠΈΠ½ ΠΈΠ· ярких ΠΏΡ€ΠΈΠΌΠ΅Ρ€ΠΎΠ² использования этой Ρ‚Π°ΠΊΡ‚ΠΈΠΊΠΈ, Ρ‡Ρ‚ΠΎΠ±Ρ‹ наглядно ΡƒΠ²ΠΈΠ΄Π΅Ρ‚ΡŒ, ΠΊΠ°ΠΊ Π±Π΅Π·ΠΎΠ±ΠΈΠ΄Π½Ρ‹Π΅, Π½Π° ΠΏΠ΅Ρ€Π²Ρ‹ΠΉ взгляд, ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΡ‹ ΠΌΠΎΠ³ΡƒΡ‚ Π±Ρ‹Ρ‚ΡŒ ΠΏΡ€Π΅Π²Ρ€Π°Ρ‰Π΅Π½Ρ‹ Π² ΠΌΠΎΡ‰Π½ΠΎΠ΅ ΠΎΡ€ΡƒΠΆΠΈΠ΅ для Ρ†Π΅Π»Π΅Π²ΠΎΠΉ Π°Ρ‚Π°ΠΊΠΈ. ВсСм ΠΏΡ€ΠΈΠ²Π΅Ρ‚! МСня Π·ΠΎΠ²ΡƒΡ‚ АлСксандр, я вирусный Π°Π½Π°Π»ΠΈΡ‚ΠΈΠΊ ΠΈ рСвСрс-ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€. ΠŸΠΎΠ΄ΠΏΠΈΡΡ‹Π²Π°ΠΉΡ‚Π΅ΡΡŒ Π½Π° ΠΌΠΎΠΉ Ρ‚Π³-ΠΊΠ°Π½Π°Π» - Ρ‚Π°ΠΌ ΠΌΠ½ΠΎΠ³ΠΎ ΠΏΠΎΠ»Π΅Π·Π½ΠΎΠ³ΠΎ ΠΊΠΎΠ½Ρ‚Π΅Π½Ρ‚Π°. ΠŸΠΎΠ΄Π½ΡΡ‚ΡŒ занавСс Π°Ρ‚Π°ΠΊΠΈ

https://habr.com/ru/articles/967934/

#Π°Π½Π°Π»ΠΈΠ·_врСдоносов #рСвСрсинТиниринг #Librarian_Ghouls #Rare_Werewolf #living_off_the_land #lotl #malware_analysis #троян #стилСр #ΡƒΠΏΠ°ΠΊΠΎΠ²Ρ‰ΠΈΠΊ

Living off the Land: Как Π»Π΅Π³ΠΈΡ‚ΠΈΠΌΠ½Ρ‹Π΅ ΡƒΡ‚ΠΈΠ»ΠΈΡ‚Ρ‹ стали ΠΎΡ€ΡƒΠΆΠΈΠ΅ΠΌ Π² Ρ€ΡƒΠΊΠ°Ρ… Ρ…Π°ΠΊΠ΅Ρ€ΠΎΠ² Π½Π° ΠΏΡ€ΠΈΠΌΠ΅Ρ€Π΅ Rare Werewolf

Π’ ΠΌΠΈΡ€Π΅ кибСрбСзопасности ΡƒΠΆΠ΅ Π½Π΅ ΠΏΠ΅Ρ€Π²Ρ‹ΠΉ Π³ΠΎΠ΄ Π½Π°Π±ΠΈΡ€Π°Π΅Ρ‚ ΠΏΠΎΠΏΡƒΠ»ΡΡ€Π½ΠΎΡΡ‚ΡŒ Ρ‚Π°ΠΊΡ‚ΠΈΠΊΠ° Β«Living off the LandΒ» (LOTL) β€” Β«ΠΆΠΈΠ²ΡƒΡ‰ΠΈΠ΅ Π·Π° счёт Π·Π΅ΠΌΠ»ΠΈΒ». Π•Ρ‘ ΡΡƒΡ‚ΡŒ Π·Π°ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ Π² Ρ‚ΠΎΠΌ, Ρ‡Ρ‚ΠΎΠ±Ρ‹ максимально ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ Π»Π΅Π³ΠΈΡ‚ΠΈΠΌΠ½ΠΎΠ΅...

Π₯Π°Π±Ρ€
I had to cut this one down a bit too because it didn't even fit in the GD frame, nvm the mounting board. However it fits in much better than the card because the text isn't really necessary. I might change the picture out at one point but I really like this look and photograph. Not sure if it was the photographer they use now, but he takes amazing photos. The lighting is always so nice.
#LordOfTheLost #LotL #musicartwork #photography

Heute gibt’s was auf die Ohren.

🀘

#dusseldorf #MitsubishiElectricHalle #LOTL #LordOfTheLost #Feuerschwanz

Klaas and Benji have their collage pages done. I haven't done the drawing pages yet cos I can't really focus enough at the moment but hopefully soon.
Bits of an old calendar, some crepe wrapping paper, the Japanese napkins and some stickers my friend sent me. And ofc the lyric strips thanks to my charity shop typewriter:)
#scrapbooking #lotl #lordofthelost

πŸ‘¨β€πŸ’» Evasive #malware is on the rise, and in our latest webinar, #ANYRUN experts revealed how to detect #phishkits, #ClickFix, and #LOTL attacks.

These methods help SOC teams cut triage time, gain better threat visibility, and respond faster.

Watch now: https://youtu.be/Ze27bW8v5MU?si=sq6ZAq_MkEUqHo-6

Two days sleeping/bed rotting after a relatively ok Saturday...things not been very good tbh but I managed to just do the centrefold of my #lotl journal.
Nearly had a meltdown trying to get the paper into my typewriter before - after twenty minutes - realising I was actually putting it in the wrong place.
#scrapbooking #lordofthelost #journal
Being off work has freed up my brain and I've been able to make more and draw more. Let's see how it continues when I go back.
Obsessed with Kim Kitsuragi from Disco Elysium, despite having only played Day 1 so far...kinda scared to carry on because it seems like it's gonna be really intense and I will be sad when it's over, like RDR2. Mixture of the quiet kindness and patience with the sexy voice I think. Plus I think he likes notebooks and I think that's cute.
#discoelysium #kimkitsuragi #lotl

Morning, cyber pros! It's been a bit quiet over the last 24 hours, but we've still got some critical updates to chew on. We're looking at a nasty WhatsApp zero-day, some clever abuse of forensic tools for C2, and a new infostealer campaign leveraging fake PDF editors. Let's dive in:

Actively Exploited Zero-Days in WhatsApp and Apple ⚠️
- WhatsApp has patched CVE-2025-55177, a vulnerability in its iOS and macOS apps, which may have been exploited in the wild.
- This flaw, related to insufficient authorisation of linked device sync messages, is believed to have been chained with Apple's CVE-2025-43300, an ImageIO out-of-bounds write, for targeted zero-click attacks.
- Amnesty International confirmed WhatsApp notified targeted individuals, including civil society members, suggesting an advanced spyware campaign. Users should factory reset and keep all software updated.

πŸ€” The Hacker News | https://thehackernews.com/2025/08/whatsapp-issues-emergency-update-for.html

New Tradecraft: Velociraptor Abuse, Teams Phishing, and Infostealer Campaigns πŸ›‘οΈ
- Threat actors are evolving their living-off-the-land tactics by abusing legitimate tools like Velociraptor, an open-source forensic platform, to establish C2 tunnels and deploy Visual Studio Code.
- We're also seeing a rise in Microsoft Teams phishing, where attackers impersonate IT help desks to deliver remote access tools and PowerShell payloads for credential theft and RCE, bypassing traditional email defences.
- A new infostealer, "TamperedChef," is being distributed via fraudulent PDF editing apps promoted through Google ads, with the malicious payload activated days after installation to evade initial detection. Some of these apps also turn user systems into residential proxies.

πŸ€” The Hacker News | https://thehackernews.com/2025/08/attackers-abuse-velociraptor-forensic.html
πŸ€– Bleeping Computer | https://www.bleepingcomputer.com/news/security/tamperedchef-infostealer-delivered-through-fraudulent-pdf-editor/

#CyberSecurity #InfoSec #ThreatIntelligence #ZeroDay #Vulnerability #WhatsApp #Apple #Malware #Infostealer #Velociraptor #MicrosoftTeams #Phishing #SocialEngineering #LotL #IncidentResponse

WhatsApp Patches Zero-Click Exploit Targeting iOS and macOS Devices

WhatsApp patched CVE-2025-55177 zero-day linked with Apple CVE-2025-43300, exploited in spyware attacks.

The Hacker News