๐บ๐ฆ #NowPlaying on #BBC6Music's #ChrisHawkins
Pebbledash:
๐ต Cartography
Cartography, by Pebbledash
track by Pebbledash
๐บ๐ฆ #NowPlaying on #BBC6Music's #ChrisHawkins
Pebbledash:
๐ต Cartography
track by Pebbledash
Pebbledash โ Ashaโs Waltz
Die Band Pebbledash aus Cork hat ihrer aktuellen Tour den Namen Of Seaweed and Sandstone gegeben โ ein Titel, der nicht nur schรถn klingt, sondern auch ziemlich gut beschreibt, worum es ihnen gerade geht. Da, wo Meer auf Fels trifft, entsteht Spannung โ genau wie in ihren neuen Songs.
Hier ist die aktuelle und wunderschรถne Single Ashaโs Waltz.
PebbleDash is a backdoor malware that was previously identified by the Cybersecurity and Infrastructure Security Agency (CISA) in the U.S. as a backdoor malware of Lazarus (Hidden Corba) in 2020. At the time, it was known as the malware of the Lazarus group, but recently, there have been more cases of the PebbleDash malware being [โฆ]
PebbleDash ๋ฐฑ๋์ด ์ ์ฑ์ฝ๋๋ ์ง๋ 2020๋ ์ ๋ฏธ๊ตญ ๊ตญํ ๋ถ ์ฐํ๊ธฐ๊ด์ธ CISA์์ ๋ช ๋ช ํ Lazarus(Hidden Corba)์ ๋ฐฑ๋์ด ์ ์ฑ์ฝ๋์ด๋ค. ๋น์์๋ Lazarus ๊ทธ๋ฃน์ ์ ์ฑ์ฝ๋๋ก ์๋ ค์ ธ์์์ง๋ง ์ต๊ทผ๋ค์ด Lazarus ๊ทธ๋ฃน์ ๊ณต๊ฒฉ ์ฌ๋ก๋ณด๋ค๋ ๊ฐ์ธ์ ๋์์ผ๋ก ์ ์ฑ์ฝ๋ ์ ํฌ๋ฅผ ์ผ์ผ๋ Kimsuky ๊ทธ๋ฃน์ ๊ณต๊ฒฉ ์ฌ๋ก์์ PebbleDash ์ ์ฑ์ฝ๋๊ฐ ๋ค์ ํ์ธ๋๊ณ ์๋ค. ๋ณธ ๋ณด๊ณ ์์์๋ Kimsuky ๊ทธ๋ฃน์ PebbleDash ์ ์ฑ์ฝ๋ ์ต์ ์ ํฌ ๊ณผ์ ๊ณผ PebbleDash์ ํจ๊ป ํ์ธ๋๋ ์ ์ฑ์ฝ๋์ ์ถ๊ฐ ๋ชจ๋์ ๋ํด ๋ค๋ฃจ๊ณ ์ [โฆ]
Pebble Dash im Cafรฉ Herzhรคuschen โ live am 12.04.2025
Die Themen bleiben aber nicht so leicht und unbekรผmmert wie โdie Bickeโ ist โ Klimakrise, Social Justice. Ich sagte ja, Punk, aber mit deutlich mehr Akkorden und dadurch, jetzt lehn ich mich mal ein wenig aus dem Fenster, kรถnnen auch Menschen, die diese Themen weit von sich rรผcken, hier hervorragend antizipieren.
Hier kommt der Konzertbericht von @AnneReif
https://vinyl-keks.eu/pebbledash-im-cafe-herzhaeuschen-live-am-12-04-2025/
#Bickendorf #CafeHerzhรคuschen #Kรถln #Pebbledash #ReleaseDay
A common way for malware to disguise its C2 communication and stay under the radar is mimicking widely accepted protocols such as TLS and blend into the existing traffic.
The deep dive below into PebbleDashโs FakeTLS C2 protocol shows how North Korean APTs fake TLS handshakes and use hardcoded RC4 encryption to blend in with legit HTTPS traffic. Sneaky stuff โ and a must-read for threat hunters. ๐๐ป
https://malwareandstuff.com/reversing-pebbledashs-faketls-c2-protocol/
#malware #infosec #reverseengineering #pebbledash #cybersecurity #windows
์๋ ํ์ธ์? ์ด์คํธ์ํ๋ฆฌํฐ ์ํ๋ฆฌํฐ๋์์ผํฐ(์ดํ ESRC)์ ๋๋ค.โฏ ์ต๊ทผ ๊ฑฐ๋์ฒ ์ ๋ฌด๋ฉ์ผ์ ์์ฅํ ์คํผ์ด ํผ์ฑ ๊ณต๊ฒฉ์ด ๋ฐ๊ฒฌ๋์ด ๊ธฐ์ ์ฌ์ฉ์๋ถ๋ค์ ๊ฐ๋ณํ ์ฃผ์๊ฐ ํ์ํฉ๋๋ค. ์ด๋ฒ ๊ณต๊ฒฉ์ ์ด๋ฉ์ผ ์์ ์๊ฐ ๊ฑฐ๋์ฒ์ ์ ๋ฌด์ ๋ฉ์ผ์ ์ฃผ๊ณ ๋ฐ๋ ๊ณผ์ ์ค์ ๊ณต๊ฒฉ์๊ฐ ํ์ ๋ฉ์ผ์ ๋ณด๋์ผ๋ก์จ ์ฌ์ฉ์๊ฐ ์์ฌํ์ง ๋ชปํ๋๋ก ๊ต๋ฌํ๊ฒ ์์ด๋ ์๋ฒ์ ์ฌ์ฉํ์ต๋๋ค. ์ด๋ฅผ ์ํด ๊ณต๊ฒฉ์๋ ์ฌ์ ์ ๋ฉ์ผ ์์ ์์ ๊ณ์ ์ ํ์ทจํ ๋ค ์ด๋ฉ์ผ ์์ ๋ด์ญ์ ํ์ธํ๋ ์์ ์ ์งํํ์ ๊ฒ์ผ๋ก ์ ์ถ๋ฉ๋๋ค. ์ ์ฑ ๋ฉ์ผ์ โ์ ๊ธฐ์ ๊ฒ์ ์ก๋ถ ๊ฑดโ ๊ณผ โ๋ ธํธ๋ถ ๊ฒฌ์ ๋ฌธ์โ ์ ๋ํ ํ์ ๋ฉ์ผ์ ๋์ฉ๋ ๊ณ์ ์ ์ฌ์ฉํ์ฌ ๋ฐ์ ์๋ช ์กฐ์ ํ ๋์ผํ ์์ ์์๊ฒ ๋ฐ์ก๋์์ต๋๋ค. ์ฒซ ๋ฒ์งธ ๋ฉ์ผ์ ๊ฒฝ์ฐ ๋จผ์ ๋ฐ์ก๋ ์ ์ ํ์ ๋ฉ์ผ๊ณผ ๋์ผํ ๋ด์ฉ์ผ๋ก ์ฒจ๋ถํ์ผ๋ง ๊ต์ฒดํ์ฌ ๋ค์ ๋ฐ์ก..
Good day everyone!
The wonderful researchers at AhnLab, Inc. Security Intelligence Center (ASEC) publishes their findings on recent attacks they observed coming from the #Kimsuky group. The APT group delivered malicious .LNK files through spear-phishing attacks and these files contained the company's they were targeting names, which would suggested this was a targeted attack. As the attack progressed, the #PebbleDash backdoor and a custom version of #RDPWrapper (which is a software that enabled remote desktop on systems that may not support Windows Native RDP).
Behavior Summary (With MITRE ATT&CK):
Initial Access:
Phishing: Spearphishing Attachment (T1566.001) - Kimsuky delivered their malicious .LNK files through email.
Execution:
Comand and Scripting Interpreter: Powershell (T1059.001) - When the LNK file is executed, a powershell (or mshta.exe) is executed to download and execute addtional payloads from external sources.
Defense Evasion:
System Binary Proxy Execution: Mshta (T1218.005) - When the LNK file is executed it could lead to mshta executed to download and execute addtional payloads from external sources.
Masquerading: Masquerade File Type (T1036.008) - The .LNK files are disguised as a document file with an Office document icon such as PDF, Excel, or Word.
Collection/Credential Access:
Input Capture: Keylogging (T1056.001)
The APT group used a powershell script to perform keylogging and also installs keyloggers in executable file format.
You know the drill! Go check out the article for a lot more technical details! Enjoy and Happy Hunting!
Persistent Threats from the Kimsuky Group Using RDP Wrapper
https://asec.ahnlab.com/en/86098/
Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday
AhnLab SEcurity intelligence Center (ASEC) has previously analyzed cases of attacks by the Kimsuky group, which utilized the PebbleDash backdoor and their custom-made RDP Wrapper. The Kimsuky group has been continuously launching attacks of the same type, and this post will cover additional malware that have been identified. 1. Overview Threat actors are distributing [โฆ]