Cartography, by Pebbledash

track by Pebbledash

Pebbledash

Pebbledash โ€“ Ashaโ€™s Waltz

Die Band Pebbledash aus Cork hat ihrer aktuellen Tour den Namen Of Seaweed and Sandstone gegeben โ€“ ein Titel, der nicht nur schรถn klingt, sondern auch ziemlich gut beschreibt, worum es ihnen gerade geht. Da, wo Meer auf Fels trifft, entsteht Spannung โ€“ genau wie in ihren neuen Songs.

Hier ist die aktuelle und wunderschรถne Single Ashaโ€™s Waltz.

https://youtu.be/t2FtHoAxtmg?si=lFRVEb4Ptb9LxO66

#Pebbledash

Die Band Pebbledash aus Cork hat ihrer aktuellen Tour den Namen Of Seaweed and Sandstone gegeben โ€“ ein Titel, der nicht nur schรถn klingt, sondern auch ziemlich gut beschreibt, worum es ihnen gerade geht. Da, wo Meer auf Fels trifft, entsteht Spannung โ€“ genau wie in ihren neuen Songs. Hier ist die aktuelle und wunderschรถne [โ€ฆ] โ€ฆ
#Pebbledash
#indiemusic
https://www.nicorola.de/pebbledash-ashas-waltz/
"Distribution of PebbleDash Malware in March 2025" published by Ahnlab. #Kimsuky, #PebbleDash, #DPRK, #CTI https://asec.ahnlab.com/en/87621/
Distribution of PebbleDash Malware in March 2025 - ASEC

PebbleDash is a backdoor malware that was previously identified by the Cybersecurity and Infrastructure Security Agency (CISA) in the U.S. as a backdoor malware of Lazarus (Hidden Corba) in 2020. At the time, it was known as the malware of the Lazarus group, but recently, there have been more cases of the PebbleDash malware being [โ€ฆ]

ASEC
"2025๋…„ 3์›” PebbleDash ์•…์„ฑ์ฝ”๋“œ ์œ ํฌ ์‚ฌ๋ก€" published by Ahnlab. #Kimsuky, #PebbleDash, #DPRK, #CTI https://asec.ahnlab.com/ko/87613/
2025๋…„ 3์›” PebbleDash ์•…์„ฑ์ฝ”๋“œ ์œ ํฌ ์‚ฌ๋ก€ - ASEC

PebbleDash ๋ฐฑ๋„์–ด ์•…์„ฑ์ฝ”๋“œ๋Š” ์ง€๋‚œ 2020๋…„์— ๋ฏธ๊ตญ ๊ตญํ† ๋ถ€ ์‚ฐํ•˜๊ธฐ๊ด€์ธ CISA์—์„œ ๋ช…๋ช…ํ•œ Lazarus(Hidden Corba)์˜ ๋ฐฑ๋„์–ด ์•…์„ฑ์ฝ”๋“œ์ด๋‹ค. ๋‹น์‹œ์—๋Š” Lazarus ๊ทธ๋ฃน์˜ ์•…์„ฑ์ฝ”๋“œ๋กœ ์•Œ๋ ค์ ธ์žˆ์—ˆ์ง€๋งŒ ์ตœ๊ทผ๋“ค์–ด Lazarus ๊ทธ๋ฃน์˜ ๊ณต๊ฒฉ ์‚ฌ๋ก€๋ณด๋‹ค๋Š” ๊ฐœ์ธ์„ ๋Œ€์ƒ์œผ๋กœ ์•…์„ฑ์ฝ”๋“œ ์œ ํฌ๋ฅผ ์ผ์‚ผ๋Š” Kimsuky ๊ทธ๋ฃน์˜ ๊ณต๊ฒฉ ์‚ฌ๋ก€์—์„œ PebbleDash ์•…์„ฑ์ฝ”๋“œ๊ฐ€ ๋‹ค์ˆ˜ ํ™•์ธ๋˜๊ณ  ์žˆ๋‹ค. ๋ณธ ๋ณด๊ณ ์„œ์—์„œ๋Š” Kimsuky ๊ทธ๋ฃน์˜ PebbleDash ์•…์„ฑ์ฝ”๋“œ ์ตœ์‹  ์œ ํฌ ๊ณผ์ •๊ณผ PebbleDash์™€ ํ•จ๊ป˜ ํ™•์ธ๋˜๋Š” ์•…์„ฑ์ฝ”๋“œ์™€ ์ถ”๊ฐ€ ๋ชจ๋“ˆ์— ๋Œ€ํ•ด ๋‹ค๋ฃจ๊ณ ์ž [โ€ฆ]

ASEC

Pebble Dash im Cafรฉ Herzhรคuschen โ€“ live am 12.04.2025

Die Themen bleiben aber nicht so leicht und unbekรผmmert wie โ€ždie Bickeโ€œ ist โ€“ Klimakrise, Social Justice. Ich sagte ja, Punk, aber mit deutlich mehr Akkorden und dadurch, jetzt lehn ich mich mal ein wenig aus dem Fenster, kรถnnen auch Menschen, die diese Themen weit von sich rรผcken, hier hervorragend antizipieren.

Hier kommt der Konzertbericht von @AnneReif
https://vinyl-keks.eu/pebbledash-im-cafe-herzhaeuschen-live-am-12-04-2025/

#Bickendorf #CafeHerzhรคuschen #Kรถln #Pebbledash #ReleaseDay

Pebble Dash im Cafรฉ Herzhรคuschen - live am 12.04.2025 | vinyl-keks.eu

Es spielen Pebbledash ihr Releasekonzert, feinsten Singer-Songwritersound,

vinyl-keks.eu

A common way for malware to disguise its C2 communication and stay under the radar is mimicking widely accepted protocols such as TLS and blend into the existing traffic.

The deep dive below into PebbleDashโ€™s FakeTLS C2 protocol shows how North Korean APTs fake TLS handshakes and use hardcoded RC4 encryption to blend in with legit HTTPS traffic. Sneaky stuff โ€” and a must-read for threat hunters. ๐Ÿ”๐Ÿ’ป

https://malwareandstuff.com/reversing-pebbledashs-faketls-c2-protocol/

#malware #infosec #reverseengineering #pebbledash #cybersecurity #windows

Reversing PebbleDashโ€™s FakeTLS Protocol

So I was looking through the CISAโ€™s recent publications regarding three tools named PebbleDash[1], Copperhedge[2] and Taintedscribe[3] which are believed to be used by the state-sponsored Norโ€ฆ

Malware and Stuff
"ๅŒ— ํ•ดํ‚น ์กฐ์ง, ๊ฑฐ๋ž˜์ฒ˜ ์—…๋ฌด ๋ฉ”์ผ๋กœ ์œ„์žฅํ•œ ์Šคํ”ผ์–ด ํ”ผ์‹ฑ ๊ณต๊ฒฉ ์ฃผ์˜!" published by ESTSecurity. #Kimsuky, #PebbleDash, #DPRK, #CTI https://blog.alyac.co.kr/5526
ๅŒ— ํ•ดํ‚น ์กฐ์ง, ๊ฑฐ๋ž˜์ฒ˜ ์—…๋ฌด ๋ฉ”์ผ๋กœ ์œ„์žฅํ•œ ์Šคํ”ผ์–ด ํ”ผ์‹ฑ ๊ณต๊ฒฉ ์ฃผ์˜!

์•ˆ๋…•ํ•˜์„ธ์š”? ์ด์ŠคํŠธ์‹œํ๋ฆฌํ‹ฐ ์‹œํ๋ฆฌํ‹ฐ๋Œ€์‘์„ผํ„ฐ(์ดํ•˜ ESRC)์ž…๋‹ˆ๋‹ค.โ€ฏ ์ตœ๊ทผ ๊ฑฐ๋ž˜์ฒ˜ ์—…๋ฌด๋ฉ”์ผ์„ ์œ„์žฅํ•œ ์Šคํ”ผ์–ด ํ”ผ์‹ฑ ๊ณต๊ฒฉ์ด ๋ฐœ๊ฒฌ๋˜์–ด ๊ธฐ์—… ์‚ฌ์šฉ์ž๋ถ„๋“ค์˜ ๊ฐ๋ณ„ํ•œ ์ฃผ์˜๊ฐ€ ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค. ์ด๋ฒˆ ๊ณต๊ฒฉ์€ ์ด๋ฉ”์ผ ์ˆ˜์‹ ์ž๊ฐ€ ๊ฑฐ๋ž˜์ฒ˜์™€ ์—…๋ฌด์ƒ ๋ฉ”์ผ์„ ์ฃผ๊ณ  ๋ฐ›๋Š” ๊ณผ์ • ์ค‘์— ๊ณต๊ฒฉ์ž๊ฐ€ ํšŒ์‹ ๋ฉ”์ผ์„ ๋ณด๋ƒ„์œผ๋กœ์จ ์‚ฌ์šฉ์ž๊ฐ€ ์˜์‹ฌํ•˜์ง€ ๋ชปํ•˜๋„๋ก ๊ต๋ฌ˜ํ•˜๊ฒŒ ์†์ด๋Š” ์ˆ˜๋ฒ•์„ ์‚ฌ์šฉํ–ˆ์Šต๋‹ˆ๋‹ค. ์ด๋ฅผ ์œ„ํ•ด ๊ณต๊ฒฉ์ž๋Š” ์‚ฌ์ „์— ๋ฉ”์ผ ์ˆ˜์‹ ์ž์˜ ๊ณ„์ •์„ ํƒˆ์ทจํ•œ ๋’ค ์ด๋ฉ”์ผ ์ˆ˜์‹ ๋‚ด์—ญ์„ ํ™•์ธํ•˜๋Š” ์ž‘์—…์„ ์ง„ํ–‰ํ–ˆ์„ ๊ฒƒ์œผ๋กœ ์œ ์ถ”๋ฉ๋‹ˆ๋‹ค. ์•…์„ฑ ๋ฉ”์ผ์€ โ€˜์ •๊ธฐ์ ๊ฒ€์„œ ์†ก๋ถ€ ๊ฑดโ€™ ๊ณผ โ€˜๋…ธํŠธ๋ถ ๊ฒฌ์  ๋ฌธ์˜โ€™ ์— ๋Œ€ํ•œ ํšŒ์‹ ๋ฉ”์ผ์— ๋„์šฉ๋œ ๊ณ„์ •์„ ์‚ฌ์šฉํ•˜์—ฌ ๋ฐœ์‹ ์ž๋ช… ์กฐ์ž‘ ํ›„ ๋™์ผํ•œ ์ˆ˜์‹ ์ž์—๊ฒŒ ๋ฐœ์†ก๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ์ฒซ ๋ฒˆ์งธ ๋ฉ”์ผ์˜ ๊ฒฝ์šฐ ๋จผ์ € ๋ฐœ์†ก๋œ ์ •์ƒ ํšŒ์‹ ๋ฉ”์ผ๊ณผ ๋™์ผํ•œ ๋‚ด์šฉ์œผ๋กœ ์ฒจ๋ถ€ํŒŒ์ผ๋งŒ ๊ต์ฒดํ•˜์—ฌ ๋‹ค์‹œ ๋ฐœ์†ก..

์ด์ŠคํŠธ์‹œํ๋ฆฌํ‹ฐ ์•Œ์•ฝ ๋ธ”๋กœ๊ทธ
"Lazarus Backdoor with IT Lure" published by dmpdump. #Lazarus, #PebbleDash, #DPRK, #CTI https://dmpdump.github.io/posts/Lazarus-Backdoor-ITLure/
Lazarus Backdoor with IT Lure

On January 27, 2025, @smica83 shared a sample on X indicating that it looked like Lazarus malware. I reviewed the sample and concluded that, indeed, it is a North Korean backdoor, likely the latest version of a backdoor publicly tracked as PEBBLEDASH.

dmpdump

Good day everyone!

The wonderful researchers at AhnLab, Inc. Security Intelligence Center (ASEC) publishes their findings on recent attacks they observed coming from the #Kimsuky group. The APT group delivered malicious .LNK files through spear-phishing attacks and these files contained the company's they were targeting names, which would suggested this was a targeted attack. As the attack progressed, the #PebbleDash backdoor and a custom version of #RDPWrapper (which is a software that enabled remote desktop on systems that may not support Windows Native RDP).

Behavior Summary (With MITRE ATT&CK):
Initial Access:
Phishing: Spearphishing Attachment (T1566.001) - Kimsuky delivered their malicious .LNK files through email.

Execution:
Comand and Scripting Interpreter: Powershell (T1059.001) - When the LNK file is executed, a powershell (or mshta.exe) is executed to download and execute addtional payloads from external sources.

Defense Evasion:
System Binary Proxy Execution: Mshta (T1218.005) - When the LNK file is executed it could lead to mshta executed to download and execute addtional payloads from external sources.

Masquerading: Masquerade File Type (T1036.008) - The .LNK files are disguised as a document file with an Office document icon such as PDF, Excel, or Word.

Collection/Credential Access:
Input Capture: Keylogging (T1056.001)
The APT group used a powershell script to perform keylogging and also installs keyloggers in executable file format.

You know the drill! Go check out the article for a lot more technical details! Enjoy and Happy Hunting!

Persistent Threats from the Kimsuky Group Using RDP Wrapper
https://asec.ahnlab.com/en/86098/

Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday

Persistent Threats from the Kimsuky Group Using RDP Wrapper - ASEC

AhnLab SEcurity intelligence Center (ASEC) has previously analyzed cases of attacks by the Kimsuky group, which utilized the PebbleDash backdoor and their custom-made RDP Wrapper. The Kimsuky group has been continuously launching attacks of the same type, and this post will cover additional malware that have been identified.   1. Overview Threat actors are distributing [โ€ฆ]

ASEC