Heute ist es einfach zu viel...

FunkSec’s FunkLocker Ransomware: mit Hilfe von AI zusammengestoppelt
https://any.run/cybersecurity-blog/funklocker-malware-analysis/
https://www.einnews.com/pr_news/854223893/any-run-exposes-funklocker-ai-generated-ransomware-threatens-global-organizations

Rootkit-Variante FlipSwitch zielt auf den Linux-Kernel:
https://www.elastic.co/security-labs/flipswitch-linux-rootkit

DNS-Malware Detour Dog verbreitet Strela Stealer mithilfe von DNS-TXT-Einträgen:
https://blogs.infoblox.com/threat-intelligence/detour-dog-dns-malware-powers-strela-stealer-campaigns/

Und für Gockel-Nutzende gibt es auch eine frische Malware-Kampagne: MatrixPDF.
https://www.varonis.com/blog/matrixpdf

Aber das ist heute noch nicht alles!
Gewaltiges Adobe Analytics Datenleck. Wegen eines falsch konfigurierten API -Endpunktes flossen Daten an Dritte. Es beträfe 15 Millionen Nutzende in Nordamerika und Europa. Wie kann ein routinemäßiges Update zu einer solch massiven Datenpanne führen?
https://thedefendopsdiaries.com/adobe-analytics-data-leak-exposes-15-million-users-in-major-2025-breach/

#infosec #Ransomware #FunkLocker #Rootkit #flipswitch #Malware #DetourDog #matrixpdf #Dataleak #BeDiS

FunkLocker Analysis: AI-powered Ransomware from FunkSec APT

Discover a technical analysis of AI-based ransomware FunkLocker from the FunkSec APT that is targeting businesses worldwide.

ANY.RUN's Cybersecurity Blog
SonicWall releases SMA100 firmware update to wipe rootkit malware

SonicWall has released a firmware update that can help customers remove rootkit malware deployed in attacks targeting SMA 100 series devices.

BleepingComputer

SonicWall SMA 100 devices are under threat from a stealthy malware that clings even after updates, stealing sensitive credentials. Could your network be at risk? Dive into this unfolding security saga.

https://thedefendopsdiaries.com/the-persistent-threat-of-overstep-malware-on-sonicwall-sma-100-devices/

#overstepmalware
#sonicwall
#rootkit
#firmwareupdate
#cybersecurity
#unc6148
#ransomware
#cve202440766
#networksecurity
#threatintel

DeerStealer Malware Campaign: Stealth, Persistence, and Rootkit-Like Capabilities

Pulse ID: 68d242461771a35fa568a2d6
Pulse Link: https://otx.alienvault.com/pulse/68d242461771a35fa568a2d6
Pulse Author: Tr1sa111
Created: 2025-09-23 06:46:30

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #Malware #OTX #OpenThreatExchange #Rootkit #bot #Tr1sa111

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

DeerStealer Malware Campaign: Stealth, Persistence, and Rootkit-Like Capabilities

DeerStealer is a sophisticated information-stealing malware that targets a wide range of user and system data. It employs deception techniques, persistence mechanisms, and rootkit-like capabilities to evade detection and maintain stealth on compromised systems. The malware uses signed executables, legitimate DLLs, and multi-stage execution to perform its malicious activities. It establishes persistence through scheduled tasks and employs auto-elevated COM objects to bypass User Account Control. DeerStealer's adaptive design allows it to switch C2 servers and use obfuscated files for effective data exfiltration. The malware is actively sold and supported through dark-web forums and Telegram channels, posing a significant threat to both individuals and organizations.

Pulse ID: 68ce938ae34f725fce8b67a4
Pulse Link: https://otx.alienvault.com/pulse/68ce938ae34f725fce8b67a4
Pulse Author: AlienVault
Created: 2025-09-20 11:44:10

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #Malware #OTX #OpenThreatExchange #RAT #Rootkit #SMS #Telegram #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
Fantastic Rootkits: And Where to Find Them (Part 1)

Introduction In this blog series, we will cover the topic of rootkits — how they are built and the basics of kernel driver analysis — specifically on the Windows platform. In this first part, we...

BIOS Problem with Installing Ubuntu

So recently I got into a dilemma. It may as well have been a virus or something unusual. But my BIOS seems to be inaccessible during the boot up sequence. Even trying to get into it via the Windows...

Ask Ubuntu

@Uair Yeah, I also remember #MagicLantern, tho #Carnivore was a #Rootkit if I'm not mistaken...

Granted, the #NRO literally put #USA202 aka. #MENTHOR4 next to #Thuraya-2...

  • Again: Cold OSINT...
Thuraya - Wikipedia

×