πŸ“– As part of the #REWIND project, Alba Comino published β€˜Intertwining Narrative and Technology: Reinterpreting European Cultural Heritage through the Voices of Latin American Women Writers’ in the International Journal of Humanities and Arts Computing, where she describes the #methodology used in the project.

πŸ”“ In #OpenAccess: https://www.euppublishing.com/doi/full/10.3366/ijhac.2024.0333

@histodons
@litstudies

#Histodons #DigitalHumanities #LitStudies #CulturalHeritage #Ontology #DeepData #SentimentAnalysis #WomenWriters

China-linked actor's malware DeepData exploits FortiClient VPN zero-day - Security Affairs

Chinese threat actors use custom post-exploitation toolkit 'DeepData' to exploit FortiClient VPN zero-day and steal credentials.

Security Affairs
Mal on Instagram: "APT41's DeepData: A New Era of Surveillance ⚠️ The Threat: ⚠️ APT41, a Chinese-linked hacking group, is using a powerful new surveillance toolkit called DeepData Framework to target organizations in South Asia. πŸ—ΊοΈ πŸ—ΊοΈ APT41's operations span globally, targeting a wide range of industries and individuals. DeepData's Capabilities: πŸ’»πŸ”’ DeepData is a highly modular toolkit with 12 plug-ins designed for specific malicious functions. πŸ“±πŸ”’ Steals communications from popular messaging apps like WhatsApp, Signal, Telegram, and WeChat. πŸ“πŸ”’ Exfiltrates sensitive system information, Wi-Fi network data, and installed applications. πŸŒπŸ”’ Steals browsing history, cookies, passwords from browsers, cloud services, and user emails/contacts. πŸŽ™οΈπŸ”’ Steals audio files from compromised systems. Modus Operandi: πŸ”§ Attackers manually control DeepData after gaining access to a target. 🀝🌎 APT41's operations are highly sophisticated and strategically planned for long-term intelligence gathering. Impact: 🎯 Targets include politicians, journalists, activists, and organizations across various sectors, including healthcare, media, government, and technology. πŸ“’βŒ APT41's activities pose a significant threat to national security, intellectual property, and individual privacy. Recommended Mitigation: πŸ›‘οΈπŸ”’ Block APT41's known command and control (C2) infrastructure. πŸŒπŸ” Monitor networks and devices for suspicious audio recording activity. πŸ”’πŸ”‘ Use secure communication channels for data transmission. 🚨 Deploy detection rules for DeepData components. Key Takeaway: ⚠️ APT41's continuous evolution and sophisticated toolkit highlight the growing threat of cyber espionage. 🀝🌎 Organizations need to stay vigilant and implement comprehensive security measures to combat these advanced threats. #cybersecurity #APT41 #DeepData #surveillance #cyberespionage #securityawareness #datasecurity #cyberthreat #hackers #informationsecurity #technology #digitalsecurity #protection #safety #onlineprivacy"

0 likes, 0 comments - the_mal_where on November 18, 2024: "APT41's DeepData: A New Era of Surveillance ⚠️ The Threat: ⚠️ APT41, a Chinese-linked hacking group, is using a powerful new surveillance toolkit called DeepData Framework to target organizations in South Asia. πŸ—ΊοΈ πŸ—ΊοΈ APT41's operations span globally, targeting a wide range of industries and individuals. DeepData's Capabilities: πŸ’»πŸ”’ DeepData is a highly modular toolkit with 12 plug-ins designed for specific malicious functions. πŸ“±πŸ”’ Steals communications from popular messaging apps like WhatsApp, Signal, Telegram, and WeChat. πŸ“πŸ”’ Exfiltrates sensitive system information, Wi-Fi network data, and installed applications. πŸŒπŸ”’ Steals browsing history, cookies, passwords from browsers, cloud services, and user emails/contacts. πŸŽ™οΈπŸ”’ Steals audio files from compromised systems. Modus Operandi: πŸ”§ Attackers manually control DeepData after gaining access to a target. 🀝🌎 APT41's operations are highly sophisticated and strategically planned for long-term intelligence gathering. Impact: 🎯 Targets include politicians, journalists, activists, and organizations across various sectors, including healthcare, media, government, and technology. πŸ“’βŒ APT41's activities pose a significant threat to national security, intellectual property, and individual privacy. Recommended Mitigation: πŸ›‘οΈπŸ”’ Block APT41's known command and control (C2) infrastructure. πŸŒπŸ” Monitor networks and devices for suspicious audio recording activity. πŸ”’πŸ”‘ Use secure communication channels for data transmission. 🚨 Deploy detection rules for DeepData components. Key Takeaway: ⚠️ APT41's continuous evolution and sophisticated toolkit highlight the growing threat of cyber espionage. 🀝🌎 Organizations need to stay vigilant and implement comprehensive security measures to combat these advanced threats. #cybersecurity #APT41 #DeepData #surveillance #cyberespionage #securityawareness #datasecurity #cyberthreat #hackers #informationsecurity #technology #digitalsecurity #protection #safety #onlineprivacy".

Instagram

"#DEEPDATA is a modular post-exploitation tool for the Windows operating system that is used to gather a wide range of information from target devices. Analysis of the sample revealed a plugin that was designed to extract credentials from #FortiClientVPN client process memory."

#fortinet

https://www.volexity.com/blog/2024/11/15/brazenbamboo-weaponizes-forticlient-vulnerability-to-steal-vpn-credentials-via-deepdata/

BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA

In July 2024, Volexity identified exploitation of a zero-day credential disclosure vulnerability in Fortinet’s Windows VPN client that allowed credentials to be stolen from the memory of the client’s process. This vulnerability was discovered while analyzing a recent sample of the DEEPDATA malware family. DEEPDATA is a modular post-exploitation tool for the Windows operating system that is used to gather a wide range of information from target devices. Analysis of the sample revealed a plugin that was designed to extract credentials from FortiClient VPN client process memory. On July 18, 2024, Volexity notified Fortinet about this vulnerability. At the time of writing, the issue remains unresolved.

Volexity