https://www.wired.com/story/3cx-supply-chain-attack-north-korea-cryptocurrency-targets/
| Personal: | https://tomhegel.com |
| SentinelLabs: | https://labs.sentinelone.com |
| Twitter: | https://twitter.com/TomHegel |
| Personal: | https://tomhegel.com |
| SentinelLabs: | https://labs.sentinelone.com |
| Twitter: | https://twitter.com/TomHegel |
New SentinelLabs Research on WIP26 - https://s1.ai/WIP26
π£ New actor targeting telco in the Middle East
π£ Abuses Microsoft 365 Mail, Google Firebase, and Dropbox for C2
π£ Targeted WhatsApp msgs -> Dropbox -> loader -> backdoors
by @milenkowski and team
πβ Join the @vxunderground & @SentinelOne Malware Research Challenge (VUSMC) --
Submit your previously unpublished research and you could be featured on both the SentinelOne blog and the VXUG site. And that's not all: The best research will win a brand new, sleek and powerful MacBook Pro!
Seen in the wild: Cloud credentials phishing attacks are now deploying Google Ads targeting Amazon Web Services (AWS) cloud logins. By @hegel
https://www.sentinelone.com/blog/cloud-credentials-phishing-malicious-google-ads-target-aws-logins/
π New on #SentinelLabs! .NET malware loader, dubbed MalVirt, is being distributed through malvertising are using obfuscated virtualization for anti-analysis and evasion in an ongoing campaign. By @milenkowski and @hegel
https://www.sentinelone.com/labs/malvirt-net-virtualization-thrives-in-malvertising-attacks/
π¨π³ New on #SentinelLabs: Cluster of attacks in East Asia, DragonSpark uses open-source tool #SparkRAT & malware evading detection through #Golang source code interpretation. By
@milenkowski πβ
π₯ New on #SentinelLabs! #NoName057(16) group carries #DDoS attacks on πΊπ¦ Ukraine, #NATO organizations, & other government orgs.
@LabsSentinel has identified #Telegram channels, a #DDoS payment program, & a toolkit on #GitHub. By @hegel & @milenkowski πβ
New from Intrusion Truth: