16 Followers
68 Following
23 Posts
Security Consultant. PurpleTeam. DFIR/IR
GitHubhttps://github.com/ttakvam

Campaign employs the Etherhide technique, where payloads are delivered from smart Web3 contracts and Cloudflare-hosted sites spreading Vidar malware across infected ~5k wordpress websites. The campaign has been active for ~3 months as of 2024-11-24. #Binance #EtherHide #ClearFake #ClickFix #Malware #IOC #przepisyjoli ;)

https://security.szustak.pl/etherhide/etherhide.html?mst

EtherHiding and ClickFix: new mask of social engineering campaign

πŸ” TDR analysts discovered a new Adversary-in-the-Middle (#AiTM) #phishing kit, specifically targeting Microsoft 365 accounts and circumventing 2-step verification: Sneaky 2FA

https://blog.sekoia.io/sneaky-2fa-exposing-a-new-aitm-phishing-as-a-service/

#detection #sneaky2fa

Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service

In this blog post, learn about Sneaky 2FA, a new Adversary-in-the-Middle (AiTM) phishing kit targeting Microsoft 365 accounts.

Sekoia.io Blog

Hey :)

Earlier, we teased you some infrastructure details related to the pro-Russian hacktivist NoName057(16).
Today we published the full report, with all backend IPs, DDoS infrastructure IP ranges, some Stark-Industries insights,etc.:

https://team-cymru.com/post/a-blog-with-noname

@teamcymru_S2

A Blog with NoName

Further Insight into the Hacktivist Operation Targeting NATO and Affiliated Nations Key Findings NoName057(16) is a pro-Russian hacktivist operator / group, which has claimed responsibility for repeated Distributed Denial of Service (DDoS) attacks against entities in perceived anti-Russian countries since March 2022. NoName057(16) back-end infrastructure is hosted in Russia and likely operated by individual(s) with experience in systems design / maintenance. DDoS attack targeting instructions in

Team Cymru

Hello mastodon #infosec friends, I built a new website to better search for #Sentinel #AnalyticsRules.

https://analyticsrules.exchange

It is a searchable and filterable list of all Analytics rules in the public repository built automatically twice a day.

Feedback welcome

Microsoft Sentinel Analytic Rules

Microsoft Sentinel Analytic Rules

Microsoft has just released a patch for ZIP MOTW vulnerability assigned as CVE-2022-41091.

I am happy to be able to finally drop my bug analysis write-up! πŸ”₯πŸœβ€‹

Enjoy and happy patching!
https://breakdev.org/zip-motw-bug-analysis/

Exploring ZIP Mark-of-the-Web Bypass Vulnerability (CVE-2022-41049)

Windows ZIP extraction bug (CVE-2022-41049) lets attackers craft ZIP files, which evade warnings on attempts to execute packaged files, even if ZIP file was downloaded from the Internet.

BREAKDEV
@sj_tech wiki.Infosec.exchange. I need to do a better job of advertising it

Now available! 

My in-depth comparative review of eight Mastodon apps for iPhone

Please boost (or share on Twitter) πŸ™

https://transponderings.blog/2022/05/21/eight-mastodon-apps-for-iphone/

Eight Mastodon apps for iPhone

An in-depth comparative review of eight Mastodon apps for iPhone: Fedi, Mast, Mastodon, Mercury, Metatext, tooot, Toot! and Tootle.

transponderings
Come on - who else wants to come at me with racial slurs, homophobia, transphobia, or other hate today?!? I am having a blast with my feet in the ocean banning instances.
THC RELEASE: Disposable Root Servers and Linux Shells for EVERYONE. Try `ssh [email protected]`. Password is πŸ‘‰segfaultπŸ‘ˆ #root #linux #hacking https://blog.thc.org/disposable-root-servers
Disposable Root Servers

We love to research, explore, play and tinker. This journey almost always starts on a Linux Root Shell. Let this be the start of your journey. Use SSH and connect: ssh [email protected] # Password is 'segfault' Every SSH connection spawns a new Root...

The Hacker's Choice
Reminder: I’ve started posting helpful FAQs here: https://wiki.infosec.exchange/doku.php?id=wiki:faqs
wiki:faqs [Infosec.Exchange Wiki]