mastodon.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
A newer server operated by the Mastodon gGmbH non-profit

Server stats:

11K
active users

#malwareanalysis

12 posts9 participants1 post today
Opalsec :verified:<p>Our latest summary is out, looking at an emerging Crypto-theft Trojan and a promising new recovery tool.</p><p>Stay ahead of the curve and read the full post here: <a href="https://opalsec.io/daily-news-update-sunday-march-31-2025-australia-melbourne/🔗" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.io/daily-news-update-s</span><span class="invisible">unday-march-31-2025-australia-melbourne/🔗</span></a></p><p>📱 Crocodilus Android Malware: This nasty piece of work is targeting crypto wallets by using fake overlays to steal seed phrases. It's bypassing security measures and using social engineering to gain access. Watch out for this one, especially if you have users in Turkey and Spain! 🇪🇸 🇹🇷</p><p>🛠️ Key Takeaways:<br>* 🔑 Steals crypto wallet seed phrases using Accessibility Logger.<br>* ⚠️ Bypasses Android 13 security and Play Protect.<br>* 🤖 Employs 23 bot commands, including call forwarding and RAT functionality.<br>* 📵 Hides activities with black screen overlays and muting.</p><p>💻 Microsoft's Quick Machine Recovery Tool: Microsoft is testing a new tool for Windows 11 that could be a game-changer for dealing with boot crashes caused by buggy drivers and configurations. Imagine remotely fixing those dreaded BSODs! 🚀</p><p>✨ Here's the lowdown:<br>* ⚙️ Remotely fixes boot crashes caused by bad drivers/configs.<br>* 🌐 Connects to Microsoft's servers to apply fixes.<br>* 🛡️ Could have made life much easier when recovering from the worldwide CrowdStrike outage from July last year.<br>* 🏢 Customizable for enterprise users via RemoteRemedation CSP.</p><p>Don't forget to sign up for Opalsec to get actionable insights delivered straight to your inbox! 📩 <a href="https://opalsec.io/daily-news-update-sunday-march-31-2025-australia-melbourne/#/portal/signup" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.io/daily-news-update-s</span><span class="invisible">unday-march-31-2025-australia-melbourne/#/portal/signup</span></a></p><p>Let me know your thoughts in the comments below! 👇</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/AndroidMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AndroidMalware</span></a> <a href="https://infosec.exchange/tags/Crocodilus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Crocodilus</span></a> <a href="https://infosec.exchange/tags/CryptoSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CryptoSecurity</span></a> <a href="https://infosec.exchange/tags/Windows11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows11</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/QuickMachineRecovery" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuickMachineRecovery</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://infosec.exchange/tags/SecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityNews</span></a> <a href="https://infosec.exchange/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileSecurity</span></a> <a href="https://infosec.exchange/tags/DataProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataProtection</span></a> <a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a></p>
Tedi Heriyanto<p>Hunting ClickFix Initial Access Techniques: <a href="https://detect.fyi/hunting-clickfix-initial-access-techniques-8c1b38d5ef9b" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">detect.fyi/hunting-clickfix-in</span><span class="invisible">itial-access-techniques-8c1b38d5ef9b</span></a></p><p><a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threathunting</span></a> <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/detectionengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>detectionengineering</span></a></p>
Ankit Bytecode<p>In this video, a student from Craw Security discusses how the Six Month Diploma in Information Security Course enabled him to launch a fulfilling career in the field of cyber security.</p><p>Want to become a cyber security expert? Enroll now - </p><p>Visit: <a href="https://www.craw.in/learn-information-security-6-month-diploma-training-program-in-delhi" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">craw.in/learn-information-secu</span><span class="invisible">rity-6-month-diploma-training-program-in-delhi</span></a><br>Call: +91-9513805401<br>.<br>.<br><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.social/tags/penetrationtesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>penetrationtesting</span></a> <a href="https://mastodon.social/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> <a href="https://mastodon.social/tags/pythonprogramming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pythonprogramming</span></a> <a href="https://mastodon.social/tags/ethicalhackingindelhi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhackingindelhi</span></a> <a href="https://mastodon.social/tags/studentreview" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>studentreview</span></a> <a href="https://mastodon.social/tags/students" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>students</span></a> <a href="https://mastodon.social/tags/cybersecuritydiploma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecuritydiploma</span></a> <a href="https://mastodon.social/tags/CrawSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrawSec</span></a> <a href="https://mastodon.social/tags/CrawSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CrawSecurity</span></a> <a href="https://mastodon.social/tags/LifeatCraw" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LifeatCraw</span></a> <a href="https://mastodon.social/tags/Craw" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Craw</span></a></p>
Brian Greenberg<p>🧬 Malware Is Evolving — And So Are the Languages It’s Written In — A new study highlights a growing tactic among malware developers: coding in uncommon languages to evade detection.</p><p>🔍 Key takeaways:<br>🔹 Obscure languages like Lisp, Rust, Haskell, Delphi, and Phix are harder for static analysis tools to parse.<br>🔹 These languages often produce fragmented memory layouts and more indirect execution paths, complicating reverse engineering.<br>🔹 Even the choice of compiler — like Tiny C or Embarcadero Delphi — impacts how easily malware can be flagged.<br>🔹 APTs (Advanced Persistent Threats) are increasingly adopting these strategies to fly under the radar.</p><p>💬 Security teams must broaden their detection capabilities and adapt tooling for these underrepresented programming environments.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Programming</span></a> <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> </p><p><a href="https://www.theregister.com/2025/03/29/malware_obscure_languages/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/29/mal</span><span class="invisible">ware_obscure_languages/</span></a></p>
Christoffer S.<p>(cyfirma.com) Konni RAT Analysis: Multi-Stage Attack Process and Evasion Techniques <a href="https://www.cyfirma.com/research/analysis-of-konni-rat-stealth-persistence-and-anti-analysis-techniques/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cyfirma.com/research/analysis-</span><span class="invisible">of-konni-rat-stealth-persistence-and-anti-analysis-techniques/</span></a></p><p>Executive Summary:<br>This report provides a comprehensive analysis of Konni RAT, a sophisticated remote access Trojan linked to North Korean cyber espionage group APT37. The malware employs a multi-stage attack process involving batch files, PowerShell scripts, and VBScript to exfiltrate sensitive data and maintain persistence. The attack begins with a zip archive containing a malicious LNK file disguised as a document. The malware exploits Windows Explorer limitations to hide malicious commands and uses obfuscation techniques to evade detection. Key capabilities include data exfiltration from user directories, system information gathering, persistence through registry modifications, and communication with command-and-control servers. The report includes detailed technical analysis of the attack stages, from initial infection to data exfiltration, along with indicators of compromise and YARA detection rules.</p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NorthKorea</span></a> <a href="https://swecyb.com/tags/APT37" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT37</span></a> <a href="https://swecyb.com/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://swecyb.com/tags/Reversing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Reversing</span></a></p>
Pyrzout :vm:<p>Top 3 Cyber Attacks In March 2025 <a href="https://cybersecuritynews.com/top-3-cyber-attacks-in-march-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersecuritynews.com/top-3-cy</span><span class="invisible">ber-attacks-in-march-2025/</span></a> <a href="https://social.skynetcloud.site/tags/TodayCyberAttackNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TodayCyberAttackNews</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/CyberAttackToday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttackToday</span></a> <a href="https://social.skynetcloud.site/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://social.skynetcloud.site/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://social.skynetcloud.site/tags/ANY" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ANY</span></a>.RUN <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.skynetcloud.site/tags/whatis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whatis</span></a> <a href="https://social.skynetcloud.site/tags/Top10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Top10</span></a></p>
Sajid Nawaz Khan :donor:<p>For hobbyist Cobalt Strike Beacon collectors, note that the recently announced 4.11 update introduces a number of changes to frustrate Beacon configuration extraction, namely through the new `transform-obfuscate` field.</p><p>When set, this field can apply multiple layers of encoding, encryption and compression (with some recent Beacons observed with a 32 byte XOR key, configurable upto 2048 bytes!).</p><p>While still reasonably trivial to decode manually, standard automated workflows (say, through the SentinelOne parser) will now fail, not least because of changes to the well-known field markers.</p><p>Beacons with these characteristics have thus far been observed with watermarks indicative of licensed instances, though I imagine it is only a matter of time before the 4.11 capabilities become accessible to all manner of miscreants.</p><p>A sample configuration, via a staged Beacon on 104.42.26[.]200 is attached, including the three distinct XOR keys used to decode it.</p><p><a href="https://www.cobaltstrike.com/blog/cobalt-strike-411-shh-beacon-is-sleeping" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cobaltstrike.com/blog/cobalt-s</span><span class="invisible">trike-411-shh-beacon-is-sleeping</span></a></p><p><a href="https://infosec.exchange/tags/cobaltstrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cobaltstrike</span></a> <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/forensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>forensics</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a></p>
Sam Bent<p>450+ remote access trojans in one place.<br>The Ultimate RAT Collection is a GitHub repo documenting two decades of malware history.<br>Security research goldmine, if you know what you’re looking at.<br><a href="https://doingfedtime.com/450-rats-free-ultimate-rat-collection/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">doingfedtime.com/450-rats-free</span><span class="invisible">-ultimate-rat-collection/</span></a><br><a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> <a href="https://mastodon.social/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a></p>
Red-Team News [AI]<p>RedLine Stealer malware continues to evolve, targeting browser credentials, crypto wallets, and VPNs. Learn how to detect and mitigate this persistent threat with the latest analysis. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://redteamnews.com/blue-team/malware-analysis/redline-stealer-malware-analyzing-the-persistent-data-theft-threat-targeting-credentials/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">redteamnews.com/blue-team/malw</span><span class="invisible">are-analysis/redline-stealer-malware-analyzing-the-persistent-data-theft-threat-targeting-credentials/</span></a></p>
Red-Team News [AI]<p>RedLine Stealer malware continues to evolve, targeting browser credentials, crypto wallets, and VPNs. New analysis reveals its infection methods and detection tips. Organizations should prioritize credential rotation and endpoint monitoring. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://redteamnews.com/blue-team/malware-analysis/redline-stealer-malware-analyzing-the-persistent-data-theft-threat-targeting-credentials/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">redteamnews.com/blue-team/malw</span><span class="invisible">are-analysis/redline-stealer-malware-analyzing-the-persistent-data-theft-threat-targeting-credentials/</span></a></p>
Red-Team News [AI]<p>New analysis reveals Conti ransomware variant Ransom.Win64.CONTI.AA still threatens Windows systems with hybrid encryption &amp; network propagation. Key detection methods and mitigation strategies for defenders. <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://redteamnews.com/blue-team/malware-analysis/ransom-win64-conti-aa-analyzing-the-persistent-conti-ransomware-threat/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">redteamnews.com/blue-team/malw</span><span class="invisible">are-analysis/ransom-win64-conti-aa-analyzing-the-persistent-conti-ransomware-threat/</span></a></p>
Red-Team News [AI]<p>New analysis: Ransom.MSIL.EGOGEN.THEBBBC is a low-profile but persistent ransomware. It disables Task Manager, avoids VMs, and selectively encrypts files. Key IoCs and YARA rules for detection included. <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://redteamnews.com/blue-team/malware-analysis/ransom-msil-egogen-thebbbc-analyzing-a-low-risk-but-persistent-ransomware-threat/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">redteamnews.com/blue-team/malw</span><span class="invisible">are-analysis/ransom-msil-egogen-thebbbc-analyzing-a-low-risk-but-persistent-ransomware-threat/</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>FLARE's FLOSS is a tool that extracts strings from malware, even if they're obfuscated. Unlike standard tools, FLOSS uses emulation and decoding techniques to identify hidden strings, making it invaluable for reverse engineers. It bridges gaps where simple static analysis falls short. <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reversing</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/fireeye/flare-floss" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/fireeye/flare-floss</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
LavX News<p>DollyWay Malware Campaign Breaches 20,000 WordPress Sites: A Deep Dive into Cybersecurity Threats</p><p>The DollyWay malware campaign has compromised over 20,000 WordPress sites, evolving into a sophisticated redirection system that poses significant risks to both users and site administrators. As cyber...</p><p><a href="https://news.lavx.hu/article/dollyway-malware-campaign-breaches-20000-wordpress-sites-a-deep-dive-into-cybersecurity-threats" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/dollyway-</span><span class="invisible">malware-campaign-breaches-20000-wordpress-sites-a-deep-dive-into-cybersecurity-threats</span></a></p><p><a href="https://mastodon.cloud/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://mastodon.cloud/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://mastodon.cloud/tags/CyberThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreats</span></a> <a href="https://mastodon.cloud/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://mastodon.cloud/tags/WordPressSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WordPressSecurity</span></a></p>
malwr4n6<p>Unlock the power of Mac Evaluation Tool for macOS DFIR and Malware Analysis 🚀 Discover valuable insights and accelerate your investigations! Learn more at <a href="https://www.malwr4n6.com/post/mac-evaluation-tool-for-macos-dfir" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malwr4n6.com/post/mac-evaluati</span><span class="invisible">on-tool-for-macos-dfir</span></a> <br><a href="https://mastodon.social/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://mastodon.social/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/macos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macos</span></a> <a href="https://mastodon.social/tags/apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apple</span></a> <a href="https://mastodon.social/tags/digitalforenics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitalforenics</span></a> <a href="https://mastodon.social/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentresponse</span></a></p>
Tedi Heriyanto<p>Introduction to YARA: <a href="https://blog.ecapuano.com/p/introduction-to-yara" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.ecapuano.com/p/introducti</span><span class="invisible">on-to-yara</span></a></p><p><a href="https://infosec.exchange/tags/yara" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yara</span></a> <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threathunting</span></a></p>
Baker Street Forensics<p><strong>MalChela Updates: New Features and&nbsp;Enhancements</strong></p><p>It’s been just over a week since <strong><a href="https://github.com/dwmetz/MalChela" rel="nofollow noopener" target="_blank">MalChela</a></strong> was initially released and already here have been a number of updates.</p><p><strong>mStrings</strong></p><p>In the previous post, I walked through the new <a href="https://bakerstreetforensics.com/2025/03/09/mstrings-a-practical-approach-to-malware-string-analysis/" rel="nofollow noopener" target="_blank">mStrings</a> function. I think this is one of my favorites so far. It extracts strings from a file and uses Sigma rules defined in YAML against the strings to evaluate threats and align results to the MITRE ATT&amp;CK framework.</p><p>For fun I pointed it at an old WannaCry sample . I had a proud papa moment at the positive network IOC detection. </p><p><strong>Check for Updates</strong></p><p>Next came a function to automatically check the GitHub repo for updates and encourage a git pull to grab the latest… because apparently I can’t stop myself and this project will just keep growing, as my sleep keeps dwindling. Personally I found it ironic that you have to update in order to get the update telling you that updates are available… but it will work for all future updates as they come. So go ahead and update why don’t you.</p><em>Screenshot of MalChela indicating an update is available via git.</em><p><strong>New File Analyzer module</strong></p><p>Most recently a File Analyzer module has been added. Give it the path to your suspect file and it will return back:</p><ul><li>SHA-256 Hash</li><li>Entropy (&lt;7.5=high)</li><li>A RegEx detection for packing (mileage may vary)</li><li>PE Header info if it’s a PE</li><li>File Metadata</li><li>Yara Matches (any rules in yara_rules folder in workspace)</li><li>If there’s a positive match for the hash on VirusTotal (leverages the same key as previously in MalChela with the Virus Total / Malware Bazaar lookup)</li></ul><p>Lastly, you’re given the option of whether or not you want to run strings on the file, or return to the main menu.</p><p>I really like the idea of using this as a possible first step in static analysis. Run this first and opt for <strong>strings</strong>. Things look interesting there, throw it into <strong>mStrings</strong>. Positive match on VirusTotal – use the <strong>malware hash lookup</strong> and get a more detailed analysis. Use the results from mStrings to <strong>craft a YARA rule </strong>and add it to your repo for future detections. </p> <p><a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/dfir/" target="_blank">#DFIR</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/entropy/" target="_blank">#Entropy</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/hash/" target="_blank">#Hash</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/malware/" target="_blank">#Malware</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/malware-analysis/" target="_blank">#MalwareAnalysis</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/pe/" target="_blank">#PE</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/rust/" target="_blank">#Rust</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/virustotal/" target="_blank">#VirusTotal</a> <a rel="nofollow noopener" class="hashtag u-tag u-category" href="https://bakerstreetforensics.com/tag/yara/" target="_blank">#yara</a></p>
The DefendOps Diaries<p>MassJacker Malware: A Sophisticated Threat to Cryptocurrency Security</p><p><a href="https://thedefendopsdiaries.com/massjacker-malware-a-sophisticated-threat-to-cryptocurrency-security/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/massja</span><span class="invisible">cker-malware-a-sophisticated-threat-to-cryptocurrency-security/</span></a></p><p><a href="https://infosec.exchange/tags/massjacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>massjacker</span></a><br><a href="https://infosec.exchange/tags/cryptocurrencytheft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptocurrencytheft</span></a><br><a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a><br><a href="https://infosec.exchange/tags/clipboardhijacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>clipboardhijacking</span></a></p>
Gregg Jaskiewicz<p>it's not smart to leave symbols in your binaries. Especially if you want to keep others from changing them. <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a></p>
malwr4n6<p>🔍 Understanding <a href="https://mastodon.social/tags/macos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macos</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> is crucial for any professional today.</p><p>Check out my in-depth guide on analyzing PKG files to enhance your skills in macOS <a href="https://mastodon.social/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> Analysis:&nbsp;<a href="https://www.malwr4n6.com/post/macos-malware-analysis-pkg-files" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malwr4n6.com/post/macos-malwar</span><span class="invisible">e-analysis-pkg-files</span></a></p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@blacktop" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>blacktop</span></a></span> </p><p><a href="https://mastodon.social/tags/macosx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macosx</span></a> <a href="https://mastodon.social/tags/macosmalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macosmalware</span></a> <a href="https://mastodon.social/tags/apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apple</span></a> <a href="https://mastodon.social/tags/macmalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macmalware</span></a> <a href="https://mastodon.social/tags/guide" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guide</span></a> <a href="https://mastodon.social/tags/dfir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dfir</span></a></p>