mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

595
comptes actifs

#darkgate

0 message0 participant0 message aujourd’hui
ESET Research<p><a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ClickFix</span></a> went from virtually non-existent to the second most common attack vector blocked by <a href="https://infosec.exchange/tags/ESET" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESET</span></a>, surpassed only by <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a>. This novel social engineering technique accounted for nearly 8% of all detections in H1 2025. <a href="https://infosec.exchange/tags/ESETresearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESETresearch</span></a><br>ClickFix lures users by displaying bogus error messages followed by quick fix instructions, including copy-pasting malicious code. Running the code in the victim’s command line interpreter delivers malware such as <a href="https://infosec.exchange/tags/RATs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RATs</span></a>, infostealers, and cryptominers.<br>Between H2 2024 and H1 2025, ESET’s detection for ClickFix, HTML/FakeCaptcha, skyrocketed by 517%. Most detections in ESET telemetry were reported from Japan (23%), Peru (6%), and Poland, Spain, and Slovakia (&gt;5% each).<br>What makes <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ClickFix</span></a> so effective? The fake error message looks convincing; instructions are simple, yet the copied command is too technical for most users to understand. Pasting it into cmd leads to compromise with final payloads, including <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkGate</span></a> or <a href="https://infosec.exchange/tags/LummaStealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LummaStealer</span></a>. <br>While <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ClickFix</span></a> was introduced by cybercriminals, it’s since been adopted by APT groups: Kimsuky, Lazarus; Callisto, Sednit; MuddyWater; APT36. NK-aligned actors used it to target developers, steal crypto and passwords from Metamask and <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> Keychain. <br><a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ClickFix</span></a> uses psychological manipulation by presenting fake issues and offering quick solutions, which makes it dangerously efficient. It appears in many forms – error popups, email attachments, fake reCAPTCHAs – highlighting the need for greater vigilance online.<br>Read more in the <a href="https://infosec.exchange/tags/ESETThreatReport" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ESETThreatReport</span></a>:<br>🔗 <a href="https://welivesecurity.com/en/eset-research/eset-threat-report-h1-2025" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">welivesecurity.com/en/eset-res</span><span class="invisible">earch/eset-threat-report-h1-2025</span></a></p>
Redhotcyber<p>DarkGate: Il Malware che si Adatta per Sconfiggere i Sistemi di Sicurezza</p><p>Il <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://mastodon.bida.im/tags/DarkGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkGate</span></a>, distribuito utilizzando il <a href="https://mastodon.bida.im/tags/modello" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>modello</span></a> <a href="https://mastodon.bida.im/tags/MaaS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MaaS</span></a> (Malware-as-a-Service), ha cambiato il metodo di erogazione delle fasi finali, passando dagli script <a href="https://mastodon.bida.im/tags/AutoIt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AutoIt</span></a> al meccanismo <a href="https://mastodon.bida.im/tags/AutoHotkey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AutoHotkey</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>innovation</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://mastodon.bida.im/tags/engineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>engineering</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/darkgate-il-malware-che-si-adatta-per-sconfiggere-i-sistemi-di-sicurezza/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/darkgate-</span><span class="invisible">il-malware-che-si-adatta-per-sconfiggere-i-sistemi-di-sicurezza/</span></a></p>
Brad<p>From a social media post I wrote for my employer at ttps://www.linkedin.com/posts/unit42_darkgate-timelythreatintel-unit42threatintel-activity-7196580114761928704-Nblk/<br>and <a href="https://twitter.com/Unit42_Intel/status/1790814496845394110" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/Unit42_Intel/statu</span><span class="invisible">s/1790814496845394110</span></a></p><p>2024-05-14 (Tuesday): <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkGate</span></a> activity. HTML file asks victim to paste script into a run window. Indicators available at <a href="https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2024-05-14-IOCs-for-DarkGate-activity.txt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/PaloAltoNetworks/Un</span><span class="invisible">it42-timely-threat-intel/blob/main/2024-05-14-IOCs-for-DarkGate-activity.txt</span></a></p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pcap</span></a> of the <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkGate</span></a> infection traffic and the associated malware/artifacts are available at <a href="https://malware-traffic-analysis.net/2024/05/14/index.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">024/05/14/index.html</span></a></p>
Redhotcyber<p>DarkGate: il malware che sfrutta gli 0day di Windows e amplia la sua diffusione con Google ADS</p><p>A metà gennaio, i <a href="https://mastodon.bida.im/tags/ricercatori" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ricercatori</span></a> di sicurezza di TrendMicro hanno notato una nuova campagna su larga scala per distribuire il <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://mastodon.bida.im/tags/DarkGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkGate</span></a>. Tale <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> sfruttando una <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilità</span></a> di sicurezza recentemente corretta in <a href="https://mastodon.bida.im/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.bida.im/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a>, ancor prima che fosse patchata.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/darkgate-il-malware-che-sfrutta-gli-0day-di-windows-e-amplia-la-sua-diffusione-con-google-ads/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/darkgate-</span><span class="invisible">il-malware-che-sfrutta-gli-0day-di-windows-e-amplia-la-sua-diffusione-con-google-ads/</span></a></p>
ricardo :mastodon:<p>Hackers exploit <a href="https://fosstodon.org/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> SmartScreen flaw to drop <a href="https://fosstodon.org/tags/DarkGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkGate</span></a> malware ⚠️ </p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-windows-smartscreen-flaw-to-drop-darkgate-malware/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hackers-exploit-windows-smartscreen-flaw-to-drop-darkgate-malware/</span></a></p>
Brad<p>Social media post I wrote for my employer, available at <a href="https://www.linkedin.com/posts/unit42_darkgate-unit42threatintel-timelythreatintel-activity-7156413691289116672-W3GG" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/posts/unit42_dark</span><span class="invisible">gate-unit42threatintel-timelythreatintel-activity-7156413691289116672-W3GG</span></a> and <a href="https://twitter.com/Unit42_Intel/status/1750648073603125757" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/Unit42_Intel/statu</span><span class="invisible">s/1750648073603125757</span></a></p><p>2024-01-25 (Thursday): <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkGate</span></a> active again this week. IOCs from an infection run earlier today are available at <a href="https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2024-01-25-IOCs-for-DarkGate-activity.txt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/PaloAltoNetworks/Un</span><span class="invisible">it42-timely-threat-intel/blob/main/2024-01-25-IOCs-for-DarkGate-activity.txt</span></a></p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pcap</span></a> of the infection traffic, along with the associated malware and artifacts from a <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkGate</span></a> infection are available at <a href="https://www.malware-traffic-analysis.net/2024/01/25/index.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">024/01/25/index.html</span></a></p>
Valéry Rieß-Marchive :verified:<p>🚨 Attention aux menaces en ligne ! DarkGate, un malware polyvalent découvert en 2018, se propage via des fichiers torrent et échappe à la détection antivirus, capable de miner des cryptomonnaies, voler des données et contrôler à distance les postes de travail. 🕵️‍♂️ Avec des techniques de distribution en constante évolution, allant de l'hameçonnage aux fausses mises à jour, DarkGate se révèle être un outil de choix pour les cybercriminels, proposé même en tant que service sur des forums clandestins. 🛡️ Restez vigilants et informés pour protéger vos données et systèmes. <a href="https://infosec.exchange/tags/Cybers%C3%A9curit%C3%A9" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersécurité</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkGate</span></a><br><a href="https://www.lemagit.fr/conseil/DarkGate-ce-quil-faut-savoir-sur-ce-maliciel" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lemagit.fr/conseil/DarkGate-ce</span><span class="invisible">-quil-faut-savoir-sur-ce-maliciel</span></a></p>
Selena Larson<p>We just published details on a new&nbsp; activity cluster we are temporarily calling <a href="https://mastodon.social/tags/BattleRoyal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BattleRoyal</span></a>. It started distributing <a href="https://mastodon.social/tags/DarkGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkGate</span></a> using distinct GroupIDs from Sept - Nov, then switched to <a href="https://mastodon.social/tags/NetSupport" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetSupport</span></a>. Delivery methods include email and fake update lures <a href="https://www.proofpoint.com/us/blog/threat-insight/battleroyal-darkgate-cluster-spreads-email-and-fake-browser-updates" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">proofpoint.com/us/blog/threat-</span><span class="invisible">insight/battleroyal-darkgate-cluster-spreads-email-and-fake-browser-updates</span></a></p>
Sekoia.io<p><a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkGate</span></a> gained popularity among threat actors (e.g: <a href="https://infosec.exchange/tags/TA577" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TA577</span></a>, <a href="https://infosec.exchange/tags/DuckTail" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DuckTail</span></a>), our <a href="https://infosec.exchange/tags/RE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RE</span></a> analysis details the internals of the malware, how it implements technique to evade defenses: Union-API, token theft via UpdateProcThreadAttribute, APC injection.</p><p><a href="https://blog.sekoia.io/darkgate-internals/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.sekoia.io/darkgate-intern</span><span class="invisible">als/</span></a></p>
Brad<p>Post I wrote for my employer at <a href="https://www.linkedin.com/posts/unit42_darkgate-timelythreatintel-wireshark-activity-7123453508560797697--dJn" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/posts/unit42_dark</span><span class="invisible">gate-timelythreatintel-wireshark-activity-7123453508560797697--dJn</span></a> and <br><a href="https://twitter.com/Unit42_Intel/status/1717687387025809465" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/Unit42_Intel/statu</span><span class="invisible">s/1717687387025809465</span></a></p><p>2023-10-25 (Wednesday): <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkGate</span></a> malware distributed through fake invoice/billing emails with PDF attachments that spoof DocuSign.</p><p>As early as last week, these DarkGate loaders stopped retrieving a copy of Autoit3.exe and the .au3 file from the C2 server. Now, the copy of Autoit3.exe and the .au3 file is contained within a zip-ed .msi file that's hosted on a separate server.</p><p>The loader for DarkGate now grabs that .msi file instead.</p><p>We'll see how long that lasts.</p><p>Indicators from an infection run are available at <a href="https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2023-10-25-IOCs-from-DarkGate-activity.txt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/PaloAltoNetworks/Un</span><span class="invisible">it42-timely-threat-intel/blob/main/2023-10-25-IOCs-from-DarkGate-activity.txt</span></a></p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pcap</span></a> of the infection traffic, along with the associated malware/artifacts are now available at <a href="https://malware-traffic-analysis.net/2023/10/25/index.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">023/10/25/index.html</span></a></p>
crep1x<p>Fake sites impersonating Zoom download page distributes <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkGate</span></a> Loader:<br>zoomadvertisingofferr.]com<br>zoomadvertisingooffer.]com</p><p>DarkGate C2: 81.19.135.]17 (likely <a href="https://infosec.exchange/tags/TA577" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TA577</span></a> payload, A1111 botnet)</p><p>hxxps://zoomadvertisingofferr.]com/ZoomInstaller.msi</p><p><a href="https://tria.ge/231021-dsawbaec67" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">tria.ge/231021-dsawbaec67</span><span class="invisible"></span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>📨 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> list of resources for week #42/2023 is out! It includes the following and much more:</p><p>➝ 🔓 👀 Tracking Unauthorized Access to <a href="https://infosec.exchange/tags/Okta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Okta</span></a>'s Support System<br>➝ 🔓 🇯🇵 <a href="https://infosec.exchange/tags/Casio" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Casio</span></a> discloses <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> impacting customers in 149 countries<br>➝ 🔓 🧬 Hacker leaks millions more <a href="https://infosec.exchange/tags/23andMe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>23andMe</span></a> user records on <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> forum<br>➝ 🔓 🇨🇳 D-Link confirms data breach after employee <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> attack<br>➝ 🔓 💰 <a href="https://infosec.exchange/tags/Equifax" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Equifax</span></a> Fined $13.5 Million Over 2017 Data Breach<br>➝ 🇺🇦 🧹 Ukrainian activists hack Trigona <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> gang, wipe servers<br>➝ 🇺🇸 🇰🇵 FBI: Thousands of Remote IT Workers Sent Wages to <a href="https://infosec.exchange/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKorea</span></a> to Help Fund Weapons Program<br>➝ 🇮🇳 ☁️ <a href="https://infosec.exchange/tags/India" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>India</span></a> targets <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a>, <a href="https://infosec.exchange/tags/Amazon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Amazon</span></a> tech support <a href="https://infosec.exchange/tags/scammers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scammers</span></a> in nationwide crackdown<br>➝ 🇵🇸 🇮🇷 <a href="https://infosec.exchange/tags/Hamas" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hamas</span></a>-linked app offers window into cyber infrastructure, possible links to Iran<br>➝ 👮🏻‍♂️ 🥷🏻 Police seize <a href="https://infosec.exchange/tags/RagnarLocker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RagnarLocker</span></a> leak site<br>➝ 🇰🇵 North Korean Hackers Exploiting Recent <a href="https://infosec.exchange/tags/TeamCity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TeamCity</span></a> Vulnerability<br>➝ 🇨🇳 🇷🇺 <a href="https://infosec.exchange/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> replaces <a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> as top <a href="https://infosec.exchange/tags/cyberthreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberthreat</span></a><br>➝ 🇺🇦 📡 CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks<br>➝ 🇫🇷 🇪🇸 <a href="https://infosec.exchange/tags/France" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>France</span></a> frees the two biggest Spanish hackers<br>➝ 🇺🇸 ⚓️ Ex-Navy IT head gets 5 years for selling people’s data on <a href="https://infosec.exchange/tags/darkweb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>darkweb</span></a><br>➝ 🇨🇭 🗳️ <a href="https://infosec.exchange/tags/Switzerland" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Switzerland</span></a>’s e-voting system has predictable implementation blunder<br>➝ 🔓 🏭 Critical Vulnerabilities Expose ​​<a href="https://infosec.exchange/tags/Weintek" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Weintek</span></a> HMIs to Attacks<br>➝ 🔓 🏭 <a href="https://infosec.exchange/tags/Milesight" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Milesight</span></a> Industrial Router <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> Possibly Exploited in Attacks<br>➝ 🦠 🇻🇳 Fake <a href="https://infosec.exchange/tags/Corsair" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Corsair</span></a> job offers on <a href="https://infosec.exchange/tags/LinkedIn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LinkedIn</span></a> push <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkGate</span></a> malware<br>➝ 🦠 Google-hosted <a href="https://infosec.exchange/tags/malvertising" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malvertising</span></a> leads to fake <a href="https://infosec.exchange/tags/Keepass" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keepass</span></a> site that looks genuine<br>➝ 🦠 💬 <a href="https://infosec.exchange/tags/Discord" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Discord</span></a> still a hotbed of <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> activity — Now APTs join the fun<br>➝ 🦠 🕵🏻‍♂️ SpyNote: Beware of This Android <a href="https://infosec.exchange/tags/Trojan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trojan</span></a> that Records Audio and Phone Calls<br>➝ 🛍️ 🦠 <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> will now scan sideloaded apps for malware at install time<br>➝ 💬 🔐 <a href="https://infosec.exchange/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> <a href="https://infosec.exchange/tags/passkeys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passkeys</span></a> on the way, but as usual, for Android first<br>➝ 🇷🇺 🗂️ Pro-Russian Hackers Exploiting Recent <a href="https://infosec.exchange/tags/WinRAR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WinRAR</span></a> Vulnerability in New Campaign<br>➝ 🗓️ ❌ Signal Pours Cold Water on Zero-Day Exploit Rumors<br>➝ 🔓 💥 <a href="https://infosec.exchange/tags/Cisco" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cisco</span></a> warns of new <a href="https://infosec.exchange/tags/IOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOS</span></a> XE <a href="https://infosec.exchange/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a> actively exploited in attacks</p><p>📚 This week's recommended reading is: "RTFM: Red Team Field Manual v2" by Ben Clark and Nicholas Downer</p><p>Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-week-422023" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/infosec-mashup-week-422023</span></a></p>
John Leonard<p>Vietnamese hackers attack UK, US and Indian targets with DarkGate malware</p><p>Victims lured to download infected documents offering job descriptions and salary details </p><p><a href="https://www.computing.co.uk/news/4137089/vietnamese-hackers-attack-uk-us-india-darkgate-malware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">computing.co.uk/news/4137089/v</span><span class="invisible">ietnamese-hackers-attack-uk-us-india-darkgate-malware</span></a></p><p><a href="https://mastodon.social/tags/technews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technews</span></a> <a href="https://mastodon.social/tags/technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>technology</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/darkgate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>darkgate</span></a></p>