mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

596
comptes actifs

#FormBook

0 message0 participant0 message aujourd’hui
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>2025-02-26 (Wednesday): <a href="https://kolektiva.social/tags/XLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XLoader</span></a> (<a href="https://kolektiva.social/tags/Formbook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Formbook</span></a>) distributed through <a href="https://kolektiva.social/tags/malspam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malspam</span></a>. The email has an attached PDF document. The PDF has links for a ZIP download, and the ZIP contains files that use DLL side-loading for XLoader.</p><p><a href="https://bit.ly/4bgKRU8" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/4bgKRU8</span><span class="invisible"></span></a></p>
Funes<p>Found this user on the <span class="h-card" translate="no"><a href="https://mastodon.archive.org/@internetarchive" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>internetarchive</span></a></span> hosting images with embedded base64 encoded <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> between &lt;&lt;BASE64_START&gt;&gt; and &lt;&lt;BASE64_END&gt;&gt; flags. The malware is used to download an inject the next stage payload into another process. The campaign I observed involved <a href="https://infosec.exchange/tags/RemcosRAT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RemcosRAT</span></a> </p><p>User page: <a href="https://archive.org/details/@nodetectonn" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">archive.org/details/@nodetecto</span><span class="invisible">nn</span></a><br>Remcos: hxxps://petshopsirena[.]mk/a.txt<br><a href="https://infosec.exchange/tags/c2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>c2</span></a> : 45.95.169[.]135:2404</p><p>I found samples dropping others such as <a href="https://infosec.exchange/tags/agenttesla" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>agenttesla</span></a> and <a href="https://infosec.exchange/tags/formbook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>formbook</span></a> as well.</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
Infoblox Threat Intel<p>We just released a landscape review of Registered DGAs. We review the many ways threat actors are leveraging these algorithms -- including malware, phishing, scams, porns, you name it. Our RDGA detectors find tens of thousands of domains every day, and we've seen the use continue to rise over the last several years. Most folks aren't even aware since actors are doing this in DNS and it often isn't obvious. <a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/RDGA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RDGA</span></a> <a href="https://infosec.exchange/tags/DGA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DGA</span></a> <a href="https://infosec.exchange/tags/DDGA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDGA</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/scams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scams</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/infobloxthreatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infobloxthreatintel</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatactor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatactor</span></a> <a href="https://infosec.exchange/tags/c2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>c2</span></a> <a href="https://infosec.exchange/tags/revolverrabbit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>revolverrabbit</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/cyberintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberintelligence</span></a> <a href="https://infosec.exchange/tags/xloader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xloader</span></a> <a href="https://infosec.exchange/tags/formbook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>formbook</span></a> <a href="https://infosec.exchange/tags/abusedtld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>abusedtld</span></a> <a href="https://insights.infoblox.com/resources-research-report/infoblox-research-report-registered-dgas-the-prolific-new-menace-no-one-is-talking-about" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">insights.infoblox.com/resource</span><span class="invisible">s-research-report/infoblox-research-report-registered-dgas-the-prolific-new-menace-no-one-is-talking-about</span></a></p>
Brad<p>30 Days of <a href="https://infosec.exchange/tags/Formbook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Formbook</span></a>: Day 6, Saturday 2023-06-10 - "SN84" at <a href="https://malware-traffic-analysis.net/2023/06/10/index.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">023/06/10/index.html</span></a></p><p>Ran this infection on publicly-available WiFi while I ran my full-day <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pcap</span></a> analysis workshop at <a href="https://infosec.exchange/tags/BSidesSATX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSidesSATX</span></a>. Most, if not all, of the Formbook C2 was blocked from going out.</p>
Brad<p>30 Days of <a href="https://infosec.exchange/tags/Formbook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Formbook</span></a>: Day 5, Friday 2023-06-09 <a href="https://infosec.exchange/tags/GuLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GuLoader</span></a> for Formbook "V16R" at <a href="https://malware-traffic-analysis.net/2023/06/09/index.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">023/06/09/index.html</span></a></p><p>I've run across some GuLoader &amp; <a href="https://infosec.exchange/tags/DbatLoader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DbatLoader</span></a>/#ModiLoader samples pushing Formbook recently, and this is my first successful "GuFormbook" run since I started 30 days of Formbook.</p>
Brad<p>30 Days of <a href="https://infosec.exchange/tags/Formbook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Formbook</span></a>: Day 4, Thursday 2023-06-08 "T30K" at <a href="https://malware-traffic-analysis.net/2023/06/08/index.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">023/06/08/index.html</span></a></p><p>I can now confirm that Formbook steals login credentials from the Firefox web browser.</p><p>For browsers, it's Chrome, Firefox, and IE. But Formbook still does not steal from the current Chromium-based Microsoft Edge.</p><p>Here's a new advertising slogan for Edge: "Microsoft Edge: At least Formbook doesn't steal from it!"</p><p>You're welcome, Microsoft.</p>
Brad<p>This is what I think of <a href="https://infosec.exchange/tags/Formbook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Formbook</span></a> now...</p>
Brad<p>30 Days of <a href="https://infosec.exchange/tags/Formbook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Formbook</span></a>: Day 3, Wednesday 2023-06-07 "AE30" at <a href="https://malware-traffic-analysis.net/2023/06/07/index.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">023/06/07/index.html</span></a></p><p>3 of 30 days? I'm 10% done!</p><p>My findings so far:</p><p>It seems like Formbook doesn't steal login credentials from the current Chromium-based Microsoft Edge or Thunderbird.</p><p>But it -does- steal credentials from Google Chrome &amp; Outlook.</p><p>It still seems to still look for login credentials in Internet Explorer.</p><p>I'm basing this on artifacts from the directory that Formbook temporarily stores the screenshot of the desktop and any login credentials it steals. After it sends the info to the C2 server, Formbook deletes the files.</p><p>Today, I had Chrome installed and set up with some stored login credentials. I normally just use the current Chromium-based Edge for that, which was also present, but all those juicy login/password combos seem untouched by Formbook.</p><p>Nothing from Filezilla, either, in this case.</p><p>In this post, I've included a screenshot of my victim desktop that Formbook sent to its C2 server(s).</p><p>I'll keep mixing things up and trying other applications to see if there's anything else Formbook tries to steal from.</p><p>I mean, I know that Formbook is a sort of "bargain basement" MaaS-style malware, but come on! Not stealing from the current Microsoft Edge? I think Formbook's still stuck in the Windows 7 era.</p>
Brad<p>30 Days of <a href="https://infosec.exchange/tags/Formbook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Formbook</span></a>: Day 2, Tuesday 2023-06-06 - "CG62"</p><p>My current effort to generate a collection of <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pcap</span></a> files/IOCs from up-to-date Formbook samples I find on VirusTotal...</p><p>Today's post, number 2 of 30: <a href="https://malware-traffic-analysis.net/2023/06/06/index.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">023/06/06/index.html</span></a></p>
Brad<p>30 Days of <a href="https://infosec.exchange/tags/Formbook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Formbook</span></a>: Day 1, Monday 2023-06-05</p><p>I'm generating <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pcap</span></a> files/IOCs from up-to-date Formbook samples I find on VirusTotal.</p><p>It'll take longer than 30 calendar days, I'm sure, but I plan on doing 30 of these.</p><p>We'll see if the accumulated data is worth anything. At least, there will be 30 examples of Formbook infections where people can see the data exfiltration, even if you can't decode it (which I can't yet).</p><p>My first post: <a href="https://www.malware-traffic-analysis.net/2023/06/05/index.html" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">023/06/05/index.html</span></a></p>
Redhotcyber<p>L’infostealer FormBook viene diffuso attraverso le campagna di ADS di Google <br> <br>I <a href="https://mastodon.bida.im/tags/ricercatori" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ricercatori</span></a> di sicurezza <a href="https://mastodon.bida.im/tags/informatica" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informatica</span></a> di SentinelLabs riferiscono che una <a href="https://mastodon.bida.im/tags/campagna" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>campagna</span></a> in corso utilizza gli annunci <a href="https://mastodon.bida.im/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> per distribuire programmi di installazione di <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> che utilizzano la <a href="https://mastodon.bida.im/tags/tecnologia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tecnologia</span></a> di virtualizzazione <a href="https://mastodon.bida.im/tags/KoiVM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KoiVM</span></a> per evitare il rilevamento quando viene installato l’infostealer <a href="https://mastodon.bida.im/tags/FormBook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FormBook</span></a>. <br> <br>KoiVM è un plugin per la protezione <a href="https://mastodon.bida.im/tags/ConfuserEx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ConfuserEx</span></a> che offusca i codici operativi di un programma in modo che solo la macchina virtuale li capisca. <br> <br><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a> <br> <br><a href="https://www.redhotcyber.com/post/linfostealer-formbook-viene-diffuso-attraverso-le-campagna-di-ads-di-google/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/linfostea</span><span class="invisible">ler-formbook-viene-diffuso-attraverso-le-campagna-di-ads-di-google/</span></a></p>