Evolution of UNC4990: Uncovering USB Malware's Hidden Depths | Mandiant

Threat Reports
Stately Taurus Targets Myanmar Amidst Concerns over Military Junta’s Handling of Rebel Attacks – CSIRT-CTI
The Endless Struggle Against APT10: Insights from LODEINFO v0.6.6 - v0.7.3 Analysis - Researcher Blog - ITOCHU Cyber & Intelligence Inc.
What is the LODEINFO malware? Analysis of LODEINFO The infection flow Update of the Downloader Shellcode Remote Template Injection Maldoc VBA code embedded in M…
Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware
Threat Analysis Group sheds light on Russian threat COLDRIVER’s use of malware.
New TTPs observed in Mint Sandstorm campaign targeting high-profile individuals at universities and research orgs | Microsoft Security Blog
Since November 2023, Microsoft has observed a distinct subset of Mint Sandstorm (PHOSPHORUS) targeting high-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel, the United Kingdom, and the United States. In this campaign, the threat actor used bespoke phishing lures in an attempt to socially engineer targets into downloading malicious files.
Bert-JanP/Open-Source-Threat-Intel-Feeds: This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple types such as IP, URL, CVE and Hash.
This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple types such as IP, URL, CVE and Hash. - GitHub - Bert-JanP/O...
A Requirements-Driven Approach to Cyber Threat Intelligence
A requirements-driven approach to cyber threat intelligence represents a commitment across the
intelligence lifecycle to explicitly meet the specified needs of all relevant stakeholders.
signalscorps/awesome-threat-intel-blogs
A curated list of Awesome Threat Intelligence Blogs.
From ScreenConnect to Hive Ransomware in 61 hours - The DFIR Report
In 2022, The DFIR Report observed an increase in the adversarial usage of Remote Management and Monitoring (RMM) tools. When compared to post-exploitation channels that heavily rely on terminals, such … Read More
SharpPanda APT Campaign Expands its Arsenal Targeting G20 Nations
Cyble analyzes SharpPanda, a highly sophisticated APT group utilizing spear-phishing tactics to launch cyberattacks on G20 Nation officials.
Alloy taurus
Educated Manticore - Iran Aligned Threat Actor Targeting Israel via Improved Arsenal of Tools - Check Point Research
Key Findings: Introduction In this report, Check Point research reveals new findings of an activity cluster closely related to Phosphorus. The research presents a new and improved infection chain leading to the deployment of a new version of PowerLess. This implant was attributed to Phosphorus in the past, an Iran-affiliated threat group operating in the Middle East […]
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack | WeLiveSecurity
Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the 3CX attack was carried out by Lazarus.
3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible | Mandiant
null
Invitation to a Secret Event: Uncovering Earth Yako’s Campaigns
We detail the intrusion set Earth Yako, attributed to the campaign Operation RestyLink or EneLink. This analysis was presented in full at the JSAC 2023 in January 2023.
Pupy RAT hiding under WerFault’s cover - K7 Labs
We at K7 Labs recently identified an interesting technique used by threat actors to execute a Remote Admin Tool. We […]
Heads up! Xdr33, A Variant Of CIA’s HIVE Attack Kit Emerges
Overview On Oct 21, 2022, 360Netlab's honeypot system captured a suspicious ELF file ee07a74d12c0bb3594965b51d0e45b6f, which propagated via F5 vulnerability with zero VT detection, our system observces that it communicates with IP 45.9.150.144 using SSL with forged Kaspersky certificates, this caught our attention. After further lookup, we confirmed
Blowing Cobalt Strike Out of the Water With Memory Analysis
Earth Preta Spear-Phishing Governments Worldwide
APT27 - One Year To Exfiltrate Them All: Intrusion In-Depth Analysis -
Data leak : In-depth forensic & threat intelligence analysis of the tactics, tools & procedures of an advanced and persistant attack, by the Intrinsec CERT.
New updated IceXLoader claims thousands of victims around the world - Minerva Labs
This commercial malware is used to download and deploy additional malware and ransomware on infected machines. We analyzed the latest version
Vulners - Vulnerability DataBase
ORKL
ORKL Threat Intelligence Library
Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium | WeLiveSecurity
ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers.
Dashboard · The Shadowserver Foundation
Alchimist: A new attack framework in Chinese for Mac, Linux and Windows
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors
Attackers target Ukraine using GoMet backdoor
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
APT40: Examining a China-Nexus Espionage Actor | Mandiant
Lebanese Cedar APT: Global Lebanese Espionage Campaign Leveraging Web Servers