This file leaked an Security Enterprise Virustotal API Key before!But now it's expired because someone leaked the key😅
ITW:07c4a75b1422a22ec29c5102e0b67055
API Key:d10468bead05da1685629a0abcfed5f963d6adbc7e6bb2b2fc343dbb36be0349
unbelievable!
We just published "Unveil the evolution of Kimsuky targeting Android devices with newly discovered mobile malware".
Three new malware family that targets Android have been discovered, #FastFire, #FastViewer, and #FastSpy respectively.
#Kimsukylink.medium.com/Ub47gwAXnub
DLL Injection seems to be the easy way to bypass EDR. I was able to bypass some well known EDR with it.
It can be used to perform the first process injection, and then perform standard self-injection to deliver the beacon to avoid unnecessary detection in the next stages.
We analyzed a recent version of an info-stealing Android malware, delivered via an ongoing SMS campaign and masquerading as bank rewards app, and found new RAT capabilities and more elaborate obfuscation, exemplifying increasingly complex mobile threats: microsoft.com/security/blog/…
#ESETresearch identified a new version of #Android malware named FurBall being used by the APT-C-50 group. FurBall is part of the group’s Domestic Kitten campaign, conducting mobile surveillance operations against Iranian citizens 🇮🇷. welivesecurity.com/2022/10/20/dom…@LukasStefanko 1/5
RE tip of the day: If you need to unpack ELF samples packed with UPX and corrupted afterwards, this great automation-friendly tool can fix the header so that standard "upx -d" can be used for unpacking: buff.ly/3rulAjr#infosec#cybersecurity#malware#reverseengineering
70 Followers 368 FollowingPh.D. student at UIUC | LLM Agent & Data-Driven Security | Former Intern @AmazonScience, @S2W_Official | KAIST alumni | Opinions are from my training data.
60K Followers 793 FollowingThreat intelligence platform - Data from Deep Web, Dark Web, Open Web || For data API integration : [email protected] Democratizing Cyber Security.
21K Followers 1 FollowingRME-DisCo research group from University of Zaragoza. Special interest on software and systems security. Link to our Telegram channel: https://t.co/UmkcXVG8MU
18K Followers 800 FollowingThreat Intelligence Analyst |
See my Linktree for other socials |
In case I post false intel, contact me!
Support me: https://t.co/5WgDqr0K8p
🇪🇺🇩🇪🇺🇦🌈
2K Followers 22 Followinghttps://t.co/rNQjyTW8J1 is an Intelligence-driven Threat Hunting Platform for the Security Analyst Community by @AvastThreatLabs
285K Followers 3K FollowingTechnology improves our lives and how business is done more than anyone might have imagined. When that technology enables progress, ESET is here to protect it.
1K Followers 1K Following🇺🇦Malware Researcher 🇺🇦
Tweets are my own and do not reflect my employer.
On Mastodon as @[email protected]
Creator of https://t.co/woQLhjSmV0
67K Followers 475 FollowingResources for Open Source Intelligence Investigations. Follow the Digital Bread Crumbs. #OSINT
Co-Founder, Forensic OSINT
[email protected]
3K Followers 317 FollowingMalware analyst and reverse engineer, author of the Binary Analysis Course. DMs are always open. Opinions are my own and not the views of my employer.
848 Followers 13 FollowingFollow us for the latest malware findings and research reports from PT ESC, the Positive Technologies (@ptsecurity) Threat Intelligence Team.