Intel adds hardware-based ransomware detection to 11th gen CPUs
https://www.bleepingcomputer.com/news/security/intel-adds-hardware-based-ransomware-detection-to-11th-gen-cpus/
https://www.intel.com/content/dam/www/public/us/en/documents/solution-briefs/vpro-platform-proactive-device-protection-against-modern-threats-solution-brief.pdf
FADE DEAD | Adventures in Reversing Malicious Run-Only AppleScripts
https://labs.sentinelone.com/fade-dead-adventures-in-reversing-malicious-run-only-applescripts/
DarkSide ransomware decryptor recovers victims’ files for free
https://www.bleepingcomputer.com/news/security/darkside-ransomware-decryptor-recovers-victims-files-for-free/
https://labs.bitdefender.com/2021/01/darkside-ransomware-decryption-tool/
Breaking the Google Audio reCAPTCHA with Google’s own Speech to Text API
https://incolumitas.com/2021/01/02/breaking-audio-recaptcha-with-googles-own-speech-to-text-api/
Maybe we need to teach this to the customers that are having problems getting past the Avast captcha?
;D 8)
Asyn post:3272: Asyn post:3266: Asyn post:3261: Asyn post:3256: Asyn post:3253: Asyn post:3250: Asyn post:3248: Asyn post:3233:Unauthorized Access of FireEye Red Team Tools
https://www.fireeye.com/blog/threat-research/2020/12/unauthorized-access-of-fireeye-red-team-tools.html
https://github.com/fireeye/red_team_tool_countermeasuresHighly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.htmlMalicious Domain in SolarWinds Hack Turned into ‘Killswitch’
https://krebsonsecurity.com/2020/12/malicious-domain-in-solarwinds-hack-turned-into-killswitch/Dark Halo Leverages SolarWinds Compromise to Breach Organizations
https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/SUPERNOVA SolarWinds .NET Webshell Analysis
https://www.guidepointsecurity.com/supernova-solarwinds-net-webshell-analysis/
https://unit42.paloaltonetworks.com/solarstorm-supernova/A moment of reckoning: the need for a strong and global cybersecurity response
https://blogs.microsoft.com/on-the-issues/2020/12/17/cyberattacks-cybersecurity-solarwinds-fireeye/The SolarWinds Orion SUNBURST supply-chain Attack
https://blog.truesec.com/2020/12/17/the-solarwinds-orion-sunburst-supply-chain-attack/Microsoft Internal Solorigate Investigation Update
https://msrc-blog.microsoft.com/2020/12/31/microsoft-internal-solorigate-investigation-update/Sunburst backdoor – code overlaps with Kazuar
https://securelist.com/sunburst-backdoor-kazuar/99981/
SUNSPOT: An Implant in the Build Process
https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/
December 2020 Coordinated Inauthentic Behavior Report
https://about.fb.com/news/2021/01/december-2020-coordinated-inauthentic-behavior-report/
December 2020 Coordinated Inauthentic Behavior Report
https://about.fb.com/news/2021/01/december-2020-coordinated-inauthentic-behavior-report/
For a minute, I thought this was going to be about politics. ;D
Avast Hacker Archives Episode 1: Joe FitzPatrick
https://blog.avast.com/avast-hacker-archives-episode-1-joe-fitzpatrick-avast
Malwarebytes targeted by Nation State Actor implicated in SolarWinds breach. Evidence suggests abuse of privileged access to Microsoft Office 365 and Azure environments
https://blog.malwarebytes.com/malwarebytes-news/2021/01/malwarebytes-targeted-by-nation-state-actor-implicated-in-solarwinds-breach-evidence-suggests-abuse-of-privileged-access-to-microsoft-office-365-and-azure-environments/
Malwarebytes targeted by Nation State Actor implicated in SolarWinds breach. Evidence suggests abuse of privileged access to Microsoft Office 365 and Azure environments
https://blog.malwarebytes.com/malwarebytes-news/2021/01/malwarebytes-targeted-by-nation-state-actor-implicated-in-solarwinds-breach-evidence-suggests-abuse-of-privileged-access-to-microsoft-office-365-and-azure-environments/
According to Malwarebytes, “Our software remains safe to use.”
Introducing the In-the-Wild Series
https://googleprojectzero.blogspot.com/2021/01/introducing-in-wild-series.html
Classiscam expands to Europe: Russian-speaking scammers lure Europeans to pages mimicking classifieds
https://www.group-ib.com/media/classiscam-in-europe/
FreakOut – Leveraging Newest Vulnerabilities for creating a Botnet
https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/
The State of State Machines
https://googleprojectzero.blogspot.com/2021/01/the-state-of-state-machines.html
The State of State Machines
https://googleprojectzero.blogspot.com/2021/01/the-state-of-state-machines.html
All the discovered vulnerabilities have been fixed but this attack platforms needs constant scrutiny.
Asyn post:3280: Asyn post:3272: Asyn post:3266: Asyn post:3261: Asyn post:3256: Asyn post:3253: Asyn post:3250: Asyn post:3248: Asyn post:3233:Unauthorized Access of FireEye Red Team Tools
https://www.fireeye.com/blog/threat-research/2020/12/unauthorized-access-of-fireeye-red-team-tools.html
https://github.com/fireeye/red_team_tool_countermeasuresHighly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.htmlMalicious Domain in SolarWinds Hack Turned into ‘Killswitch’
https://krebsonsecurity.com/2020/12/malicious-domain-in-solarwinds-hack-turned-into-killswitch/Dark Halo Leverages SolarWinds Compromise to Breach Organizations
https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/SUPERNOVA SolarWinds .NET Webshell Analysis
https://www.guidepointsecurity.com/supernova-solarwinds-net-webshell-analysis/
https://unit42.paloaltonetworks.com/solarstorm-supernova/A moment of reckoning: the need for a strong and global cybersecurity response
https://blogs.microsoft.com/on-the-issues/2020/12/17/cyberattacks-cybersecurity-solarwinds-fireeye/The SolarWinds Orion SUNBURST supply-chain Attack
https://blog.truesec.com/2020/12/17/the-solarwinds-orion-sunburst-supply-chain-attack/Microsoft Internal Solorigate Investigation Update
https://msrc-blog.microsoft.com/2020/12/31/microsoft-internal-solorigate-investigation-update/Sunburst backdoor – code overlaps with Kazuar
https://securelist.com/sunburst-backdoor-kazuar/99981/SUNSPOT: An Implant in the Build Process
https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/
Raindrop: New Malware Discovered in SolarWinds Investigation
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/solarwinds-raindrop-malware
DNSpooq: Cache Poisoning and RCE in Popular DNS Forwarder dnsmasq
https://www.jsof-tech.com/disclosures/dnspooq/
https://www.jsof-tech.com/wp-content/uploads/2021/01/DNSpooq-Technical-WP.pdf
CVE-2020-9971 Abusing XPC Service mechanism to elevate privilege in macOS/iOS
https://xlab.tencent.com/en/2021/01/11/cve-2020-9971-abusing-xpc-service-to-elevate-privilege/