03/02

Conti Ransomware Group Diaries, Part I: Evasion – Krebs on Security

https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-i-evasion/
Conti Ransomware Group Diaries, Part I: Evasion – Krebs on Security

Cyber Realism in a Time of War - Lawfare

https://www.lawfareblog.com/cyber-realism-time-war
Cyber Realism in a Time of War - Lawfare

IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine | WeLiveSecurity

https://www.welivesecurity.com/2022/03/01/isaacwiper-hermeticwizard-wiper-worm-targeting-ukraine/
IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine | WeLiveSecurity

add PPL bypass · helpsystems/nanodump@9f52024 · GitHub

https://github.com/helpsystems/nanodump/commit/9f5202462168b109a57accc2781000f9f141887b
add PPL bypass · helpsystems/nanodump@9f52024 · GitHub

Malware-IOCs/2022-03-01_CobaltStrikeConfigs at main · CronUp/Malware-IOCs · GitHub

https://github.com/CronUp/Malware-IOCs/blob/main/2022-03-01_CobaltStrikeConfigs
Malware-IOCs/2022-03-01_CobaltStrikeConfigs at main · CronUp/Malware-IOCs · GitHub

Asylum Ambuscade: State Actor Uses Compromised Private Ukrainian Military Emails to Target European Governments and Refugee Movement | Proofpoint US

https://www.proofpoint.com/us/blog/threat-insight/asylum-ambuscade-state-actor-uses-compromised-private-ukrainian-military-emails
Asylum Ambuscade: State Actor Uses Compromised Private Ukrainian Military Emails to Target European Governments and Refugee Movement | Proofpoint US

MAPPING THE CONTI NETWORK | Flourish

https://bit.ly/JGEU_CLNETMAP
MAPPING THE CONTI NETWORK | Flourish

CVE-2022-22947: SpEL Casting and Evil Beans – Wya.pl

https://wya.pl/2022/02/26/cve-2022-22947-spel-casting-and-evil-beans/
CVE-2022-22947: SpEL Casting and Evil Beans – Wya.pl

Hackers Begin Weaponizing TCP Middlebox Reflection for Amplified DDoS Attacks

https://thehackernews.com/2022/03/hackers-begin-weaponizing-tcp-middlebox.html
Hackers Begin Weaponizing TCP Middlebox Reflection for Amplified DDoS Attacks

21 Women in Cybersecurity You Need to Know – Making Space

https://www.makingspacepledge.org/21-women-in-cybersecurity-you-need-to-know/
21 Women in Cybersecurity You Need to Know – Making Space

Tweet / Twitter

https://twitter.com/WillWArmstrong/status/1498778609896415237
Tweet / Twitter

PR0CESS/UACBypassJF_RpcALPC at main · aaaddress1/PR0CESS · GitHub

https://github.com/aaaddress1/PR0CESS/tree/main/UACBypassJF_RpcALPC
PR0CESS/UACBypassJF_RpcALPC at main · aaaddress1/PR0CESS · GitHub

Shields Up | CISA

http://cisa.gov/shields-up
Shields Up | CISA

Space / Twitter

https://twitter.com/i/spaces/1zqKVBWnXbZKB
Space / Twitter

2022 Russia-Ukraine war — Cyber group tracker. Update 2. - Cyberknow - Medium

https://cyberknow.medium.com/2022-russia-ukraine-war-cyber-group-tracker-update-2-e62239184510
2022 Russia-Ukraine war — Cyber group tracker. Update 2. - Cyberknow - Medium

Zelensky assassination plot foiled, Ukrainian authorities say

https://www.axios.com/zelensky-assassination-plot-foiled-7bea049b-2308-4801-b75a-93104c17b82b.html?utm_source=twitter&utm_medium=social&utm_campaign=editorial&utm_content=world-russiaukraine
Zelensky assassination plot foiled, Ukrainian authorities say

Example Domain

http://example.com
Example Domain

Log4shell exploits now used mostly for DDoS botnets, cryptominers

https://www.bleepingcomputer.com/news/security/log4shell-exploits-now-used-mostly-for-ddos-botnets-cryptominers/
Log4shell exploits now used mostly for DDoS botnets, cryptominers

Conti Ransomware source code leaked by Ukrainian researcher

https://www.bleepingcomputer.com/news/security/conti-ransomware-source-code-leaked-by-ukrainian-researcher/
Conti Ransomware source code leaked by Ukrainian researcher

Conti Ransomware Group Diaries, Part II: The Office – Krebs on Security

https://krebsonsecurity.com/2022/03/conti-ransomware-group-diaries-part-ii-the-office/
Conti Ransomware Group Diaries, Part II: The Office – Krebs on Security

fuzzing22_fioraldi_report.pdf

https://www.s3.eurecom.fr/docs/fuzzing22_fioraldi_report.pdf
fuzzing22_fioraldi_report.pdf

How to Decrypt the PartyTicket Ransomware Targeting Ukraine | CrowdStrike

https://www.crowdstrike.com/blog/how-to-decrypt-the-partyticket-ransomware-targeting-ukraine/
How to Decrypt the PartyTicket Ransomware Targeting Ukraine | CrowdStrike