09/26

BumbleBee: Round Two – The DFIR Report

https://thedfirreport.com/2022/09/26/bumblebee-round-two/
BumbleBee: Round Two – The DFIR Report

Окупанти готують масовані кібератаки на об’єкти критичної інфраструктури України та її союзників

https://gur.gov.ua/content/okupanty-hotuiut-masovani-kiberataky-na-ob-iekty-krytychnoi-infrastruktury-ukrainy-ta-ii-soiuznykiv.html
Окупанти готують масовані кібератаки на об’єкти критичної інфраструктури України та її союзників

TangledWinExec/ProcMemScan at main · daem0nc0re/TangledWinExec · GitHub

https://github.com/daem0nc0re/TangledWinExec/tree/main/ProcMemScan
TangledWinExec/ProcMemScan at main · daem0nc0re/TangledWinExec · GitHub

GitHub - ufrisk/MemProcFS: MemProcFS

https://github.com/ufrisk/MemProcFS
GitHub - ufrisk/MemProcFS: MemProcFS

In the footsteps of the Fancy Bear: PowerPoint mouse-over event abused to deliver Graphite implants

https://blog.cluster25.duskrise.com/2022/09/23/in-the-footsteps-of-the-fancy-bear-powerpoint-graphite/
In the footsteps of the Fancy Bear: PowerPoint mouse-over event abused to deliver Graphite implants

How 3 hours of inaction from Amazon cost cryptocurrency holders $235,000 – Ars Technica

https://arstechnica-com.cdn.ampproject.org/c/s/arstechnica.com/information-technology/2022/09/how-3-hours-of-inaction-from-amazon-cost-cryptocurrency-holders-235000/?amp=1
How 3 hours of inaction from Amazon cost cryptocurrency holders $235,000 – Ars Technica

UNLEASH THE BEAST | THE FUTURE | H O M E

https://devilinside.me/blogs/configuration-extraction-yara
UNLEASH THE BEAST | THE FUTURE | H O M E

Hackers use PowerPoint files for 'mouseover' malware delivery

https://www.bleepingcomputer.com/news/security/hackers-use-powerpoint-files-for-mouseover-malware-delivery/
Hackers use PowerPoint files for 'mouseover' malware delivery

GitHub - theatha/YARA_for_config_extraction

https://github.com/theatha/YARA_for_config_extraction
GitHub - theatha/YARA_for_config_extraction

Chinese Espionage Hackers Target Tibetans Using New LOWZERO Backdoor

https://thehackernews.com/2022/09/chinese-espionage-hackers-target.html
Chinese Espionage Hackers Target Tibetans Using New LOWZERO Backdoor

Ransomware data theft tool may show a shift in extortion tactics

https://www.bleepingcomputer.com/news/security/ransomware-data-theft-tool-may-show-a-shift-in-extortion-tactics/
Ransomware data theft tool may show a shift in extortion tactics

APT41 spear-phishing, supply chain campaigns target pharma, healthcare | SC Media

https://www.scmagazine.com/analysis/threat-intelligence/apt41-spear-phishing-supply-chain-campaigns-target-pharma-healthcare
APT41 spear-phishing, supply chain campaigns target pharma, healthcare | SC Media

MalwareBazaar | SHA256 8bac7df54648d64d943b80706db9de86ec5787d7cf3b330e860972568d100c4e

https://bazaar.abuse.ch/sample/8bac7df54648d64d943b80706db9de86ec5787d7cf3b330e860972568d100c4e/
MalwareBazaar | SHA256 8bac7df54648d64d943b80706db9de86ec5787d7cf3b330e860972568d100c4e

IcedID/icedID_26.09.2022.txt at main · pr0xylife/IcedID · GitHub

https://github.com/pr0xylife/IcedID/blob/main/icedID_26.09.2022.txt
IcedID/icedID_26.09.2022.txt at main · pr0xylife/IcedID · GitHub