0xReverse

10 posts

0xReverse banner
0xReverse

0xReverse

@0xreversecom

Security Research Group

가입일 Kasım 2024
0 팔로잉226 팔로워
0xReverse 리트윗함
Utku Çorbacı
Utku Çorbacı@rhotav·
pyinjector-rs / A Windows process injector written in Rust that injects and executes Python codes Thanks to @luminaryxd for giving me the idea. I think this project can be used in some things that use PYTHON RUNTIME.😄 github.com/rhotav/pyinjec…
English
0
29
131
25.7K
0xReverse
0xReverse@0xreversecom·
Its ability to bypass EDR/XDR systems and impact banks, ISPs, and mid-level organizations in Türkiye underscores the need for on-premises sandboxes, supported by Threat.Zone's hypervisor-based approach, which offers deeper malware visibility than cloud-based alternatives. 🧵(3/3)
English
0
0
1
150
0xReverse
0xReverse@0xreversecom·
The malware employs a three-stage loader, including TOR for anonymous C&C communication and persistence via scheduled tasks. 🧵 (2/3)
English
1
0
2
151
0xReverse
0xReverse@0xreversecom·
@malwation research team has identified a sophisticated malware campaign targeting Türkiye 🇹🇷. "Technical Analysis of a Stealth Java Loader Used in Phishing Campaigns Targeting Türkiye" 🧵
Threat.Zone | Holistic Malware Analysis Platform@threatzone_

In recent weeks, our research team’ve identified a sophisticated phishing campaign targeting Türkiye. Threat actors targeted computers running Windows operating systems located in Türkiye and using the Turkish language. Key takeaway: the malware bypassed every public sandbox and AV aside from Threat.Zone, and also evaded EDR/XDR in real-world incidents. We noted impact across many banks, ISPs, and mid-level organizations. This case again shows why on-premises sandboxes are essential for critical infrastructure and why real dynamic analysis is crucial for SOC teams. malwation.com/blog/technical…

English
1
0
11
951