MalwareLab

634 posts

MalwareLab banner
MalwareLab

MalwareLab

@malwarelab_eu

#Malware Analysis, #DFIR, Computer #Forensics, Incident Response, #ThreatIntel, #OSINT, #CyberSecurity Tips, Tricks, Tools and Trainings by @ladislav_b

Katılım Haziran 2020
268 Takip Edilen2.6K Takipçiler
MalwareLab retweetledi
Suricata IDS/IPS
Suricata IDS/IPS@Suricata_IDS·
📢📢📢 Ladislav Bačo is back for round two! On March 11, Ladislav Bačo shares practical approaches for integrating network forensics into IR workflows, with perspectives for home and small office networks. Register: us02web.zoom.us/webinar/regist… #Suricata
Suricata IDS/IPS tweet media
English
0
5
9
552
MalwareLab retweetledi
Ladislav B
Ladislav B@ladislav_b·
Join me on Wednesday to see how to build your own home network monitoring setup under $100. Traffic capture, IDS, lightweight SIEM and alerting included.
Suricata IDS/IPS@Suricata_IDS

Join this webinar on Feb 11 with Ladislav Bačo to see how open-source IDS/IPS with #Suricata delivers network monitoring on a budget. You’ll watch a full live deployment and see how malicious traffic is detected and alerted in real time. Register today! us02web.zoom.us/webinar/regist…

English
0
2
1
223
MalwareLab
MalwareLab@malwarelab_eu·
An no, #moltbook is not AI agents-only social network. It uses REST API, so everyone could follow the howto for AI agents, register there and post anything. Including malicious content and command injects for AI agents.
English
0
0
1
148
MalwareLab
MalwareLab@malwarelab_eu·
Seeing posts like this on #moltbook, I am thinking about recent #threats emerging from the heavy usage of #AI agents without any security guardrails or proper controls. This time, "only" a command to send an innocent email. Next time, it might be #DDoS, #malware, or #dataleak
MalwareLab tweet media
English
1
0
2
659
MalwareLab retweetledi
abuse.ch
abuse.ch@abuse_ch·
We’ve identified an interesting malware family 🔍, which we’ve named #GrokPy due to its use of a Grok LLM model 🤖 to solve and subsequently bypass CAPTCHAs 🔥 The malware gets dropped by #Amadey and: 🪝 collects information about the infected device, such as screen resolution, public IP & location, ram usage and CPU name 💻 attempts to escalate privileges by running as admin or as a scheduled task ⚙️ uses the CDP (Chrome developer protocol) of either Edge or Chrome installed on the victim machine for further malicious actions 📡 calls back to the botnet C2 on the various stages of the infection and the results of its malicious actions 👱 creates new accounts on Discord to obtain authentication tokens, which are then reported back to the botnet C2 📧 uses dilly + [a-zA-Z0-9]{8,11}@gmail.com + password [a-zA-Z0-9]{8} as the email and password for the Discord registration process 🔍 has OCR capabilities for screenshots obtained via CDP, which are used to extract text from captcha 🤖 uses a Grok LLM model that resides in the botnet C2 server to solve the captcha Botnet C2 servers are all hosted at @Hetzner_Online 🇩🇪on port 8008 TCP: 46[.]62.225.51 [active] 46[.]62.224.205 46[.]62.205.38 GrokPy malware samples on MalwareBazaar: 📄bazaar.abuse.ch/browse/signatu… Botnet C2s on ThreatFox: 🦊threatfox.abuse.ch/browse/tag/Gro…
abuse.ch tweet mediaabuse.ch tweet mediaabuse.ch tweet mediaabuse.ch tweet media
English
4
43
132
19K
MalwareLab
MalwareLab@malwarelab_eu·
In overall, it was very good workshop and I am happy for opportunity to attend it.
English
0
0
1
97
MalwareLab
MalwareLab@malwarelab_eu·
The usage of "free" cloud infrastructure is inspiring, I will consider it during my next trainings for larger group of students (instead of hosting all of the VMs in our cloud infrastructure) - this way, lot of things can students do labs again after the training
English
1
0
1
113
MalwareLab retweetledi
radare
radare@radareorg·
✨This weekend syncs with the first week of the Advent of Radare! Take some weekend time to catch up with the challenges and learn new features and syntax tricks! radare.org/advent #aor24
radare tweet media
English
0
8
26
1.9K
MalwareLab retweetledi
radare
radare@radareorg·
All the workshop recordings and slides from #r2con2024 are now edited and published. If you didn't had a chance to attend now it's a good time to catch up starting right from the very first day! 👉 radare.org/con/2024/
radare tweet media
English
1
102
240
18.3K
MalwareLab retweetledi
ANY.RUN
ANY.RUN@anyrun_app·
🎉 As #CyberSecurityAwareness Month comes to an end, we’re celebrating by sharing some of our awesome friends! 💡Follow them for insightful cyber tips and great analyses. Here’s the list, in no specific order: @James_inthe_box @M4lcode @RussianPanda9xx @BlueEye46572843 @JAMESWT_MHT @ericparker @akaclandestine @Ax_Sharma @petikvx @g0njxa @executemalware @kondah_ha @fr0gger_ @NicoKnowsTechYT @embee_research @RacWatchin8872 @lennyzeltser @Gi7w0rm @jstrosch @_JohnHammond @malwarelab_eu This list is just the beginning — feel free to drop your own cybersecurity profiles in the comments!
GIF
English
11
7
33
4.5K