🔥 Burn Fat Fast. Discover How! 💪

Malware News

Logo of telegram channel malwr — Malware News M
Logo of telegram channel malwr — Malware News
Channel address: @malwr
Categories: Technologies
Language: English
Subscribers: 3.00K
Description from channel

The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...
Partner channel: @cveNotify
Contact: @SirMalware

Ratings & Reviews

2.33

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

0

3 stars

2

2 stars

0

1 stars

1


The latest Messages 100

2021-02-26 10:59:05 Exploiting (and Patching) a Zero Day RCE Vulnerability in a Western Digital NAS
ChoiceGrapefruit0

amazing !!
InLine435ExpectingA

hi! I'm Pedro, one of the authors. Any questions, shoot.

These vulns are not hardcore mem corruption, but we find logic vulns quite interesting. Lemme know your comments and suggestions too.
ChoiceGrapefruit0


@malwr
32 views07:59
Open / Comment
2021-02-26 10:58:25 CVE-2020-8625: A Fifteen-Year-Old RCE Bug Returns in ISC BIND Server
RedmondSecGnome


@malwr
33 views07:58
Open / Comment
2021-01-22 09:37:07 Analysis of BitRat dropper
This is the analysis of the dropper, not of BitRat, but I will write it soon:

https://github.com/Finch4/Malware-Analysis-Reports/blob/main/13e0f258cfbe3aece8a7e6d29ceb5697/README.md
BlackDog17_


@malwr
356 views06:37
Open / Comment
2021-01-22 09:34:41 Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction
digicat


@malwr
334 views06:34
Open / Comment
2021-01-22 09:29:41 React Native Application Static Analysis
pe3zx


@malwr
252 views06:29
Open / Comment
2021-01-21 23:09:14 Microsoft deep dive into stage two solarwinds malware
jumpinjelly789

This threat campaign is one of the most astoundingly executed pieces I have seen and I have researched the last 16 years of major incidents...

Microsoft have really delved deep into this monstrosity.

The timing of the payload execution, the hash matching of the inherently ‘trusted’ DLL, the multi-pronged malware payloads. Those fuckers really wanted to make a mess with minimal footprint.

Exfiltration of data was so obfuscated that it took so long before anyone knew what happened.

If only the perpetrators in the nation-state groups responsible had chosen a different colour hat.
Forsaken-Joke-4908

This is great write up. Microsoft takes a lot of shit for their business practices (maybe deservedly), but they really have a top-notch security team.
QuirkySpiceBush

I fucking love these write ups.

I read the entire thing. I wish there was a grove chocked full of write ups of sophisticated attacks. Explaining all there is to explain. Ahhhh.

I’m always happy to know I have so much more to learn.
Vysokojakokurva_C137


@malwr
241 views20:09
Open / Comment
2021-01-21 23:06:39 Sybil Logic Bomb Cyber Catastrophe Stress Test Scenario - Technology and space - Risk Centre publications - Centre for Risk Studies
digicat


@malwr
183 views20:06
Open / Comment
2021-01-21 23:04:11 Vadokrist: A wolf in sheep’s clothing
darronofsky


@malwr
169 views20:04
Open / Comment
2021-01-21 23:00:31 Chain multiple bugs to get unauthenticated remote code execution on the SolarWinds Orion Platform
RedmondSecGnome


@malwr
157 views20:00
Open / Comment
2021-01-21 22:59:41 Process on a diet: anti-debug using job objects
amd64_sucks


@malwr
158 views19:59
Open / Comment