Results 1 to 20 of 112

Thread: Malware & other nasty IT / cyber things

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Pinkslipbot banking Trojan exploiting infected machines as control servers
    http://securityaffairs.co/wordpress/...ng-trojan.html

    Pinkslipbot banking Trojan is a banking Trojan that uses a complicated multistage proxy for HTTPS-based control server communication. Security researchers at McAfee Labs have spotted a new strain of the Pinkslipbot banking malware (also known as QakBot/QBot)
    Attached Images Attached Images

  2. #2
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    !!! Zero-day Skype flaw causes crashes, remote code execution (CVE-2017-9948) -

  3. #3
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    NOTE

    All of the running information on the Russian deliberate cyber attack on Ukraine is being threaded on the Russian propaganda thread....as it is in fact a Russian targeted cyber attack...especially when one "sees" the control servers sitting deep inside Russia.....

  4. #4

  5. #5
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Puppet Strings - Dirty Secret for Free Windows Ring 0 Code Execution https://zerosum0x0.blogspot.com/2017...-for-free.html
    Attached Images Attached Images

  6. #6
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    Petya’s kill-chain diagram in Windows 10. Device Guard, Credential Guard, UEFI Secure Boot, AppLocker, KASLR, HALNX

    https://blogs.technet.microsoft.com/...form=hootsuite
    Attached Images Attached Images

  7. #7
    Council Member
    Join Date
    Nov 2013
    Posts
    35,749

    Default

    ThreadContinue - Reflective Injection Using SetThreadContext() and NtContinue()
    https://zerosum0x0.blogspot.com/2017...injection.html
    Attached Images Attached Images

  8. #8
    Council Member
    Join Date
    Dec 2009
    Posts
    115

    Default

    Quote Originally Posted by OUTLAW 09 View Post
    Petya’s kill-chain diagram in Windows 10. Device Guard, Credential Guard, UEFI Secure Boot, AppLocker, KASLR, HALNX

    https://blogs.technet.microsoft.com/...form=hootsuite
    One interesting item is the limited execution time of 60 minutes.

    I'm not a cyber SME, but I wonder where 60 minutes sits on the continuum?

    If on the low end, and assuming it was done so intentionally, does that mean this might have been meant as both an intentional attack(not ransomware) on Ukraine as well as a message NATO/EU/US unlikely to draw a direct cyber counterattack?

    To me, if the 60 minute execution time is quite short, then it would seem to be designed to burn out like digital Ebola with a limited incubation period, instead of lingering like the Plague.

Similar Threads

  1. Russo-Ukraine War 2016 (April-June)
    By davidbfpo in forum Europe
    Replies: 1088
    Last Post: 07-01-2016, 08:44 PM
  2. Leadership of Cyber Warriors: Enduring Principles and New Directions
    By SWJ Blog in forum Media, Information & Cyber Warriors
    Replies: 0
    Last Post: 07-11-2011, 02:41 PM
  3. USAF Cyber Command (catch all)
    By selil in forum Media, Information & Cyber Warriors
    Replies: 150
    Last Post: 03-15-2011, 09:50 PM
  4. Replies: 51
    Last Post: 01-08-2011, 07:42 PM
  5. Question 5: Cyber space (oh you know I had to ask at least one of these)
    By selil in forum TRADOC Senior Leaders Conference
    Replies: 7
    Last Post: 08-14-2009, 03:27 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •