101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

517
active users

#AsyncRAT

0 posts0 participants0 posts today
Sekoia.io<p>Our new report describes one of the latest observed infection chains (delivering <a href="https://infosec.exchange/tags/AsyncRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsyncRAT</span></a>) relying on the <a href="https://infosec.exchange/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloudflare</span></a> tunnel infrastructure and the attacker’s <a href="https://infosec.exchange/tags/TTPs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TTPs</span></a> with a principal focus on detection opportunities. </p><p><a href="https://blog.sekoia.io/detecting-multi-stage-infection-chains-madness/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.sekoia.io/detecting-multi</span><span class="invisible">-stage-infection-chains-madness/</span></a></p>
Hackread.com<p>Watch Out!🚨 New phishing scam targets hotel staff with fake <a href="https://mstdn.social/tags/Booking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Booking</span></a>.com emails. A fake CAPTCHA leads to AsyncRAT malware via a Windows Run trick.</p><p>Read more: <a href="https://hackread.com/booking-com-phishing-scam-fake-captcha-asyncrat/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/booking-com-phish</span><span class="invisible">ing-scam-fake-captcha-asyncrat/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/AsyncRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsyncRAT</span></a> <a href="https://mstdn.social/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://mstdn.social/tags/Scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Scam</span></a></p>
ESET Research<p><a href="https://infosec.exchange/tags/ESETresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESETresearch</span></a> has uncovered the <a href="https://infosec.exchange/tags/MirrorFace" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MirrorFace</span></a> Operation AkaiRyū, which extends the group’s usual focus beyond Japan into Europe. The initial lure centered around Expo 2025 in Japan, compromising a Central European diplomatic institute. <br><a href="https://www.welivesecurity.com/en/eset-research/operation-akairyu-mirrorface-invites-europe-expo-2025-revives-anel-backdoor/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">welivesecurity.com/en/eset-res</span><span class="invisible">earch/operation-akairyu-mirrorface-invites-europe-expo-2025-revives-anel-backdoor/</span></a></p><p>Surprisingly, <a href="https://infosec.exchange/tags/MirrorFace" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MirrorFace</span></a> used <a href="https://infosec.exchange/tags/ANEL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ANEL</span></a> – a backdoor historically linked only to <a href="https://infosec.exchange/tags/APT10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT10</span></a> – highlighting a shift in the group’s tactics and reinforcing suspicions that MirrorFace could be part of the APT10 umbrella.<br>Operation AkaiRyū began with targeted spearphishing emails referencing the victim’s past correspondence and Expo 2025 , persuading recipients to download malicious attachments. <br>Once the files were opened, a layered compromise chain ensued . Collaborating with the victim allowed us to perform in-depth analysis, shedding light on MirrorFace’s post-compromise behavior – from credential harvesting to dropping additional tools for lateral movement. </p><p><a href="https://infosec.exchange/tags/MirrorFace" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MirrorFace</span></a> used an intricate execution chain to stealthily run a highly tweaked <a href="https://infosec.exchange/tags/AsyncRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsyncRAT</span></a> within <a href="https://infosec.exchange/tags/WindowsSandbox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsSandbox</span></a>, hampering detection efforts. This is the first time we’ve seen MirrorFace employ AsyncRAT.<br>In another twist, <a href="https://infosec.exchange/tags/MirrorFace" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MirrorFace</span></a> utilized <a href="https://infosec.exchange/tags/VSCode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VSCode</span></a> remote tunnels, a tactic enabling covert access and command execution on compromised machines. This approach has also been seen with other China-aligned cyberespionage groups.<br>The group primarily leveraged <a href="https://infosec.exchange/tags/ANEL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ANEL</span></a> as a first-stage backdoor, <a href="https://infosec.exchange/tags/HiddenFace" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HiddenFace</span></a> – MirrorFace’s flagship backdoor – was dropped later in the attack to bolster persistence . Notably absent this time was <a href="https://infosec.exchange/tags/LODEINFO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LODEINFO</span></a>, which <a href="https://infosec.exchange/tags/MirrorFace" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MirrorFace</span></a> typically employs.</p><p>We presented our findings about Operation AkaiRyū conducted by <a href="https://infosec.exchange/tags/MirrorFace" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MirrorFace</span></a> at @jpcert_ac on January 22, 2025: <a href="https://jsac.jpcert.or.jp" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">jsac.jpcert.or.jp</span><span class="invisible"></span></a>.<br>IoCs available in our GitHub repo: <a href="https://github.com/eset/malware-ioc/tree/master/mirrorface" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/eset/malware-ioc/tr</span><span class="invisible">ee/master/mirrorface</span></a></p>
Brad<p>Two new posts this week on the malware-traffic-analysis.net website:</p><p>2024-03-13: <a href="https://infosec.exchange/tags/GootLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GootLoader</span></a> activity at <a href="https://www.malware-traffic-analysis.net/2024/03/14/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">024/03/14/index.html</span></a></p><p>2024-03-14: <a href="https://infosec.exchange/tags/AsyncRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsyncRAT</span></a> and <a href="https://infosec.exchange/tags/XWorm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XWorm</span></a> infection at <a href="https://www.malware-traffic-analysis.net/2024/03/14/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">024/03/14/index.html</span></a></p><p><a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> files... malware samples... You all know the deal.</p><p>These are based on social media posts from my employer. I authored GootLoader social media post. <span class="h-card" translate="no"><a href="https://defcon.social/@mithrandir" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mithrandir</span></a></span> authored the AsyncRAT/XWorm social media post, and I got a good pcap out of it.</p><p>Shout out to <span class="h-card" translate="no"><a href="https://defcon.social/@mithrandir" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mithrandir</span></a></span> !!!</p>
Brad<p>2024-02-21 (Wednesday): From a social media post I wrote for my employer, posted at <a href="https://www.linkedin.com/posts/unit42_parrottds-socgholish-asyncrat-activity-7166192124441415681-rnLv" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/posts/unit42_parr</span><span class="invisible">ottds-socgholish-asyncrat-activity-7166192124441415681-rnLv</span></a> and <a href="https://twitter.com/Unit42_Intel/status/1760426508558950518" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/Unit42_Intel/statu</span><span class="invisible">s/1760426508558950518</span></a></p><p>Site with <a href="https://infosec.exchange/tags/ParrotTDS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ParrotTDS</span></a> redirects to <a href="https://infosec.exchange/tags/SocGholish" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocGholish</span></a> fake browser update page. SocGholish payload installs <a href="https://infosec.exchange/tags/AsyncRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsyncRAT</span></a>. List of indicators at <a href="https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2024-02-21-IOCs-from-SocGholish-AsyncRAT-infection.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/PaloAltoNetworks/Un</span><span class="invisible">it42-timely-threat-intel/blob/main/2024-02-21-IOCs-from-SocGholish-AsyncRAT-infection.txt</span></a></p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of traffic from an infection run and the associated malware samples/artifacts are available at <a href="https://malware-traffic-analysis.net/2024/02/21/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">024/02/21/index.html</span></a></p>
ricardo :mastodon:<p>Stealthy <a href="https://fosstodon.org/tags/AsyncRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsyncRAT</span></a> malware attacks targets US infrastructure for 11 months</p><p><a href="https://www.bleepingcomputer.com/news/security/stealthy-asyncrat-malware-attacks-targets-us-infrastructure-for-11-months/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/stealthy-asyncrat-malware-attacks-targets-us-infrastructure-for-11-months/</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>​"⚠️ <a href="https://infosec.exchange/tags/AsyncRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsyncRAT</span></a>'s New WSF Script Attack Method Unveiled 🛡️🕵️‍♂️🐀 "</p><p>AsyncRAT, known for its stealth and data extraction capabilities, now employs WSF scripts in its attack chain. This shift from .chm files to WSF scripts, as reported by AhnLab's ASEC, enhances its evasion techniques. The WSF script, hidden in a .zip file from phishing emails, downloads a Visual Basic script which then executes a .jpg file disguised as a .zip, eventually leading to a PowerShell-scripted fileless attack.</p><p>Key insights:</p><ul><li>Complex infection chain starting with spam emails.</li><li>Use of PowerShell, VBScript, and BAT files to inject into RegSvcs.exe, evading antivirus detection.</li><li>Final attack phase: Portable Executable (PE) file injected into RegSvcs.exe, establishing a connection with AsyncRAT server for data exfiltration.</li></ul><p>Stay vigilant against this sophisticated threat and ensure robust security protocols.🔐</p><p>Source: <a href="https://asec.ahnlab.com/en/59573/" rel="nofollow noopener" target="_blank">AhnLab Security Emergency response Cente</a> and <a href="https://gbhackers.com/asyncrat-wsf-script-files/" rel="nofollow noopener" target="_blank">GBHackers</a></p><p>Tags: <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/AsyncRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsyncRAT</span></a> <a href="https://infosec.exchange/tags/FilelessAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FilelessAttack</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/DataExfiltration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataExfiltration</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/InfoSecExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSecExchange</span></a> 🌍💻🔍🐀</p>
mithrandir<p>Completed Part 3 of my personal <a href="https://defcon.social/tags/SocGholish" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocGholish</span></a> series.</p><p>The article digs into the follow-up payloads delivered once the Update.js is executed on a victim machine.</p><p>Interestingly, I saw <a href="https://defcon.social/tags/NetSupport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetSupport</span></a> RAT and an unknown (to me) PowerShell C2 beacon be delivered together.</p><p>If anyone can shed more light on what the PowerShell beacon may be, it would be much appreciated! Seems to be inspired by <a href="https://defcon.social/tags/AsyncRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AsyncRAT</span></a>, though.</p><p>Big thanks to <span class="h-card"><a href="https://infosec.exchange/@rmceoin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rmceoin</span></a></span> for help along the way.</p><p><a href="https://rerednawyerg.github.io/posts/malwareanalysis/socgholish_part3" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">rerednawyerg.github.io/posts/m</span><span class="invisible">alwareanalysis/socgholish_part3</span></a></p>
Opalsec :verified:<p>This week's edition of SOC Goulash, our Weekend Wrap-Up of infosec news, is live and hot off the press!</p><p><a href="https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-be1" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.substack.com/p/soc-gou</span><span class="invisible">lash-weekend-wrap-up-be1</span></a></p><p>Building on last week's flagging of the increase in abuse of <a href="https://infosec.exchange/tags/Malvertising" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malvertising</span></a>, researchers have observed it being abused to deliver <a href="https://infosec.exchange/tags/ASyncRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ASyncRAT</span></a> and <a href="https://infosec.exchange/tags/xworm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xworm</span></a> payloads, as well as to harvest master passwords for Password Manager solutions like <a href="https://infosec.exchange/tags/Bitwarden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bitwarden</span></a> and <a href="https://infosec.exchange/tags/1Password" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>1Password</span></a>. </p><p><a href="https://infosec.exchange/tags/Hive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hive</span></a> ransomware have had their infrastructure seized in a multi-national law enforcement operation. The authorities lurked in their infrastructure for six months, gathering communications &amp; information on their members and stealing 1,300 decryption keys that enabled them to avert ~$130 million in potential ransom payments.</p><p>North Korea's crypto-hunting actors have been agile in adopting emerging tradecraft and developing novel payloads. With $1 billion worth of funds brought into the hermit kingdom in 2022, orgs in the <a href="https://infosec.exchange/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptocurrency</span></a> and <a href="https://infosec.exchange/tags/DeFi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeFi</span></a> space will need to be on guard coming into 2023.</p><p><a href="https://infosec.exchange/tags/PlugX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PlugX</span></a> malware continues to be developed, with new variants spotted in the wild capable of spreading via USB, upgrading old installations, and pilfering documents from hosed computers.</p><p><a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> in the Realtek SDK have been exploited nearly 130 million times between August and December last year alone by botnets seeking to grow their numbers.</p><p>Security researchers Horizon3 intend to release a PoC <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> for CVSS 9.8 RCE vulnerabilities in VMWare's vRealize Log Insight product this week - make sure you're patched!</p><p>For our paid subscribers, we've got some additional articles on:<br>1. The adoption of OneNote for payload delivery, and tips for analysis;<br>2. An overview of CVE-2022-34689, a critical Windows vulnerability that could be abused to intercept &amp; decrypt encrypted communications or spoof code-signing of malicious executables;<br>3. A vulnerability/not-vulnerability in <a href="https://infosec.exchange/tags/KeePass" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KeePass</span></a>, with no patch and an unknown scope of impact, allowing attackers to dump plaintext credentials from the Password Manager.</p><p>As always, there's a tonne of additional goodies to be found in the newsletter that I couldn't cover here, so check it out here: <a href="https://opalsec.substack.com/p/soc-goulash-weekend-wrap-up-be1" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">opalsec.substack.com/p/soc-gou</span><span class="invisible">lash-weekend-wrap-up-be1</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/Hacked" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacked</span></a> <a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://infosec.exchange/tags/cybernews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybernews</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infosecnews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecnews</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://infosec.exchange/tags/hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacker</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/soc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>soc</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/malvertising" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malvertising</span></a> <a href="https://infosec.exchange/tags/passwordmanager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwordmanager</span></a> <a href="https://infosec.exchange/tags/vmware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vmware</span></a> <a href="https://infosec.exchange/tags/poc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>poc</span></a></p>