101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

509
active users

#pikabot

0 posts0 participants0 posts today
Threat Insight<p>Today we celebrate a major cybersecurity victory. 👏 Operation Endgame, a global law enforcement effort supported by insights from experts at Proofpoint and other industry vendors, resulted in:<br> <br>• The disruption of major botnets<br>• Four arrests<br>• Over 100 servers taken down across 10 countries<br>• Over 2,000 domains brought under the control of law enforcement<br>• Illegal assets frozen<br> <br>Proofpoint’s mission is to provide the best human-centric protection for our customers against advanced threats. Whenever possible and appropriate to do so, Proofpoint uses its team’s knowledge and skills to help protect a wider audience against widespread malware threats.<br> <br>For <a href="https://infosec.exchange/tags/OperationEndgame" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationEndgame</span></a>, Proofpoint threat researchers lent their expertise in reverse engineering malware, botnet infrastructure, and identifying patterns in how the threat actors set up their servers to help authorities understand the malware and safely remediate the bot clients.</p><p>Proofpoint’s unmatched threat telemetry and researcher knowledge played a crucial role in the operation, providing key insights in identifying the new botnets that are most likely to grow and become the dominant threats affecting the most number of people around the world.<br> <br>More information on the takedown and Proofpoint’s involvement can be found in our blog: <a href="https://www.proofpoint.com/us/blog/threat-insight/major-botnets-disrupted-global-law-enforcement-takedown" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">proofpoint.com/us/blog/threat-</span><span class="invisible">insight/major-botnets-disrupted-global-law-enforcement-takedown</span></a>.</p><p><a href="https://infosec.exchange/tags/IcedID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IcedID</span></a> <a href="https://infosec.exchange/tags/SystemBC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SystemBC</span></a> <a href="https://infosec.exchange/tags/Pikabot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pikabot</span></a> <a href="https://infosec.exchange/tags/SmokeLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmokeLoader</span></a> <a href="https://infosec.exchange/tags/Bumblebee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bumblebee</span></a> <a href="https://infosec.exchange/tags/Trickbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trickbot</span></a> <a href="https://infosec.exchange/tags/Europol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europol</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p><strong>Operation Endgame - Largest Ever Operation Against Botnets Hits Dropper Malware Ecosystem</strong></p><p><strong>Date</strong>: May 30, 2024<br><strong>CVE</strong>: Not specified<br><strong>Vulnerability Type</strong>: Malware<br><strong>CWE</strong>: [[CWE-94]], [[CWE-502]]<br><strong>Sources</strong>: <a href="https://www.europol.europa.eu/media-press/newsroom/news/largest-ever-operation-against-botnets-hits-dropper-malware-ecosystem" rel="nofollow noopener" target="_blank">Europol News</a>, <a href="https://www.eurojust.europa.eu/news/eurojust-supports-international-operation-against-worlds-largest-ransomware-group" rel="nofollow noopener" target="_blank">Eurojust News</a></p><p><strong>Issue Summary</strong></p><p>Europol, in coordination with law enforcement agencies from multiple countries, conducted the largest ever operation targeting botnets. This operation, dubbed "Operation Endgame," took place from May 27 to 29, 2024, and led to the disruption of major malware droppers including IcedID, SystemBC, Pikabot, Smokeloader, and Bumblebee. The effort resulted in four arrests and the takedown of over 100 servers worldwide. These droppers were used to facilitate ransomware and other cyber-attacks by installing additional malware onto target systems. The operation was supported by Eurojust and involved contributions from countries including France, Germany, the Netherlands, Denmark, the UK, the US, and others. Private partners also played a role in the operation, which aimed to dismantle the infrastructure supporting these malicious activities. The success of this operation marks a significant step in combating cybercrime on a global scale.</p><p>Operation Endgame, coordinated by Europol, dismantled several major botnets including IcedID, SystemBC, Pikabot, Smokeloader, and Bumblebee. This international effort involved law enforcement agencies from multiple countries and led to the arrest of four individuals and the takedown of over 100 servers. The botnets targeted facilitated ransomware and other cyber-attacks.</p><p><strong>Technical Key Findings</strong></p><p>The malware droppers involved are designed to infiltrate systems and install additional malware, often avoiding detection through sophisticated evasion techniques. These droppers were used to deploy ransomware and other malicious payloads by bypassing security measures and enabling further system compromises.</p><p><strong>Vulnerable Products</strong></p><p>The operation did not specify particular products but targeted the infrastructures supporting droppers like IcedID, SystemBC, Pikabot, Smokeloader, and Bumblebee.</p><p><strong>Impact Assessment</strong></p><p>If abused, these vulnerabilities could lead to widespread ransomware attacks, financial losses, and significant disruption of services. The infrastructure taken down had facilitated numerous cyber-attacks globally, highlighting the severe impact on cybersecurity.</p><p><strong>Patches or Workaround</strong></p><p>The report did not mention specific patches or workarounds. However, continuous monitoring and updating of security measures are recommended to protect against such threats.</p><p><strong>Tags</strong></p><p><a href="https://infosec.exchange/tags/Botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnets</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Europol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europol</span></a> <a href="https://infosec.exchange/tags/OperationEndgame" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationEndgame</span></a> <a href="https://infosec.exchange/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> <a href="https://infosec.exchange/tags/IcedID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IcedID</span></a> <a href="https://infosec.exchange/tags/SystemBC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SystemBC</span></a> <a href="https://infosec.exchange/tags/Pikabot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pikabot</span></a> <a href="https://infosec.exchange/tags/Smokeloader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Smokeloader</span></a> <a href="https://infosec.exchange/tags/Bumblebee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bumblebee</span></a></p>
abuse.ch :verified:<p>We are proud to announce that we assisted the joint international law enforcement operation <a href="https://ioc.exchange/tags/OperationEndgame" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationEndgame</span></a>, targeting the notorious botnets <a href="https://ioc.exchange/tags/IcedID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IcedID</span></a>, <a href="https://ioc.exchange/tags/Smokeloader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Smokeloader</span></a>, <a href="https://ioc.exchange/tags/SystemBC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SystemBC</span></a> and <a href="https://ioc.exchange/tags/Pikabot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pikabot</span></a> 🔥</p><p>abuse.ch has provided key infrastructure to LEA and internal partners to disrupt these botnet operations 🛑</p><p>More information on the operation is available here:<br>👉 <a href="https://operation-endgame.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">operation-endgame.com/</span><span class="invisible"></span></a></p>
The Spamhaus Project<p>🚨<a href="https://infosec.exchange/tags/IcedID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IcedID</span></a>, <a href="https://infosec.exchange/tags/Smokeloader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Smokeloader</span></a>, <a href="https://infosec.exchange/tags/SystemBC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SystemBC</span></a>, <a href="https://infosec.exchange/tags/Pikabot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pikabot</span></a> and <a href="https://infosec.exchange/tags/Bumblebee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bumblebee</span></a> botnets have been disrupted by Operation Endgame!! This is the largest operation EVER against botnets involved with ransomware, with gargantuan thanks to a coordinated effort led by international agencies 👏👏</p><p>As with the <a href="https://infosec.exchange/tags/Qakbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qakbot</span></a> and <a href="https://infosec.exchange/tags/Emotet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Emotet</span></a> takedowns, Spamhaus are again providing remediation support - those affected will be contacted from today with steps to take.</p><p>👉 For more information, read our write-up here: <a href="https://www.spamhaus.org/resource-hub/malware/operation-endgame-botnets-disrupted-after-international-action/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spamhaus.org/resource-hub/malw</span><span class="invisible">are/operation-endgame-botnets-disrupted-after-international-action/</span></a></p><p><a href="https://infosec.exchange/tags/OperationENDGAME" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationENDGAME</span></a></p>
Tony Lambert<p>New blog post! In this one I look at a Java-based dropper for Pikabot that TA577 used in mid-February 2024. <br><a href="https://forensicitguy.github.io/dissecting-java-pikabot-dropper/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forensicitguy.github.io/dissec</span><span class="invisible">ting-java-pikabot-dropper/</span></a><br><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/pikabot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pikabot</span></a> <a href="https://infosec.exchange/tags/ta577" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ta577</span></a></p>
Colin Cowie<p>Malicious slack ad leading to <a href="https://infosec.exchange/tags/Pikabot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pikabot</span></a> malware ⚠️​ Pikabot is closely associated with ransomware intrusions. </p><p>Redirection Infrastructure:<br>slalk.onelink[.]me<br>anewreseller.top </p><p>Fake Site:<br>siack.ovmv[.]net</p><p>.msi payload hosted on dropbox: <br><a href="https://www.virustotal.com/gui/file/f1bc547091f9a2447fd16c804aa568707ca323e3d20c90e5568b303480ae7a03" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/gui/file/f1bc54</span><span class="invisible">7091f9a2447fd16c804aa568707ca323e3d20c90e5568b303480ae7a03</span></a></p><p><a href="https://infosec.exchange/tags/IOCs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IOCs</span></a> <a href="https://infosec.exchange/tags/malvertising" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malvertising</span></a></p>
Freemind<p>QakBot, also known as QBot and Pinkslipbot, was dismantled in August as part of a coordinated law enforcement effort called Operation Duck Hunt.</p><p><a href="https://mastodon.online/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.online/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a> <a href="https://mastodon.online/tags/QakBot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QakBot</span></a> <a href="https://mastodon.online/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mastodon.online/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://mastodon.online/tags/PikaBot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PikaBot</span></a> </p><p><a href="https://cybersec84.wordpress.com/2023/11/21/qakbot-reborn-darkgate-and-pikabot-malware-leverage-old-tactics-in-new-phishing-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersec84.wordpress.com/2023/</span><span class="invisible">11/21/qakbot-reborn-darkgate-and-pikabot-malware-leverage-old-tactics-in-new-phishing-attacks/</span></a></p>
Brad<p>This article from <span class="h-card" translate="no"><a href="https://mstdn.social/@TalosSecurity" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>TalosSecurity</span></a></span> is wrong: <a href="https://infosec.exchange/@TalosSecurity@mstdn.social/111182485199499672" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@TalosSecurit</span><span class="invisible">y@mstdn.social/111182485199499672</span></a></p><p>The activity reported in this Talos article is not associated with <a href="https://infosec.exchange/tags/Qakbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qakbot</span></a>.</p><p>Why do I say this?</p><p>This Talos article is "...connecting the metadata in the LNK files used in the new campaign to the machines used in previous Qakbot campaigns." </p><p>Talos identifies these campaigns as "AA" and "BB." But the other data Talos presents isn't associated with infrastructure for the "AA" and "BB" campaigns that have pushed Qakbot before.</p><p>That "AA" and "BB" infrastructure has been active since last month, pushing <a href="https://infosec.exchange/tags/DarkGate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkGate</span></a>, <a href="https://infosec.exchange/tags/Pikabot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pikabot</span></a>, and <a href="https://infosec.exchange/tags/IcedID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IcedID</span></a>. This distribution network is run by a threat actor Proofpoint identifies as <a href="https://infosec.exchange/tags/TA577" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TA577</span></a>. TA577 was one of the distributors of Qakbot before Qakbot got taken down.</p><p>I would never have called TA577 the threat actor behind Qakbot, but Talos does in the article. It is merely a threat actor that distributed Qakbot.</p><p>From what I can tell, this Knight ransomeware activity is not connected with the AA/BB/TA577 distributor who has previously spread Qakbot and other malware.</p>
Brad<p>2023-05-22 (Mon) &amp; 2023-05-23 (Tue): TA577 pushes <a href="https://infosec.exchange/tags/Pikabot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pikabot</span></a></p><p>2023-05-24 (Wed): TA577 back to pushing <a href="https://infosec.exchange/tags/Qabkot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qabkot</span></a> (<a href="https://infosec.exchange/tags/Qbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qbot</span></a>)</p><p>Pikabot:</p><p>- <a href="https://malware-traffic-analysis.net/2023/05/22/index.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">023/05/22/index.html</span></a></p><p>- <a href="https://malware-traffic-analysis.net/2023/05/23/index.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">023/05/23/index.html</span></a></p><p>Qakbot (TA570 obama264): </p><p>- <a href="https://malware-traffic-analysis.net/2023/05/24/index.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">023/05/24/index.html</span></a></p><p>I was lucky enough to get <a href="https://infosec.exchange/tags/CobaltStrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CobaltStrike</span></a> with the two Pikabot infections, so I wrote tweets for my employer on the bird site.</p><p>See the above links for <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> files, malware samples, IOCs, and links to my employer's tweets for the Pikabot activity.</p>
abuse.ch :verified:<p>We are seeing an increase in <a href="https://ioc.exchange/tags/Pikabot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pikabot</span></a> activity, spreading through spam email campaigns that traditionally where pushing <a href="https://ioc.exchange/tags/Qakbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qakbot</span></a> malware🔥</p><p>In response to this emerging threat, we have started to include active Pikabot botnet C2s in Feodo Tracker, pushing automated protection out for millions of internet users 🛡️</p><p>👉 <a href="https://feodotracker.abuse.ch/browse/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">feodotracker.abuse.ch/browse/</span><span class="invisible"></span></a></p><p>In order to block active Pikabot botnet C2s, just implement Feodo Tracker's recommend IP blocklist on your security perimeter:</p><p>🛑 <a href="https://feodotracker.abuse.ch/downloads/ipblocklist_recommended.txt" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">feodotracker.abuse.ch/download</span><span class="invisible">s/ipblocklist_recommended.txt</span></a></p>
Brad<p>Tweet I wrote for my employer at the bird site: <a href="https://twitter.com/Unit42_Intel/status/1659199751265595392" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/Unit42_Intel/statu</span><span class="invisible">s/1659199751265595392</span></a></p><p>2023-05-17 (Wednesday): Today, this week's BB28 <a href="https://infosec.exchange/tags/Qakbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qakbot</span></a>-style distribution chain pushed <a href="https://infosec.exchange/tags/Pikabot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pikabot</span></a> instead of Qakbot. Followed up with <a href="https://infosec.exchange/tags/CobaltStrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CobaltStrike</span></a> using <a href="https://infosec.exchange/tags/DNSTunneling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNSTunneling</span></a>. We later saw additional Cobalt Strike traffic over HTTPS. List of IOCs available at <a href="https://github.com/pan-unit42/tweets/blob/master/2023-05-17-IOCs-for-Pikabot-with-Cobalt-Strike.txt" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/pan-unit42/tweets/b</span><span class="invisible">lob/master/2023-05-17-IOCs-for-Pikabot-with-Cobalt-Strike.txt</span></a></p><p>A carved <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of the infection traffic (removed everything not related to the <a href="https://infosec.exchange/tags/Pikabot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pikabot</span></a> &amp; <a href="https://infosec.exchange/tags/CobaltStrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CobaltStrike</span></a>) and the associated malware/registry updates available at <a href="https://malware-traffic-analysis.net/2023/05/17/index.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">023/05/17/index.html</span></a></p>