Configuring a Windows Domain to Dynamically Analyze an Obfuscated Lateral Movement Tool

From malware.news

We recently encountered a large obfuscated malware sample that offered several interesting analysis challenges. It used virtualization that prevented us from producing a fully-deobfuscated memory dump for static analysis. Statically analyzing a large virtualized sample can take anywhere from several days to several weeks. Bypassing this time-consuming step presented an opportunity for collaboration between the FLARE reverse engineering team and the Mandiant consulting team which ultimately saved many hours of difficult reverse engineering.

Read more…

ThiefQuest info-stealing Mac wiper gets free decryptor

From bleepingcomputer.com

Poor coding of the ThiefQuest ransomware in disguise that targets macOS users allows recovery of encrypted files, which would remain lost in lack of a backup.

While the malware (initially named EvilQuest) deploys the encryption routine immediately after infecting a system, paying a ransom is not an option because it offers no way to contact the attackers.

Read more…

Shopped recently from a small online store? Check this list to see if it was one of 570 websites infected with card-skimming Magecart

From theregister.com

The payment-card-skimming Magecart malware has turned up on yet more websites, this time 570 spanning 55 countries, it emerged this week.

The team at security biz Gemini Advisory said a long-running criminal gang dubbed Keeper compromised hundreds of online shopping sites over the past three years to install the software nasty.

Read more…

FAKESPY – An Android Malware steal SMS messages, Application, and Financial data Around the World

From cybersecuritynews.com

FAKESPY

Security experts uncovered a new version of Android malware “FAKESPY” that is stealing SMS messages, Applications’ data, and financial data from Android users all over the world. 

This is a type of phishing malware, and it’s an upgraded version of the FAKESPY android malware. This phishing campaign is targetting France, China, Switzerland, Taiwan, United Kingdom, Germany, and the United States. 

Read more…

Most Important Network Penetration Testing Checklist

From gbhackers.com

Network Penetration Testing

Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners.

The pen-testing helps administrator to close unused ports, additional services, Hide or Customize banners, Troubleshooting services and to calibrate firewall rules.You should test in all ways to guarantee there is no security loophole.

Let’s see how we conduct a step by step Network penetration testing by using some famous network scanners.

Read more…

DuckDuckGo Collected Users’ Browsing Data – Addressed The Glitch

From latesthackingnews.com

DuckDuckGo collected browsing data

The reason why services like DuckDuckGo thrive lies in their focus on users’ privacy. Nonetheless, a researcher found how this service behaved somewhat similar to Google. As observed, the DuckDuckGo Android browser collected users’ browsing data without consent. Nonetheless, they have now fixed the bug.

Read more…