lepoulsdumonde.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Small french Mastodon instance for friends, family and useful bots

Administered by:

Server stats:

52
active users

#malware

22 posts18 participants1 post today
Bill<p>Wow, loving the CISA malware analysis report. Clear, simple. Hadn't seen those before. Here's one on Resurge.</p><p><a href="https://www.cisa.gov/news-events/analysis-reports/ar25-087a" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cisa.gov/news-events/analysis-</span><span class="invisible">reports/ar25-087a</span></a></p><p><a href="https://infosec.exchange/tags/cisa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisa</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Bill<p>Ok, this is fun. A study on malware compiled in (relatively) obscure languages.</p><p><a href="https://arxiv.org/abs/2503.19058" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2503.19058</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a></p>
Vladimir Savić<p>No surprise here ...</p><p><a href="https://mastodon.social/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> is harder to find when written in obscure language <a href="https://www.theregister.com/2025/03/29/malware_obscure_languages/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/29/mal</span><span class="invisible">ware_obscure_languages/</span></a></p><p>P.S. I was under the impression that everything ultimately boils down to assembly, but OK... 😜</p>
defnull<p>Yearly reminder that <a href="https://chaos.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> on <a href="https://chaos.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> can just shutdown <a href="https://chaos.social/tags/ClamAV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClamAV</span></a> before downloading payload to avoid real-time detection, and <a href="https://chaos.social/tags/cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisco</span></a> does not think this is a problem.</p><p><a href="https://github.com/Cisco-Talos/clamav/issues/1169" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Cisco-Talos/clamav/</span><span class="invisible">issues/1169</span></a></p><p><a href="https://chaos.social/tags/itsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsec</span></a> <a href="https://chaos.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://chaos.social/tags/foss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>foss</span></a></p>
Un Tornquistense<p>⚠️version preliminar</p><p><a href="https://mastodon.world/tags/Seguridad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Seguridad</span></a> en <a href="https://mastodon.world/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a> /en linea — Un tornquistense</p><p><a href="https://write.as/un-tornquistense/seguridad-en-internet-en-linea" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">write.as/un-tornquistense/segu</span><span class="invisible">ridad-en-internet-en-linea</span></a></p><p>&gt; Hecho por Un Tornquistense ¿Que es? Son las precauciones o medidas que tomamos para protegernos a nosotros y nuestra información personal. Lo podríamos comparar c...</p><p>Si les gusto retooteenlo por favor🫶</p><p><a href="https://mastodon.world/tags/ciberseguridad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ciberseguridad</span></a> <a href="https://mastodon.world/tags/privacidad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacidad</span></a> <a href="https://mastodon.world/tags/seguridadenlinea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>seguridadenlinea</span></a> <a href="https://mastodon.world/tags/virus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virus</span></a> <a href="https://mastodon.world/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Christoffer S.<p>(cyfirma.com) Konni RAT Analysis: Multi-Stage Attack Process and Evasion Techniques <a href="https://www.cyfirma.com/research/analysis-of-konni-rat-stealth-persistence-and-anti-analysis-techniques/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cyfirma.com/research/analysis-</span><span class="invisible">of-konni-rat-stealth-persistence-and-anti-analysis-techniques/</span></a></p><p>Executive Summary:<br>This report provides a comprehensive analysis of Konni RAT, a sophisticated remote access Trojan linked to North Korean cyber espionage group APT37. The malware employs a multi-stage attack process involving batch files, PowerShell scripts, and VBScript to exfiltrate sensitive data and maintain persistence. The attack begins with a zip archive containing a malicious LNK file disguised as a document. The malware exploits Windows Explorer limitations to hide malicious commands and uses obfuscation techniques to evade detection. Key capabilities include data exfiltration from user directories, system information gathering, persistence through registry modifications, and communication with command-and-control servers. The report includes detailed technical analysis of the attack stages, from initial infection to data exfiltration, along with indicators of compromise and YARA detection rules.</p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NorthKorea</span></a> <a href="https://swecyb.com/tags/APT37" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT37</span></a> <a href="https://swecyb.com/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://swecyb.com/tags/Reversing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Reversing</span></a></p>
your auntifa liza 🇵🇷 🦛 🦦<p>it should be obvious by now that anything created by the <a href="https://mastodon.social/tags/techbros" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>techbros</span></a> behind this coup needs to be considered <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p><p><a href="https://www.wired.com/story/doge-rebuild-social-security-administration-cobol-benefits/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/doge-rebuild-s</span><span class="invisible">ocial-security-administration-cobol-benefits/</span></a></p><p>and that includes the 2-3 years of <a href="https://mastodon.social/tags/Palantir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Palantir</span></a> having free reign hacking everything related to not just <a href="https://mastodon.social/tags/immigration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>immigration</span></a> but <a href="https://mastodon.social/tags/passports" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passports</span></a> </p><p>DOGE IS MORE THAN <a href="https://mastodon.social/tags/MALWARE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MALWARE</span></a> IT’S <a href="https://mastodon.social/tags/RANSOMWARE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RANSOMWARE</span></a> </p><p>so who is putting up contingencies to use all the <a href="https://mastodon.social/tags/OpenGOV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenGOV</span></a> tools we have had developed the last 20 years, to audit the White House’s acts of digital terrorism?</p>
securityaffairs<p>Russian authorities arrest three suspects behind <a href="https://infosec.exchange/tags/Mamont" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mamont</span></a> <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://infosec.exchange/tags/banking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>banking</span></a> trojan<br><a href="https://securityaffairs.com/175935/cyber-crime/russian-authorities-arrest-three-suspects-behind-mamont-android-banking-trojan.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/175935/cyb</span><span class="invisible">er-crime/russian-authorities-arrest-three-suspects-behind-mamont-android-banking-trojan.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
securityaffairs<p>New <a href="https://infosec.exchange/tags/ReaderUpdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReaderUpdate</span></a> malware variants target <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> users<br><a href="https://securityaffairs.com/175891/malware/readerupdate-malware-variants-targets-macos.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/175891/mal</span><span class="invisible">ware/readerupdate-malware-variants-targets-macos.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Dino<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@BleepingComputer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BleepingComputer</span></a></span> Do we think something like this is enough to find if this garbage is present on a Linux system? `sudo find / -iregex '.*ethers-.*`<br><a href="https://masto.ai/tags/node" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>node</span></a> <a href="https://masto.ai/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> <a href="https://masto.ai/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/BlackLock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackLock</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> Targeted by Cybersecurity Firm<br><a href="https://securityaffairs.com/175877/cyber-crime/blacklock-ransomware-targeted-by-cybersecurity-firm.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/175877/cyb</span><span class="invisible">er-crime/blacklock-ransomware-targeted-by-cybersecurity-firm.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
The New Oil<p>New <a href="https://mastodon.thenewoil.org/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> uses <a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a>’s .NET <a href="https://mastodon.thenewoil.org/tags/MAUI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MAUI</span></a> to evade detection</p><p><a href="https://www.bleepingcomputer.com/news/security/new-android-malware-uses-microsofts-net-maui-to-evade-detection/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-android-malware-uses-microsofts-net-maui-to-evade-detection/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> campaigns use .NET MAUI to evade detection<br><a href="https://securityaffairs.com/175843/cyber-crime/android-malware-uses-net-maui-to-evade-detection.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/175843/cyb</span><span class="invisible">er-crime/android-malware-uses-net-maui-to-evade-detection.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Avoid the Hack! :donor:<p>Another Monday. Another edition of the Privacy Roundup featuring news items curated with end user <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> and <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> in mind.</p><p>This edition features:</p><p>- <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> Apps using <a href="https://infosec.exchange/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bluetooth</span></a> and Wi-Fi connection data to estimate and collect user location data<br>- <a href="https://infosec.exchange/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> Passwords app used insecure HTTP<br>- Video gamers beware: another game pulled from Steam for being <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> in disguise<br>- Free online converters adding malware to converted files<br>- Threat actors using <a href="https://infosec.exchange/tags/Reddit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Reddit</span></a> posts to push information stealing malware, primarily targeting <a href="https://infosec.exchange/tags/cryptocurrency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptocurrency</span></a> traders/enthusiasts<br>- Data breaches at the largest US sperm bank and a large teacher union </p><p>… and more.</p><p><a href="https://infosec.exchange/tags/privacymatters" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacymatters</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/gaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gaming</span></a></p><p><a href="https://avoidthehack.com/privacy-week12-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">avoidthehack.com/privacy-week1</span><span class="invisible">2-2025</span></a></p>
Mare Polaris<p>Surprise, suprise, <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a>. </p><p>Who would have thought uh. </p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-warnings-are-true-fake-file-converters-do-push-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/fbi-warnings-are-true-fake-file-converters-do-push-malware/</span></a></p>
The New Oil<p>Popular <a href="https://mastodon.thenewoil.org/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> extensions, including ad blockers, got hijacked. Learn how to protect yourself</p><p><a href="https://adguard.com/en/blog/popular-chrome-extensions-including-ad-blockers-hijacked.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">adguard.com/en/blog/popular-ch</span><span class="invisible">rome-extensions-including-ad-blockers-hijacked.html</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/guide" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guide</span></a> <a href="https://mastodon.thenewoil.org/tags/AdBlocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AdBlocker</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>