Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @mathieutartare
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mathieutartare
-
Mathieu Tartare proslijedio/la je Tweet
ESET has released their report on new variants of
#Shadowpad/#Winnti, used against two universities in Hongkong.https://www.welivesecurity.com/2020/01/31/winnti-group-targeting-universities-hong-kong/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
#ESETresearch uncovered a new campaign of the#Winnti Group targeting#HongKong universities with ShadowPad and Winnti.@mathieutartare https://www.welivesecurity.com/2020/01/31/winnti-group-targeting-universities-hong-kong/ … 1/3pic.twitter.com/d57V1rhBR1
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
Un must si vous vous demandez à quoi ça ressemble un stage en reverse engineering chez ESET!https://twitter.com/montrehack/status/1215447238165565440 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Mathieu Tartare proslijedio/la je Tweet
After years of relying on click fraud, ad injection, social network fraud and credential stealing,
#Stantinko botnet has started to mine#Monero. Today,#ESETresearch dives deeper into Stantinko's new#cryptomining business model. https://www.welivesecurity.com/2019/11/26/stantinko-botnet-adds-cryptomining-criminal-activities/ …pic.twitter.com/od7rBMxyeO
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
Investigating a
#cyberattack in Central Europe and the Middle East,#ESETresearch discovered a highly unusual downloader. Apart from other nontraditional techniques, the#DePriMon#malware also poses as a default print monitor.https://www.welivesecurity.com/2019/11/21/deprimon-default-print-monitor-malicious-downloader/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
I don’t endorse the vocabulary in this tweet but I’d like to share our side of things and perhaps set the records straight. We never really wanted to (and still don’t want to) discredit Dragos publicly, there is really no point. 1/xhttps://twitter.com/osxreverser/status/1195750979876085766 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
Yup. Doesn't mean its useless though. The alternative to this handshake agreement / social contract is an NDA. Failure to honor your word gets you kicked out of trust circles and isolated, failure to honor an NDA gets you into court.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
For a while now,
@ESETresearch has been tracking the activities of the#WinntiGroup. Recently, we discovered a backdoor targeting#MSSQL, allowing attackers to maintain a very discreet foothold inside compromised organizations.@welivesecurity --> https://bit.ly/2pD3M9b pic.twitter.com/w0ql9QD4En
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
skip-2.0 exhibits multiple similarities with other tools from the
#Winnti Group's arsenal:
VMProtected launcher
RC5-encrypted payload with key derived from Volume ID
Custom packer
Inner-Loader injector
hooking procedure
#ESETresearch@mathieutartare 3/3pic.twitter.com/mHIILVkBDk
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
#ESETResearch discovered an undocumented#MSSQL Server backdoor called skip-2.0 and part of the#Winnti Group's arsenal that allows to bypass normal authentication by using a magic password.@mathieutartare https://www.welivesecurity.com/2019/10/21/winnti-group-skip2-0-microsoft-sql-server-backdoor/ … 1/3pic.twitter.com/un1nkEeveY
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
Wskip-2.0 targets
#MSSQL Server 11 and 12 which are the most commonly used versions according to@censysio's data#ESETresearch@mathieutartare https://www.welivesecurity.com/2019/10/21/winnti-group-skip2-0-microsoft-sql-server-backdoor/ … 2/3pic.twitter.com/YN5UhREmCs
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
#ESETresearch discovers a trojanized#Tor Browser distributed by#cybercriminals to steal bitcoins from#darknet market buyers.@cherepanov74 fighting#cybercrime everywhere! https://www.welivesecurity.com/2019/10/18/fleecing-onion-trojanized-tor-browser/ …pic.twitter.com/60omVfNMr5
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
We found some code similarity between
#PolyglotDuke and#OnionDuke#ESETresearch 4/4pic.twitter.com/HFynR3QkrO
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
Full paper: https://www.welivesecurity.com/wp-content/uploads/2019/10/ESET_Operation_Ghost_Dukes.pdf … As always, IoCs and
@MISPProject event are available on our GitHub account: https://github.com/eset/malware-ioc/tree/master/dukes … The attackers reused Miniduke that was first described 6 years ago. 3/4pic.twitter.com/aRdIIHOHEN
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
#ESETresearch discovered 3 new malware families part of the#Dukes/#APT29 arsenal:#PolyglotDuke,#RegDuke and#FatDuke
Twitter, Reddit as C&C
C&C communications in pictures
3 European MFAs + 1 embassy in Washington, DC
2013 to June 2019
https://www.welivesecurity.com/2019/10/17/operation-ghost-dukes-never-left/ … 2/4pic.twitter.com/w3GfKbVyzH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
Despite being implicated in the
#DNC hack in 2016, the#Dukes APT group managed to stay under the radar for several years. Yet, as newest#ESETresearch uncovers, they never ceased their#espionage activities.@matthieu_faou@nyx__o@mathieutartare https://www.welivesecurity.com/2019/10/17/operation-ghost-dukes-never-left/ … 1/4pic.twitter.com/7znw2HDyFZ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
#ESETresearch: PortReuse uses techniques similar to the#Winnti malware, such as waiting for a magic packet and modular architecture, but is a different beast. https://www.welivesecurity.com/2019/10/11/connecting-dots-exposing-arsenal-methods-winnti/ …pic.twitter.com/VvEjsxmDFy
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
#ESETresearch: Before you all say it wrong, we pronounce#Winnti “Win N.T.I”, not “Winn T.I.”. (While we are at it, it’s GIF not JIF.) If you run an online casino and server component is called “GameServer_NewPoker.exe”, you may be compromised by Winnti. https://www.welivesecurity.com/2019/10/11/connecting-dots-exposing-arsenal-methods-winnti/ …pic.twitter.com/3LjEr8xHeY
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mathieu Tartare proslijedio/la je Tweet
#ESETresearch#Winnti For attackers, changing a string is easy, but changing a whole structure requires more resources. That’s why we try to use the techniques they use to hunt for their arsenal. Sometimes, it works.pic.twitter.com/0hJoCIgchQ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.