CyberNews

PowerShell Obfuscation

Topics: AMSI | Layer 0 Obfuscation | Breaking Down a Reverse Shell | Stepping Into the Gauntlet | Invoke-PSObfuscation.ps1 | Wrapping Up | Resources This blog post was originally published

Read More »

LockBit Resurfaces With Version 2.0 Ransomware Detections in Chile, Italy, Taiwan, UK

Trend Micro – SHA-256 Filename Detection 0545f842ca2eb77bcac0fd17d6d0a8c607d7dbc8669709f3096e5c1828e1c049   Ransom.Win32.LOCKBIT.YXBHJ-T 0906a0b27f59b6db2a2451a0e0aabf292818e32ddd5404d08bf49c601a466744    Ransom.Win32.LOCKBIT.SMYEBGW 21879b5a8a84c5fe5e009c85744caf74b817c57203020bf919037d7ccb6b6a58   Ransom.Win32.LOCKBIT.SMCET 255f8465962bedaf7a373da5f721aecbc1d6027ca2e4256c6c4352f2de179ca0     Restore-My-Files.txt         Ransom.Win32.LOCKBIT.ENE.note     4db47caf8d93e855b8364def67d3d3282fc964dc4684df6bbe172ea6e902e6fe 7b64ca8fe1cace0744a28f43961f17f8ea51910a54d6629502bfb9f3f3e5f831 8c0e4a6fd28f94fa17a96f6e424b122f5d1216b230a33c6dff5dbf6654d0721c a05ed65787b390ba33b04b4b99c3810cbaf684b37f8839e57db8316e6f01af31

Read More »

Is GDPR Making Ransomware Worse?

As a landmark piece of legislation, the General Data Protection Regulation (GDPR) was undoubtedly created with the safety and privacy of European consumers’ personal data in mind. However, while certainly

Read More »

DirtyMoe: Rootkit Driver

Avast –  Abstract In the first post DirtyMoe: Introduction and General Overview of Modularized Malware, we have described one of the complex and sophisticated malware called DirtyMoe. The main observed

Read More »

An expert discussion on XDR

Trend Micro – As new security tools and acronyms crop up, one stands above the rest. Greg Young, vice president of cybersecurity at Trend Micro and former Gartner analyst, tags

Read More »

CyberCX Security Report | August 2021

Read the full story On 13 July 2021, the Australian Government opened consultation on options for regulatory reforms and voluntary incentives to strengthen the cyber security of Australia’s digital economy.

Read More »

Cinobi Banking Trojan Targets Cryptocurrency Exchange Users via Malvertising

Trend Micro – SHA256 File name Note Analysis 124FE26D53E2702B42AE07F8AEC5EE4E79E7424BCE6ECDA608536BBF0A7A2377 oneroom_setup.zip Malicious game archive Trojan.Win32.SHELLOAD.AZ E667F9C109E20900CC8BADD09EDE6CDCE0BDC77164CFD035ACE95498E90D45E7 oneroom_game.zip Malicious game archive Trojan.Win32.SHELLOAD.AZ 93FFE7CF56FEB3FB541AEF91D3FC04A5CF22DF428DC0B7E5FEB8EDDDC2C72699 Magicalgirl.zip Malicious game archive Trojan.Win32.SHELLOAD.AZ AD13BB18465D259ACC6E4CEBA24BEFF42D50843C8FD92633C569E493A075FDDC kiplayer.zip Malicious streaming

Read More »