Tumgik
#DeepInstinct
osintelligence · 7 months
Link
https://bit.ly/3SDOVXl - 🕵️ Deep Instinct's Threat Research team has uncovered a new Command and Control (C2) framework, dubbed MuddyC2Go, believed to be used by the Iranian APT group MuddyWater. This C2 framework, written in Go, has possibly been active since 2020, replacing the group's earlier framework, PhonyC2. The discovery of MuddyC2Go highlights the evolving tactics of cyber threat actors. #MuddyC2Go #CyberSecurity #APT #IranianCyberThreats 🔍 The shift from PhonyC2 to MuddyC2Go was identified through anomalies in IP addresses previously associated with MuddyWater, revealing new behaviors and tactics. Deep Instinct's findings suggest a strategic evolution in MuddyWater's operations, highlighting the need for continuous monitoring and analysis of cyber threat actors' methodologies. #CyberThreatIntelligence #DeepInstinct #CyberAttackTrends 💻 Recent MuddyWater activities using MuddyC2Go involve spear-phishing emails with password-protected archives containing executables. These executables run embedded PowerShell scripts that connect to MuddyC2Go servers, indicating a move towards more sophisticated and automated attack methods. #SpearPhishing #Malware #CyberDefense 🌍 Deep Instinct's research has linked attacks using MuddyC2Go to various geographic locations, including a Jordanian company, an Iraqi telecommunications provider, and potential targets in Israel during the recent conflict. This geographical spread underscores the global reach and potential impact of MuddyWater's cyber operations. #GlobalCyberThreats #InfoSec #GeopoliticalCyberRisks 📡 In their investigation, Deep Instinct traced the MuddyC2Go framework back to 2020 and identified multiple IP addresses linked to MuddyWater's operations. These findings are supported by reports from other security firms, further validating the ongoing and evolving threat posed by this APT group. #CyberThreatResearch #IPAnalysis #CyberSecurityAwareness 🔗 The MuddyC2Go framework is challenging to fingerprint due to its generic appearance, similar to other web applications written in Go. However, unique URL patterns generated by the framework have helped Deep Instinct identify past attacks. This demonstrates the importance of detailed analysis in cybersecurity threat identification. #CyberForensics #ThreatHunting #CyberAnalysis 🛡️ Deep Instinct recommends disabling PowerShell if it's not needed or closely monitoring its activity if enabled, as PowerShell is a key component of MuddyWater's operations. The team's ongoing research and monitoring of MuddyC2Go servers provide vital insights for the cybersecurity community in combatting such threats.
1 note · View note
hackgit · 3 years
Text
DeMotet Unpacking and decryption tools for the #Emotet malware by Deep Instinct. The first tool...
DeMotet Unpacking and decryption tools for the #Emotet malware by Deep Instinct. The first tool is a static unpacker for the variants of the Emotet loader listed in Loaders-SHA256.txt. It can extract the encrypted payload from the resource without executing the malware. https://github.com/deepinstinct/DeMotet
Tumblr media
GitHub - deepinstinct/DeMotet: Unpacking and decryption tools for the Emotet malware - GitHub Unpacking and decryption tools for the Emotet malware - GitHub - deepinstinct/DeMotet: Unpacking and decryption tools for the Emotet malware
0 notes
adrion-ir · 3 years
Photo
Tumblr media
. رشد ۳۵۸ درصدی بدافزارها در سال ۲۰۲۰ مطالعه تحقیقاتی انجام شده توسط Deep Instinct بر روی ۱۰۰ ها میلیون حملات سایبری صورت گرفته در سال ۲۰۲۰، نشان دهنده رشد ۳۵۸ درصدی بدافزارها و افزایش ۴۳۵ درصدی باج افزارها در مقایسه با سال ۲۰۱۹ است. نکات مهم این گزارش به شرح زیر می باشد: - توزیع بدافزار Emotet با ۴۰۰۰ درصد رشد، در سال ۲۰۲۰ سر به فلک کشیده است. - بدافزارهای تهدید کننده دستگاه های اندرویدی،۲۶۳ درصد رشد داشته اند. - اسناد مربوط به مایکروسافت آفیس در مقایسه با سایر اسناد، بیشترین دستکاری را با رشد ۱۱۲ درصدی داشته اند. به نقل از گای کاسبی مدیرعامل Deep Instinct ، این مساله فقط به حجم گسترده حملات محدود نبوده و مطالعات ما نشان می دهد که پیچیدگی حملات با تاکتیک های پیشرفته، بزرگترین معضل پیش روی امنیت سایبری می باشد. #bitdefender #adrion #adrion_ir #malware #ransomware #deepinstinct #cybersecurity @deepinstinct_ #emotet #android #microsoft #office #بیت_دیفندر #آدرین #امنیت #بدافزار #امنیت #شبکه — view on Instagram https://ift.tt/3aqjvxg
0 notes
chargeur-batterie · 5 years
Text
UN ORDINATEUR PORTABLE AVEC LES VIRUS LES PLUS DANGEREUX DU MONDE EN VENTE POUR 1,2 MILLION DE DOLLARS
Si vous avez énormément d'argent, vous pourriez être intéressé par l'achat de "La persistance du chaos". C'est une œuvre d'art créée par l'artiste Internet Guo O Dong. Ce n'est pas une peinture ou une sculpture. C'est un ordinateur portablerempli de six des virus informatiques les plus dangereux au monde. Six des logiciels malveillants les plus dangereux résidents dans cet ordinateur portable et pourtant, les utilisateurs seront complètement en sécurité, à condition de ne pas connecter The Persistence of Chaos au Wi-Fi ou de connecter une clé USB. L’artiste explique à The Verge que cette œuvre d’art a pour objectif de donner une représentation physique aux menaces posées par le monde numérique. L’ordinateur portable Samsung de 10,2 pouces héberge ces six virus qui ont été choisis pour le niveau de dommages économiques qu’ils ont causés. La liste comprend le virus ILOVEYOU, du début des années 2000, qui se manifestait par une lettre d’amour jointe à des mails. En outre, le ransomware WannaCry est inclus. Il verrouille la machine et interdit l’accès tant qu’une rançon n’a pas été payée. Les agences de renseignement estiment que la Corée du Nord était à l’origine de cette attaque par ransomware. DeepInstinct, une firme de cybersécurité, a commandé cette pièce et la met aux enchères. L’offre actuelle s’élève à un peu plus de 1,2 million de dollars.
Produits connexes:www.chargeur-batterie.com
0 notes
scrappycoco8000 · 5 years
Link
Some of the world’s greatest artworks are known for their elaborate backstory or complex history, but not many are actively dangerous to those who own them. ‘The Persistence of Chaos’ might be an exception. Created by internet artist Guo O Dong, this piece of art is an ordinary laptop filled with six of the world’s most dangerous pieces of malware. It’s perfectly safe â€" as long you don’t connect to your Wi-Fi or plug in a USB. Speaking to The Verge, artist Guo O Dong says the intention behind the laptop was to make physical the abstract threats posed by the digital world. “We have this fantasy that things that happen in computers can’t actually affect us, but this is absurd,” says Guo. “Weaponized viruses that affect power grids or public infrastructure can cause direct harm.” The six viruses in the laptop (a 10.2-inch Samsung NC10-14GB) were chosen for the magnitude of economic damage they’ve caused. They include the ILOVEYOU virus, a computer bug from 2000 that often appeared as a “love letter” attached to emails; and WannaCry, a ransomware attack that shut down computers in hospitals and factories around the world in 2017, and which intelligence agencies blamed on North Korea. Guo says WannaCry is the perfect example of how digital attacks can have physical consequences. “WannaCry ... caused the [UK’s National Health Service] the equivalent of $100 million in damages and led to the cancellation of tens of thousands of doctors’ appointments,” he says. “It is not a leap to say this caused significant human harm, though it might be hard to pinpoint the effects exactly down to the patient.” And these are far from historic concerns. Just this month, a ransomware attack ravaged the city of Baltimore, freezing government systems and disrupting “estate sales, water bills, health alerts.” In total, Guo estimates that the six viruses on his Samsung laptop caused economic damage worth $95 billion. The piece was commissioned by cybersecurity firm DeepInstinct, and is currently being auctioned online. You can watch a live stream of the laptop to make sure it doesn’t make any sudden moves, and keep an eye on the rising price tag, which currently sits above $1.2 million. That may seem like a lot to pay for an old laptop riddled with malware, but Guo says he likes to think of the artwork as “a kind of bestiary â€" a catalogue of historical threats.” Next time you have to fix a relation’s computer and it turns up in a similar state, try telling yourself the same thing: “Ah, what a wonderful bestiary of historical threats!” https://adstoppipro.com/blog/a-laptop-filled-with-six-of-the-worlds-most-dangerous-viruses-is-on-sale-for-more-than-a-million-dollar More blog here Via Adstoppi Blog : Blog Read more : Adstoppi
0 notes
cams-place · 7 years
Text
Tweeted
Visit:►https://t.co/URzeFHIqk5 ◄ #nudegirls with #deepinstinct on #bongacams and #nakedgirls http://pic.twitter.com/cNTFcuBlXd
— Cams Place (@Cams_Place) July 13, 2017
0 notes
wandahalpert · 7 years
Photo
Tumblr media
Fighting the #malware with the deploy of #AI #google #amazon #deepinstinct https://goo.gl/iraSm9
0 notes
mrtom93474656-blog · 7 years
Link
0 notes
cliffracer · 11 years
Link
Hey guys! I'm starting a text adventure on MSPAFA, a kind of ambitious thing that I'm pretty eager to get moving. It's about survival, evolution and imagining things the way you like.
The blog that contains the suggestion box is here, but much is missed if you aren't viewing it on MSPAFA. I'll probably use that blog for OOC stuff, too.
I'm on my first page and I need suggestions!
2 notes · View notes