Beyond Flesh and Code: Building an LLM-Based Attack Lifecycle With a Self-Guided Malware Agent
This article discusses the integration of older automation tools with large language models (LLMs) to enhance malware development and delivery methods, including the use of tools like Mantis and Stopwatch.ai for reconnaissance and obfuscation. It highlights the potential of LLMs in creating convincing phishing attacks and guiding malware operations, ultimately leading to a more sophisticated attack lifecycle.…
Read More

Summary :

Curiosity drives cybersecurity professionals to explore attack methodologies for effective defense. This article discusses innovative techniques for DLL injection and privilege escalation discovered through research on Microsoft Office’s RPC servers and the App Compatibility framework. #Cybersecurity #DLLInjection #PrivilegeEscalation

Keypoints :

Curiosity is essential for cybersecurity professionals to understand attack methodologies.…
Read More
Key Takeaways “UAC-0099” is a threat actor that has targeted Ukraine since mid-2022 Deep Instinct Threat Lab has identified new attacks by the threat actor The threat actor was observed leveraging CVE-2023-38831 The threat actor targets Ukrainian employees working for companies outside of Ukraine Introduction

In May 2023, the Ukrainian CERT published advisory #6710 about a threat actor dubbed “UAC-0099.”…

Read More

The contents of this blog post were originally scheduled to be presented during an upcoming cybersecurity conference. However, interest in this topic has heightened due to the war in Israel and a suspected ongoing attack against Israeli targets. As such, we have decided to publish the relevant findings from the presentation now.…

Read More