AhnLab SEcurity intelligence Center (ASEC) has been publishing the Online Scams series to inform the readers about the ever-evolving scams. Prevention and blocking are the two most important measures to mitigate the damage inflicted by scams. Various security providers are supporting features to detect and block the damage from scams, financial frauds, and phishing.…

Read More
Spain’s most wanted cybercriminal arrested in Romania

A mastermind behind the organized crime group responsible for various online fraud schemes has been detained in Bucharest, Romania. The individual, who had been on the run for several years, is linked to over 300 reported fraud cases across Spain, with illicit financial transactions totaling 10 million euros.…

Read More

Summary: This blog discusses AI jailbreaks, their impact on generative AI systems, and how to mitigate the associated risks and harms.

Threat Actor: N/A

Victim: N/A

Key Point :

An AI jailbreak is a technique that can bypass the defense mechanisms of AI models, leading to harmful consequences such as policy violations, biased decision-making, or execution of malicious instructions.…
Read More

IT threat evolution Q1 2024 IT threat evolution Q1 2024. Mobile statistics IT threat evolution Q1 2024. Non-mobile statistics

Targeted attacks Operation Triangulation: the final mystery

Last June, we published a series of reports on Operation Triangulation, a previously unknown iOS malware platform distributed via zero-click iMessage exploits that allowed an attacker to browse and modify device files, get passwords and credentials stored in the keychain, retrieve geo-location information and execute additional modules that extended their control over compromised devices.…

Read More
Why AI Will Not Fully Replace Humans in Web Penetration TestingContextual Understanding:AI handles large data volumes and identifies patterns. Human testers understand the business context, industry specifics, user behavior, and regulatory requirements. They prioritize findings based on potential impact on organizational objectives.Adaptability to Novel Threats:AI detects known vulnerabilities but may struggle with novel attack vectors or zero-day exploits.…
Read More

This time, we’re not revealing a new cyber threat investigation or analysis, but I want to share some insights about the team behind all Sekoia Threat Intelligence and Detection Engineering reports. Let me introduce you to the Sekoia TDR team.

TL;DRSekoia Threat Detection & Research (TDR) is a multidisciplinary team dedicated to Cyber Threat Intelligence and Detection Engineering for the Sekoia SOC Platform.…
Read More

*replace .bawang with .onion (use TOR to access it)*source: https://www.breachsense.com/

Darknet MarketsNameURLStatus0-DAYhttps://0-day.shopONLINEStealer credential leakshttps://whiteintel.ioONLINEDarth maul shophttps://1977.ws/ONLINE2EASYhttps://2easy.ccONLINEAlphaBay (Dark i2p)https://tnaefzkcnhryeusi7hdpqujqiqmnbtah3dmjcg3gvezohunjuxbq.b32.i2pONLINEAlphaBay (Dark Tor)http://alphabay522szl32u4ci5e3iokdsyth56ei7rwngr2wm7i5jo54j2eid.bawangONLINEArchetyphttp://4pt4axjgzmm4ibmxplfiuvopxzf775e5bqseyllafcecryfthdupjwyd.bawangONLINEAREShttp://sn2sfdqay6cxztroslaxa36covrhoowe6a5xug6wlm6ek7nmeiujgvad.bawangONLINEASEANhttp://asap2u4pvplnkzl7ecle45wajojnftja45wvovl3jrvhangeyq67ziid.bawangONLINEBIDEN CASH (Dark Tor)http://bidenjxwb7khlh3djrmi6zkkmggiuoh6cnxll7my7uk25ohe27pcfryd.bawangONLINEBIDEN CASH (free CVV – dark web)http://l5wy5mo2bqv4pm5ozschtmqool2uwju4emahlqzfxlwsdgxtppjcblad.bawangONLINEBIDEN CASH (free CVV – deep web)https://bidencash.stONLINEBLACKBONEShttps://blackbones.netONLINEBLACKPASShttp://blackpasspn7734jqltjj2qx4qez5gcpcwujuugymky3lzcmmcfpzbyd.bawangONLINEBOHEMIAhttp://bohemiaobko4cecexkj5xmlaove6yn726dstp5wfw4pojjwp6762paqd.bawangONLINEBOHEMIAhttp://bohemia65jifi6rj3dcvu23tks5teidk6wllndg62vb37f57e6ymtgid.bawangONLINEBRAINSCLUBhttps://brainsclub.toONLINEBRIAN’S CLUBhttps://briansclub.cmONLINEBR0K3Rhttp://brok3r7bhcblynwpoymgarr6zwcy4ttfbhkhcmotz4lw2gcsuojgaeqd.bawang/ONLINEB-P Markethttps://b-p.sale/ONLINECABYChttp://cabyceogpsji73sske5nvo45mdrkbz4m3qd3iommf3zaaa6izg3j2cqd.bawangONLINECARD STOREhttps://carding.storeONLINECARDING TEAMhttps://cardingteam.ruONLINECARDVILLAhttps://cardvilla.ccONLINECRIMEMARKEThttps://crimemarket.isONLINECRIMEMARKET (Dark)http://crimemosjicmij6jqtwww7wm2rmor5ymrs6wha6tzyiisxhy34go5sid.bawang/ONLINECVV SHOP DUMPShttp://masterc2oss6cmeiwd6hzz44ghjdvkw2og6zv5iczcrssrbkrbuhn3qd.bawangONLINECYPHERhttp://6c5qaeiibh6ggmobsrv6vuilgb5uzjejpt2n3inoz2kv2sgzocymdvyd.bawangONLINEDARKCLUBhttps://darkclub.pw/ONLINEDARKCLUB (Onion Site)http://darkclubolst4fiquh7eodn3gffa4jr3y6nrfdxxii3hboulgotjj4ad.bawangONLINEDARKCLUB (Onion Site 2http://darkclub7swbzf2ndqowmijp735urtfv6vp5z327vdga5iltlwzyapid.bawang//ONLINEDARK…
Read More

No one is safe from scams. In fact, scams targeting corporations and organizations employ meticulously social-engineered attack scenarios. Unlike smishing targeting individuals or online shopping scams, such attacks design tailored phishing scenarios based on previously collected information about the target. As such, it is not easy for the victim organization to recognize the scam.…

Read More
Email forensics overview

Email forensics involves the examination, extraction, and analysis of email data to gather digital evidence crucial for resolving crimes and specific incidents, ensuring the integrity of the investigation process.This investigative process encompasses various aspects of emails, focusing on:

Email content, including messages and attachments.…
Read More

This post is a continuation of "Malware Unpacking With Hardware Breakpoints".

Here we will be utilising Ghidra to locate the shellcode, analyse the decryption logic and obtain the final decrypted content using Cyberchef.

Locating the Shellcode Decryption Function In Ghidra

At the point where the hardware breakpoint was first triggered, the primary executable was likely in the middle of the decryption function.…

Read More

Leveraging Ghidra to establish context and intent behind suspicious strings. Taking things one step further after initial analysis tooling like Pe-Studio and Detect-it-easy.

This is a great technique for working with Ghidra and establishing a starting point for analysis. It reduces total investigation time and allows one to determine why and how a string is contained within a file.…

Read More