https://securelist.com/andariel-evolves-to-target-south-korea-with-ransomware/102811/

 

Andariel evolves to target South Korea with ransomware

We observed a novel infection scheme and an unfamiliar payload. After a deep analysis, we came to a conclusion: the Andariel group was behind these attacks.

securelist.com

참고

블로그 이미지

wtdsoul

,

securelist.com/lazarus-covets-covid-19-related-intelligence/99906/

 

Lazarus covets COVID-19-related intelligence

While tracking the Lazarus group’s continuous campaigns targeting various industries, we discovered that they recently went after COVID-19-related entities.

securelist.com

 

 

 

블로그 이미지

wtdsoul

,

www.igloosec.co.kr/BLOG_%EC%95%8C%EC%95%84%EB%B3%B4%EC%9E%A1%20Series%20%204)%20OT(Operational%20Technology)%EC%99%80%20%EC%95%85%EC%84%B1%EC%BD%94%EB%93%9C%20:%20Part1.%20Industroyer?searchIte

 

One Step Ahead 이글루시큐리티

보안정보 차세대 통합보안관리 기업 이글루시큐리티 보안정보입니다. 전문화된 보안 관련 자료, 보안 트렌드를 엿볼 수 있는 차세대 통합보안관리 기업 이글루시큐리티 보안정보입니다.

www.igloosec.co.kr

 

 

 

블로그 이미지

wtdsoul

,

www.boho.or.kr/data/reportView.do?bulletin_writing_sequence=35798

 

KISA 인터넷 보호나라&KrCERT

KISA 인터넷 보호나라&KrCERT

www.boho.or.kr

 

블로그 이미지

wtdsoul

,

www.igloosec.co.kr/BLOG_%EC%95%85%EC%84%B1%EC%BD%94%EB%93%9C%EB%A1%9C%20%EC%95%8C%EC%95%84%EB%B3%B4%EB%8A%94%20Reflective%20DLL%20Injection?searchItem=&searchWord=&bbsCateId=1&gotoPage=1

 

One Step Ahead 이글루시큐리티

보안정보 차세대 통합보안관리 기업 이글루시큐리티 보안정보입니다. 전문화된 보안 관련 자료, 보안 트렌드를 엿볼 수 있는 차세대 통합보안관리 기업 이글루시큐리티 보안정보입니다.

www.igloosec.co.kr

 

 

'악성코드(Malware)' 카테고리의 다른 글

lazarus covets malware  (0) 2020.12.25
OT(Operational Technology) 와 악성코드  (0) 2020.12.09
기업 랜섬웨어 KISA  (0) 2020.11.19
Microsoft leaks info on wormable Windows SMBv3  (0) 2020.03.13
HWP + SlackBot Malware Analysis  (0) 2019.11.21
블로그 이미지

wtdsoul

,

 

http://bleepingcomputer.com/news/security/microsoft-leaks-info-on-wormable-windows-smbv3-cve-2020-0796-flaw/

 

Microsoft Leaks Info on Wormable Windows SMBv3 CVE-2020-0796 Flaw

Microsoft leaked info on a security update for a 'wormable' pre-auth remote code execution vulnerability found in the Server Message Block 3.0 (SMBv3) network communication protocol that reportedly should have been disclosed as part of this month's Patch T

www.bleepingcomputer.com

Desktop and server Windows 10 versions impacted

Devices running Windows 10 Version 1903, Windows Server Version 1903 (Server Core installation), Windows 10 Version 1909, and Windows Server Version 1909 (Server Core installation) are impacted by this vulnerability according to a Fortinet advisory, although more versions should be affected given that SMBv3 was introduced in Windows 8 and Windows Server 2012.

"An attacker could exploit this bug by sending a specially crafted packet to the target SMBv3 server, which the victim needs to be connected to," Cisco Talos explained in their Microsoft Patch Tuesday report — this was later removed by the Talos security experts.

"The exploitation of this vulnerability opens systems up to a 'wormable' attack, which means it would be easy to move from victim to victim," they also added.

Fortinet says that upon successful exploitation, CVE-2020-0796 could allow remote attackers to take full control of vulnerable systems.

Due to Microsoft's secrecy, people are coming up with their own theories regarding the malware and its severity, some comparing it to EternalBlue, NotPetya, WannaCry, or MS17-010 (1, 2).

Others have already started coming up with names for the vulnerability such as SMBGhost, DeepBlue 3: Redmond Drift, Bluesday, CoronaBlue, and NexternalBlue.

 

ing

블로그 이미지

wtdsoul

,

https://lysine7.tistory.com/66?fbclid=IwAR3cnuk06fpzen6zCnNeRzUp7SNC4bcCj_dRMdV6-0gxwgvyjgQ2iJC6lh0

 

HWP + SlackBot Malware Analysis

개요 : 2019년11월4일 바이러스토탈에서 악성으로 추정되는 2개의 샘플이 헌팅되었으며 각각의 파일은 다른 파일명과 내용을 가지고 있고 바이러스 토탈의 서브미션 정보도 달랐지만 내부에 포함된 포스트스크립트..

lysine7.tistory.com

 

블로그 이미지

wtdsoul

,