Retrospectiva na Tecnologia

Retrospectiva na Tecnologia

  • News
  • Feed
  • Ajuda
  • Blog

›OSINT Newsletter

MSSQLTips

  • New Feature in SQL Server 2019 : Scalar UDF Inlining (MSSQLTips 11/12/2018)
  • Learn SQL Server Stored Procedures (MSSQLTips 11/9/2018)
  • Querying SQL Server Tables from .NET (MSSQLTips 11/14/2018)
  • SQL Server Transparent Data Encryption Alternative (MSSQLTips 11/16/2018)
  • Cost Effective SQL Server Encryption (MSSQLTips 11/19/2018)
  • Write More Compact SQL Server Code (MSSQLTips 11/20/2018)
  • SQL Server on Linux Tips (MSSQLTips 11/27/2018)

IT Forum 365

  • Confira as notícias que preparamos para você!
  • Vem conferir o que preparamos para você 😉

Feedspot Today

  • Serverless PHP on AWS Lamda
  • Interview with Josh Holmes, Interview with Josh Holmes, 405 Method Not Allowed
  • Security Vulnerability Announcement: Archive_Tar

ImmuniWeb

  • Cybercrime & Application Security Weekly Briefing

InfoQ

  • Oracle fala sobre Blockchain, Bots e Serveless, JPA 2.2, RFC no React e mais!
  • 9 perguntas sobre REST, Product Management no Nubank, Scrum em Escala e mais!
  • 5 coisas que todo desenvolvedor deve saber, novo message broker da AWS , e mais!
  • Especial .NET e Plataformas Microsoft
  • Android Things, Kubernets, FPGAs, Github, Oreo Go, Nodejs e muito mais!

JavaScript Weekly

  • JavaScript Weekly - 458 OCTOBER 11, 2019
  • JavaScript Weekly - 457 OCTOBER 4, 2019
  • Angular 9, a new decimal datatype for JS, and how to read specs

Versioning

  • Versioning Front-end - Spellbound
  • Versioning Front-end - Scroll Lot of Love
  • Command and Conquer
  • Flying on Autopilot - 30 de jan de 2019

Phrack Inc

  • Phrack Inc Volume One - Issue Two
  • Phrack Inc Volume One - Issue One

Newsletter Ionic.IO

  • Ionic Dev Newsletter - Dec. 2018 ‘Tis the season for exciting updates!
  • Tutorials & Guides from the Ionic Community - December 2018

BossaBox Newsletter

  • Metodologias Ágeis, Importância do SEO, Ferramentas all-in-one de Gestão, Desenvolvimento e Design e Melhores do Medium!

Wolfram Insider

  • Your Insider briefing - COVID-19 special edition
  • Wolfram Community Insider - Quarter 1, 2019
  • Wolfram Community Insider - Quarter 4, 2018

Open Infrastructure Foundation

  • Today's OpenInfra News

Talkwalker Alerts - Alert for IPFS

  • Talkwalker Alerts - Alert for IPFS | 13 de novembro de 2021
  • Talkwalker Alerts - Alert for IPFS | 12 de novembro de 2021

Talkwalker Alerts - Alert for Hyperledger

  • Talkwalker Alerts Alert for Hyperledger | 12 de novembro de 2021

Talkwalker Alerts - Alert for OSINT

  • Talkwalker Alerts | Alert for OSINT - 29 de abril de 2022
  • Talkwalker Alerts | Alert for OSINT - 28 de abril de 2022

Banco Central - Feeds do BC

  • Notícias e notas - Notas técnicas
  • Notícias e notas - Nota à imprensa
  • Normativos - Resoluções
  • Normativos - Comunicados do Banco Central
  • Pix API Issue Github
  • Pix DICT API Issue Github

PYMNTS

  • The Week in Review (Plus, It’s a Very Vending Machine Christmas)

Finextra

  • Finextra RSS Feeds - Payments
  • Finextra RSS Feeds - Developer

OSINT Newsletter

  • OSINT Newsletter April 2022 - 26 de abr. de 2022

CAPEC

  • CAPEC - Common Attack Pattern Enumerations and Classifications

OSINT Newsletter April 2022 - 26 de abr. de 2022

OSINT Newsletter April 2022 - 26 de abr. de 2022

View this email in your browser

Newsletter Date:  April 2022


In This Issue:
  • Upcoming OSINT Training Events
  • Upcoming Speaking Events by Sandra Stibbards
  • Scheduled Tasks Hide Malware
  • Ukraine Faces Malware Attack
     
Related Links:

http://opensourceintelligencetraining.org/

http://www.camelotinvestigations.com


WHO CAN BENEFIT FROM OSINT TRAINING?
Previously only available to federal agencies and employees, our Open Source Intelligence Training™ classes are now open to a wide range of professionals, including: financial institutions, intel analysts, compliance officers, licensed investigators, active & retired law enforcement, security specialists, attorneys & paralegals, background screening agencies, forensics examiners, IT specialists, human resources directors, office managers, CEOs and upper management in all industries.

NEW ONLINE TRAINING COURSE:
OPEN SOURCE INTELLIGENCE FOR PROFESSIONALS

Created by Camelot Investigations and Covered 6 LLC
  • Does your profession require you to use the Internet to conduct research and information-gathering to support your investigations of data collection and compliance?

Take your investigations and intel-gathering to the next level with this Open Source Intelligence course from Sandra Stibbards of Camelot Investigations. She has taught this exact course to a wide variety of top-level government agencies with resounding success. For the first time ever, she is bringing this course online and only at Covered 6 Institute. Sandra has partnered with Covered 6 to create this powerful online training.
https://covered6institute.com/osint/


6-Webinar Series:  2 Courses with 3 90-minute Webinars Per Course
Cyber Investigations Using Open Source Tools: Harnessing Intelligence from the Web to Excel in Investigations, Due Diligence and More
Presented by Sandra Stibbards
* Certificate Course for Continuing Education
* Register for On-Demand access:
https://adcg.org/cyber-investigations-using-open-source-tools/


Upcoming 2-Day / 1-Day OSINT Training Events: 

* 2-Day OSINT Training April 28-29, 2022 in Phoenix, AZ, Hosted by Walker & Associates, Sponsored by Thomson Reuters CLEAR

* 2-Day OSINT Training May 19-20, 2022 in Fort Lauderdale, FL, Hosted by Prosegur, Sponsored by Thomson Reuters CLEAR


2-Week / 1-Week Private OSINT Training Events: 

* 2-Week and 1-Week Private OSINT Trainings Being Offered in Partnership with Covered 6 LLC. Contact Us For Details.

Upcoming Speaking Events by Sandra Stibbards:

*  Sandra Stibbards will be speaking with Lee McWhorter of Covered 6 at RSA 2022 in San Francisco, June 6-9, 2022

* Sandra Stibbards will be speaking at the 2022 NALI Conference, June 22-24, 2022

* Sandra Stibbards will be speaking at 2022 GSX in Atlanta, GA, September 12-14, 2022 - Sandra will present on September 12 at 2 pm and September 13 at 10 am


Podcasts with Sandra Stibbards:

* Listen to the free podcast, Protective Future - What's on the horizon? Online Dating Risks and Threats from April 2022 with Scot Walker of Walker & Associates
https://opensourceintelligencetraining.org/podcasts/

* Listen to the free podcast, Protective Future - What's on the horizon? Episode 6, Future of the Investigations Industry, of Sandra Stibbards with Scot Walker of Scot Walker & Associates.  https://opensourceintelligencetraining.org/podcasts/

* Listen to the free podcast, How To Rocket Your PI Business, of Sandra Stibbards with John A. Hoda of The PI Coach.  https://thepicoach.com/rocket-31/
https://opensourceintelligencetraining.org/podcasts/
Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn

News from OSINT Training

Scheduled Tasks Hide Malware
Scheduling a task can save a lot of time. Whether you want your calendar to pull up to take on the day, automatically updating systems, or need to play the perfect playlist, scheduled tasks are a blessing. However, a new form of malware looks to take advantage of those scheduled tasks.
 
The malware will disguise itself, hiding behind scheduled tasks. Not only does it hide behind them, but it will also create a task to hide itself. The malware has been named Tarrask and is used by a Chinese-backed hacking group called Hafnium.
 
How Does Tarrask Work?
Executing an unknown Windows flaw, Tarrask is able to hide itself behind the task scheduled. It is able to do this through removing the Security Descriptor registry value and basically elevate itself in a user’s system. Once there, it can manifest itself to make things more difficult to remove and take out.
 
Once it is embedded on a system, it is difficult to remove. It maintains access even when a system is restarted and may have removed on-disk artifacts. No matter how many restarts are completed, the malware is still located behind those scheduled tasks.
 
Who is Affected?
Microsoft was the first to report the issue, and they had been monitoring the malware for roughly six months from August 2021 to February 2022. They found that telecom, internet service providers, and data service sectors were all victims of Tarrask.
 
While there are possibly more victims that haven’t come forward, it is interesting to see how such a simple piece of malware can manipulate different machines. Even though companies haven’t come out yet, at least Microsoft did release a security update to help patch up their devices.
 
Who is Hafnium?
Hafnium has completed attacks on Windows devices before, making them no stranger to the tech giant. It is proven they are a Chinese-backed hacker group that has come up recently, with one of the earlier incidents occurring in March 2021. Not only that, but they were also involved in a global scale exploitation using zero-day flaws.
 
The main victims Hafnium target are U.S. based. Not only are telecom and internet providers targets, but defense companies and researchers have also been targeted. Think tanks are also considered possible victims, given what information is available to them. Given the dynamic relationship between the U.S. and China, this chapter of espionage continues.
 
How to Combat the Malware
Malware can be difficult to remove, especially if you’re not sure where to look. Microsoft has provided step-by-step instructions on how to remove the malware affecting your device through their website.
 
If you cannot access the site, you can use Microsoft Defender Antivirus to remove the malware yourself. The malware can be identified with a Tarrask or Ligolo tag, along with ScheduledTaskHide command. From there, you can use the antivirus to remove the malware and ensure your device is clean and safe from further issues.
 
Best Malware Tools
Though Microsoft and other tech companies do a solid job at fixing security issues, it’s never a terrible idea to incorporate some added security. Whether you want to analyze a new string of malware or need to shore up your security protocols, these five malware tools are perfect for any situation:
 

  • Cuckoo Sandbox
    • Created in 2010, this tool has been a widely used malware analysis tool. It works for Windows, Linux, Android, and OS X systems, allowing for multiple types of uses. It takes files and isolates them in order to examine how the files act alone from everything else. Once that’s completed, it allows you to accept or delete suspicious files.
 
  • Google Rapid Response (GRR)
    • Malware tends to leave behind evidence, and this tool is perfect for catching shifty malware. It works like a reverse man-in-the-middle attack to section off malware and catch it. Once that’s completed, a security team can analyze the data and extinguish any future attempts.
 
  • Remnux
    • Linux users can utilize a variety of malware tools, and this one is no exception. If you want to find out how malware was made and how it works, this is the tool you’ll need to use. It allows you to look at browser-based malware, making it easy to determine what you’re dealing with and how to stop it.
 
  • Yara Rules
    • Classifying malware can give you the information you need to prevent zero-day attacks. Since most malware is built on older codes and pieced together, having the classification can give you a leg up on preventing attacks.
 
  • Bro
    • Mixing in an intrusion detection system, signature-based, and anomaly-based detections make this tool a powerful ally against malware. It can also allow you to conduct forensic investigations, network monitoring, and protocol analysis to ensure your network is secure from various types of malware.
 
Resources:
https://cyware.com/news/hafniums-new-malware-hides-behind-scheduled-tasks-2f9f7bdf

https://www.microsoft.com/security/blog/2022/04/12/tarrask-malware-uses-scheduled-tasks-for-defense-evasion/

https://www.theregister.com/2022/04/14/microsoft-tarrask-malware-in-windows/

https://www.bleepingcomputer.com/news/security/microsoft-new-malware-uses-windows-bug-to-hide-scheduled-tasks/

https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/

https://www.cyberbit.com/blog/endpoint-security/open-source-malware-analysis-tools/

https://cuckoosandbox.org/

https://github.com/google/grr

https://remnux.org/

https://securityintelligence.com/signature-based-detection-with-yara/

https://zeek.org/
 
 
 
 
Ukraine Faces Malware Attack
By now, most of the world knows about the Russian invasion of Ukraine by foot soldiers, but Ukraine also faces malware attacks on their governing body. This malware is attached to email addresses, sent out to government officials, and takes hold from there.
 
The phishing scam has been caught and has used different methods to infect computers and other devices. It has used JavaScript in previous versions but has now started using an infected Excel file that would allow anyone to remote into a computer or other device. The malware has been dubbed IcedID.
 
What is IcedID?
IcedID is a modular banking trojan virus. It has been used to steal account credentials and as a loader for secondary malware or ransomware. The way it works is through a malicious file that the recipient must open and download.
 
The file the download contains is GzipLoader malware. Once it is downloaded, it fetches, decrypts, and executes the final payload which is what IcedID is. When it runs, anything on the afflicted device is fair game for the bad actors. It has gotten to the point where President Zelenskyy has received emails with the malware.
 
Who is Phishing?
The most obvious culprit is Russia, though they have not been officially linked to the IcedID malware attacks. They have contributed to other attacks against Ukraine since the start of the invasion. 
 
The attacks use a variety of means, which include; embedding Excel documents, using another phishing campaign involving the Latvian government, and even attacking electric transformers. The ways which Russia has plotted its attack against its neighboring countries is abhorrent. However, it does look like there has been plenty of resistance to the physical front, as well as the cyber security route.
 
Best Anti Phishing Tools
While being vigilant against phishing scams is crucial, having some extra security is a good thing. Here are some anti phishing tools for you:
 
  • Area 1 Horizon Anti-Phishing Service
    • This cloud-based service allows you to protect compromised emails to prevent accidental clicks on phishing attempts. It’s great for small and large enterprises.
 
  • Cofense
    • This anti phishing specialist offers different options to help prevent phishing attacks against your company. The regular training is integral to ensure your data is safe.
 
  • GreatHorn
    • To prevent Microsoft products from being used against you, this is an excellent choice. If you’re a small or large company, this is an option worth considering.
 
References:
https://thehackernews.com/2022/04/new-hacking-campaign-targeting.html

https://www.bleepingcomputer.com/news/security/hackers-target-ukrainian-govt-with-icedid-malware-zimbra-exploits/

https://cyware.com/news/new-icedid-malware-campaign-targets-ukrainian-government-07870d8e

https://www.toolbox.com/it-security/vulnerability-management/articles/top-10-anti-phishing-software/

https://www.area1security.com/overview/

https://cofense.com/solutions/topic/security-awareness-solutions/

https://www.greathorn.com/
 
 
 
Matt Pella, Contributing Writer

Copyright © 2022 Camelot Investigations, All rights reserved.

unsubscribe from this list    update subscription preferences 

 

← Finextra RSS Feeds - DeveloperCAPEC - Common Attack Pattern Enumerations and Classifications →
Retrospectiva na Tecnologia
Docs
Getting Started (or other categories)Guides (or other categories)API Reference (or other categories)
Community
User ShowcaseStack OverflowProject ChatTwitter
More
BlogGitHubStar
Facebook Open Source
Copyright © 2022 Facebook Inc.