• Make Malware Happy, (Mon, Jan 6th)

    When I teach FOR610[1], I like to use a funny quotation with my students: “Make malware happy!” What does it mean? Yes, we like malware, and we need to treat it in a friendly way. To help the malware work or detonate successfully, it’s recommended that we replicate the environment where it was discovered (or…

    Read More

  • ISC Stormcast For Monday, January 6th, 2025 https://isc.sans.edu/podcastdetail/9266, (Mon, Jan 6th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • SwaetRAT Delivery Through Python, (Fri, Jan 3rd)

    SwaetRAT Delivery Through Python, (Fri, Jan 3rd)

    We entered a new year, but attack scenarios have not changed (yet). I found a Python script with an interesting behavior[1] and a low Virustotal score (7/61). It targets Microsoft Windows hosts because it starts by loading all libraries required to call Microsoft API Calls and manipulate payloads: from System.Reflection import Assembly from ctypes import windll from…

    Read More

  • Goodware Hash Sets, (Thu, Jan 2nd)

    Goodware Hash Sets, (Thu, Jan 2nd)

    In the cybersecurity landscape, we all need hashes! A hash is the result of applying a special mathematical function (a “hash function”) that transforms an input (such as a file or a piece of text) into a fixed-size string or number. This output, often called a “hash value,” “digest,” or “checksum,” uniquely represents the original…

    Read More

  • No Holiday Season for Attackers, (Tue, Dec 31st)

    No Holiday Season for Attackers, (Tue, Dec 31st)

    While most of us are preparing the switch to a new year (If it’s already the case for you: Happy New Year!), Attackers never stop and implement always new tricks to defeat our security controls. For a long time now, we have been flooded by sextortion emails. This is a kind of blackmail where someone…

    Read More

  • Changes in SSL and TLS support in 2024, (Mon, Dec 30th)

    Changes in SSL and TLS support in 2024, (Mon, Dec 30th)

    With the end of the year quickly approaching, it is undoubtedly a good time to take a look at what has changed during the past 12 months. One security-related area, which deserves special attention in this context, is related to the use of different versions of SSL and TLS on various servers on the internet,…

    Read More

  • Phishing for Banking Information, (Fri, Dec 27th)

    Phishing for Banking Information, (Fri, Dec 27th)

    It is again the time of the year when scammers are asking to verify banking information, whether it is credit cards, bank card, package shipping information, winning money, etc. Last night I received a text message to verify a credit card, it is case a Bank of Montreal (BMO) credit card. From Bank of Montreal…

    Read More

  • Capturing Honeypot Data Beyond the Logs, (Thu, Dec 26th)

    Capturing Honeypot Data Beyond the Logs, (Thu, Dec 26th)

    By default, DShield Honeypots [1] collect firewall, web and cowrie (telnet/ssh) [2] data and log them on the local filesystem. A subset of this data is reported to the SANS Internet Storm Center (ISC) where it can be used by anyone [3]. A common question that comes up from new users is whether there is any…

    Read More

  • Compiling Decompyle++ For Windows, (Wed, Dec 25th)

    Compiling Decompyle++ For Windows, (Wed, Dec 25th)

    Occasionaly I decompile Python code, with decompilers written in Python. Recently I discovered Decompyle++, a Python disassembler & decompiler written in C++. It’s very easy to compile for Linux, but a bit more difficult for Windows. This is how I compiled Decompyle++ on Windows: I used Microsoft Visual Studio Community 2022. First I launch the…

    Read More

  • More SSH Fun!, (Tue, Dec 24th)

    A few days ago, I wrote a diary[1] about a link file that abused the ssh.exe tool present in modern versions of Microsoft Windows. At the end, I mentioned that I will hunt for more SSH-related files/scripts. Guess what? I already found another one. The script is a Windows batch file (SHA256:3172eb8283a3e82384e006458265b60001ba68c7982fda1b81053705496a999c)[2] that has a…

    Read More