Explore >> Select a destination


You are here

www.jviotti.com
| | objective-see.com
90.0 parsecs away

Travel
| | [AI summary] The provided text is a detailed analysis of several macOS malware variants, including OSX.Yort.B and others associated with the Lazarus group. It discusses infection vectors, persistence mechanisms (such as launch agents and daemons), and the capabilities of these malware (like remote command execution). The text also includes technical details such as code snippets, disassembly, and command-line interactions.
| | objective-see.org
91.5 parsecs away

Travel
| | [AI summary] The provided text outlines various macOS malware campaigns and attacks, including backdoors, supply chain compromises, and multi-stage attacks. Key points include: 1. **RustBucket and BlueNoroff APTs**: These groups have been targeting macOS with backdoors like ObjCShellz, which are written in Objective-C and Swift, respectively. These malware variants communicate with C2 servers to download and execute payloads. 2. **JumpCloud Supply Chain Attack**: DPRK attributed attackers compromised JumpCloud, a zero-trust directory platform, leading to a supply chain attack that affected its customers. The attack involved spear-phishing and deploying payloads like FullHouse.Doored, StratoFear, and TieDye. 3. **Mandiant's Analysis**: Mandiant detailed th...
| | akoutmos.com
18.4 parsecs away

Travel
| | Learn how to write a self-contained command line scripts using Elixir.
| | www.talosintelligence.com
112.0 parsecs away

Travel
| The Talos Reputation Center detects and correlates threats in real time using the largest threat detection network in the world spanning web requests, emails, malware samples, open-source data sets, endpoint intelligence, and network intrusions.