|
You are here |
www.jviotti.com | ||
| | | | |
objective-see.com
|
|
| | | | | [AI summary] The provided text is a detailed analysis of several macOS malware variants, including OSX.Yort.B and others associated with the Lazarus group. It discusses infection vectors, persistence mechanisms (such as launch agents and daemons), and the capabilities of these malware (like remote command execution). The text also includes technical details such as code snippets, disassembly, and command-line interactions. | |
| | | | |
objective-see.org
|
|
| | | | | [AI summary] The provided text outlines various macOS malware campaigns and attacks, including backdoors, supply chain compromises, and multi-stage attacks. Key points include: 1. **RustBucket and BlueNoroff APTs**: These groups have been targeting macOS with backdoors like ObjCShellz, which are written in Objective-C and Swift, respectively. These malware variants communicate with C2 servers to download and execute payloads. 2. **JumpCloud Supply Chain Attack**: DPRK attributed attackers compromised JumpCloud, a zero-trust directory platform, leading to a supply chain attack that affected its customers. The attack involved spear-phishing and deploying payloads like FullHouse.Doored, StratoFear, and TieDye. 3. **Mandiant's Analysis**: Mandiant detailed th... | |
| | | | |
akoutmos.com
|
|
| | | | | Learn how to write a self-contained command line scripts using Elixir. | |
| | | | |
www.talosintelligence.com
|
|
| | | The Talos Reputation Center detects and correlates threats in real time using the largest threat detection network in the world spanning web requests, emails, malware samples, open-source data sets, endpoint intelligence, and network intrusions. | ||