Using Python to unearth a goldmine of threat intelligence from leaked chat logs

Credit to Author: Paul Oliveria| Date: Wed, 01 Jun 2022 18:00:00 +0000

Dealing with a great amount of data can be time consuming, thus using Python can be very powerful to help analysts sort information and extract the most relevant data for their investigation. The open-source tools library, MSTICpy, for example, is a Python tool dedicated to threat intelligence. It aims to help threat analysts acquire, enrich, analyze, and visualize data.

The post Using Python to unearth a goldmine of threat intelligence from leaked chat logs appeared first on Microsoft Security Blog.

Read more

WhatsApp accounts hijacked by call forwarding

Credit to Author: Pieter Arntz| Date: Wed, 01 Jun 2022 13:04:48 +0000

Threat actors are using a new method to take over WhatsApp accounts. It starts with tricking the victim into forwarding their calls.

The post WhatsApp accounts hijacked by call forwarding appeared first on Malwarebytes Labs.

Read more

AvosLocker Ransomware Variant Abuses Driver File to Disable Antivirus, Scans for Log4shell

Credit to Author: Christoper Ordonez| Date: Mon, 02 May 2022 00:00:00 +0000

We found an AvosLocker ransomware variant using a legitimate antivirus component to disable detection and blocking solutions.

Read more

New Linux-Based Ransomware Cheerscrypt Targeting ESXi Devices Linked to Leaked Babuk Source Code

Credit to Author: Arianne Dela Cruz| Date: Wed, 25 May 2022 00:00:00 +0000

New findings showed that Cheerscrypt, a new Linux-based ransomware variant that compromises ESXi servers, was derived from the leaked Babuk source code. We discuss our analysis in this report.

Read more