Security firm WithSecure has discovered a new threat actor named DUCKPORT focused on infecting users with malware in order to hijack accounts that have access to Facebook's advertising and business platforms.
WithSecure says the group is based in Vietnam and appears to have spun out of a group named DUCKTAIL.
Rest of the World has published an article showing how the accounts of Chinese dissidents get flooded with spammy adult content every time they post something critical of the regime:
GCHQ’s National Cyber Security Centre and international partners share technical details about Infamous Chisel, new malware used to target the Ukrainian military
AhnLab researchers have published a report on Andariel's latest campaigns and operations.
The report covers malware like NukeSped variant Volgmer, Andardoor, AndarLoader, DuarianBeacon, TigerRAT, Black RAT, Goat RAT, and the Troy reverse shell.
That's quite the arsenal.
Wired has published an exposé on Bentley, a Russian national named Maksim Sergeevich Galochkin, who leads a software development team inside the Trickbot cybercrime group:
Nisos, which helped Wired with its article, has also published a report showcasing that Trickbot was working with the Russian FSB intelligence agency in some sort of capacity:
Apparently, Huntress had developed a QakBot vaccine they were using to prevent infections
"Come the end of December 2022, we dropped the number of new Qakbot infection reports down to practically zero."
InQuest researchers look at the history of Antibot, an open-source tool that started as a GitHub project but is now one of the go-to solutions used to filter bot and authentic traffic on phishing sites and other malware control panels.
Netenrich researchers look at new versions of ADHUBLLKA, a ransomware strain used to target individuals and small businesses with small ransom demands ranging from $800 to $1,600.
An investigation by web developer Travis Brown has found that around 70% of Elon Musk's Twitter followers are likely bot accounts there to just inflate his follower numbers.
Raw data:
Security researchers from watchTowr have published a technical analysis and proof-of-concept code for CVE-2023-36844, an RCE in Juniper SRX and EX devices.
Security researchers who attended the Black Hat and DEFCON security conferences in Las Vegas at the start of the month and stayed at the Caesars Palace Hotel and Casino should be aware that cases of Legionnaires' disease had been reported among hotel guests.