mastodon.gamedev.place is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server focused on game development and related topics.

Server stats:

5.2K
active users

#worm

2 posts2 participants0 posts today

Shuckworm Targets Foreign Military Mission Based in Ukraine

Russian-linked cyber-espionage group Shuckworm appears to be targeting a Western military mission based in Ukraine, according to research by Symantec and its partner, the UK-based security firm.

Pulse ID: 67f82020a26d2eb2bb6d4f1e
Pulse Link: otx.alienvault.com/pulse/67f82
Pulse Author: AlienVault
Created: 2025-04-10 19:46:39

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

I may be misremembering this, but seeing all these Margaret #thatcher posts on my feed (yesterday was the anniversary of her death), reminds me of an old Virus/Worm for Microsoft Word, that randomly replaced words in documents with the word 'Thatcher'.

Googling can't seem to help me find the find the details, so maybe I dreamed it? (Pretty sure I didn't).

Uncovering .NET Malware Obfuscated by Encryption and Virtualization

This article examines advanced obfuscation techniques used in popular malware families like Agent Tesla, XWorm, and FormBook/XLoader. The techniques include code virtualization, staged payload delivery, dynamic code loading, AES encryption, and multi-stage payloads. The malware uses a three-stage process: an encrypted payload in the PE overlay, a virtualized payload using KoiVM, and a final payload that is typically Agent Tesla or XWorm. The obfuscation methods aim to evade sandbox detection and hinder static analysis. The article provides insights into extracting configuration parameters through unpacking each stage and discusses potential automation opportunities for sandboxes performing static analysis.

Pulse ID: 67c5deb911aab45bdf301787
Pulse Link: otx.alienvault.com/pulse/67c5d
Pulse Author: AlienVault
Created: 2025-03-03 16:54:17

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.