SummaryOperation Undercut is a covert influence operation conducted by Russias Social Design Agency (SDA) to sway public opinion against Ukraine and weaken Western support. Leveraging AI-enhanced videos and impersonating reputable news sources, Operation Undercut disseminates disinformation
Continue ReadingBlog
ISC Stormcast For Tuesday, November 26th, 2024 https://isc.sans.edu/podcastdetail/9232, (Tue, Nov 26th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Continue ReadingCISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-28461 Array Networks AG and vxAG ArrayOS Improper Authentication Vulnerability These types of vulnerabilities are frequent attack vectors for
Continue ReadingThe strange case of disappearing Russian servers, (Mon, Nov 25th)
Few months ago, I noticed that something strange was happening with the number of servers seen by Shodan in Russia... In order to identify any unusual changes on the internet that might be worth a closer
Continue ReadingQuick & Dirty Obfuscated JavaScript Analysis, (Sun, Nov 24th)
As mentioned in diary entry "Increase In Phishing SVG Attachments", I have a phishing SVG sample with heavily obfuscated JavaScript. As I didn't want to spend time doing static analysis, I did a quick dynamic analysis
Continue ReadingDecrypting a PDF With a User Password, (Sat, Nov 23rd)
In diary entry "Analyzing an Encrypted Phishing PDF", I decrypted a phishing PDF document. Because the PDF was encrypted for DRM (owner password), I didn't have to provide a password. What happens if you try this
Continue ReadingWireshark 4.4.2 Released, (Sat, Nov 23rd)
Wireshark release 4.4.2 fixes 2 vulnerabilities and 33 bugs. Didier Stevens Senior handler blog.DidierStevens.com (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Continue ReadingBuilding Consistent Efforts: Veterans’ Causes at Recorded Future
Building Consistent Efforts: Veterans Causes at Recorded Future2024 Veterans Day celebrations kicked off with our 3rd Annual Armed Forces Retirement Home (AFRH) event for Veterans Day on November 8th in Washington, DC! Residents, local veterans, active
Continue ReadingSeeing Through a GLASSBRIDGE: Understanding the Digital Marketing Ecosystem Spreading Pro-PRC Influence Operations
Written by: Vanessa Molter Special thanks to Mandiant's Ryan Serabian for his contributions to this analysis. This blog post details GLASSBRIDGE—an umbrella group of four different companies that operate networks of inauthentic news sites and newswire
Continue ReadingAn Infostealer Searching for « BIP-0039 » Data, (Fri, Nov 22nd)
I like obfuscation techniques implemented by malware developers. If their primary purpose is to defeat security controls and automatic scanners, they are a great starting point for malware analysts. Indeed, if some data or actions have been
Continue Reading