Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

Yet Another New Attack Method Shows Up From the Group Behind Emotet

Yesterday we told you that the gang behind Emotet was looking to used Excel add-ins as a possible new technique to compromise systems as part of their spamming campaigns. The detected techniques were labeled as potentially being part of research and development efforts on the part of the group TA542 due to changes Microsoft is making in Office (and ones many admins already push). The R&D efforts do not stop there though as multiple security research teams are now saying they have identified another new technique associated with Emotet.

Details
By Sean Kalinich
Sean Kalinich
Apr 27
Hits: 1486
  • Security
  • Malware
  • emotet
  • ta542
  • lnk
  • powershell

Read more: Yet Another New Attack Method Shows Up From the...

No comments on “Yet Another New Attack Method Shows Up From the Group Behind Emotet”
Security Talk

The Group Behind Emotet is Looking to Get Around Microsoft’s VBA Changes

TA542 the wonderful people that brought you Emotet appears to be in the middle of a development and testing cycle on new delivery methods. According to researchers at ProofPoint the creators or the Emotet Botnet are potentially looking to find a new delivery method in response to the, long overdue, default disabling of VBA based Macros by Microsoft in their office products. Although ProofPoint seems to think this is development testing, the activity could also be part of a more targeted campaign.

Details
By Sean Kalinich
Sean Kalinich
Apr 26
Hits: 1473
  • Security
  • Malware
  • Microsoft
  • Phishing
  • Security Culture
  • emotet
  • ta542
  • vba macros

Read more: The Group Behind Emotet is Looking to Get Around...

No comments on “The Group Behind Emotet is Looking to Get Around Microsoft’s VBA Changes”
Security Talk

Amazon’s Awkward Moment as Log4J Fix has an Escalation and Escape Bug

It seems that Amazon’s hotfix for Log4Shell in their AWS environment might have been a bit rushed. According to a review of the hot there are a total of four CVEs specifically related to the hotfix and how it functions. CVE-2021-3100, CVE-2021-3101, CVE-2022-0070, and CVE-2022-0071 have a CVSS score of 8.8 and allow for privilege escalation and container escape. It is not often that a fix for one bad bug contains a potentially worse one, but here we are.

Details
By Sean Kalinich
Sean Kalinich
Apr 22
Hits: 1492
  • AWS
  • Vulnerabilities
  • log4shell
  • cve
  • log4j
  • container security

Read more: Amazon’s Awkward Moment as Log4J Fix has an...

No comments on “Amazon’s Awkward Moment as Log4J Fix has an Escalation and Escape Bug”
Security Talk

Okta now says Lapsus$ only had 25 Minutes of Fame with Two Clients

The breach of IDAM group Okta in January by the self-promoting group Lapsus$ amidst other high-profile breaches and data leaks this year was a significant concern. The concern rose because when the incident first happened, Okta passed it off as an unsuccessful attempt to breach a third-party vendor’s system that had access to Okta systems. However, in March the Lapsus$ group released screenshots of internal systems including what appeared to be Okta’s superuser system.

Details
By Sean Kalinich
Sean Kalinich
Apr 21
Hits: 1387
  • Security
  • lapsus$
  • ir
  • okta
  • vendor mangement

Read more: Okta now says Lapsus$ only had 25 Minutes of...

No comments on “Okta now says Lapsus$ only had 25 Minutes of Fame with Two Clients”
Security Talk

CISA warns that US ICS/SCADA Systems are being Targeted by Threat Groups

CISA has issued another warning that SCADA/ICS systems are being targeted for attack. This time they are in the sights of Nation-State groups and with customized tools. The tools are part of follow-on activities after the initial beachhead has been established. These days gaining initial access to a network, even for infrastructure, does not seem to be a difficult task for nation-state groups.

Details
By Sean Kalinich
Sean Kalinich
Apr 14
Hits: 1406
  • Security
  • Malware
  • APT
  • SCADA
  • ICS
  • nationstate

Read more: CISA warns that US ICS/SCADA Systems are being...

No comments on “CISA warns that US ICS/SCADA Systems are being Targeted by Threat Groups”

More Articles …

  1. Law Enforcement Celebrates Another Hacker Forum Takedown as the Seizure of RaidForums is Announced.
  2. Open Source Takes Another Hit as 3rd Protestware Shows up in NPM Repository
  3. Leaked Conti Ransomware used in Attacks on Russian Targets
  4. Crypto Mining Malware Targeting Amazon Lambda Serverless Environments
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15

Page 11 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech