med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

421
active users

#apt

4 posts4 participants0 posts today

The FBI is sounding the alarm: state-backed hackers are using custom malware and zero-day exploits to slip past telecom defenses. How are these tactics evading detection, and what does it mean for our security? Read more.

thedefendopsdiaries.com/unmask

#salt_typhoon
#cybersecurity
#telecomsecurity
#apt
#malware

The DefendOps Diaries · Unmasking Salt Typhoon: The Cyber Threat to Telecom NetworksBy Alex Cipher
Replied in thread

@Nagaram

It's more like #linux users know how to use the #internet, they just use #duckduckgo to search for easy problems and don't ask for every little thing.

And they are mostly more advanced users, who know what an #application is and how to open one, therefore easy questions don't get asked.

But the main point is very true. You don't need to know that to use Linux. I started Linux when I didn't know what #apt or even the #terminal was.

npr.org/2025/04/15/nx-s1-53558

This story should be front and centre in all of #infosec

DOGE either wittingly or unwittingly* gives highest level access to Russian actors. See the whistleblower documentation added below.

“In fact, in the minutes after DOGE accessed the NLRB's systems, someone with an IP address in Russia started trying to log in, according to Berulis' disclosure. Those attempts were blocked, but they were especially alarming. Whoever was attempting to log in was using one of the newly created DOGE accounts — and the person had the correct username and password, according to Berulis.”

*) unwittingly only because they have no wit. Wanna bet they create the same user/password combos every place they pillage and burn? Wanna bet RU has these credentials? Wanna bet RU has a real-time view on which accesses the DOGE boys create (probably because these traitors broadcast them over insecure channels)?

whistlebloweraid.org/wp-conten

[Edit] Reading carefully through the whistleblower documentation now. My current analysis: Holy shit.

FIN7 *again*? Seriously, these guys just don't quit, do they? 🙄

Heads up – they've cooked up an Anubis backdoor using Python. And nope, *it's not* the Android Trojan people know. It's pretty wild what this thing packs: we're talking remote shell capabilities, file uploads, messing with the registry... 🤯 Basically, the keys to the kingdom!

And let me tell you from a pentester's perspective: Just relying on AV? That's *definitely* not gonna cut it anymore. We all know that, right?

Looks like they're slipping in through compromised SharePoint sites now? Yikes. The nasty part? A Python script decrypts the payload *directly in memory*, making it incredibly tough to spot! 🥴 Plus, their command and control chats happen over a Base64-encoded TCP socket.

So, keep a *sharp eye* on those ZIP attachments! Double-check your SharePoint sites' integrity. You'll also want to monitor network traffic closely (especially that TCP activity!). And make sure your endpoint security is actually up to snuff – remember, they love finding ways to bypass defenses!

How are *you* tackling threats like this one? What are your go-to tools and strategies for defense? 🤔 Let's share some knowledge!