mastodonien.de

nerdculture.de

Zeitpunkt              Nutzer    Delta   Tröts        TNR     Titel                     Version  maxTL
Di 03.09.2024 00:00:24     7.233      -1      627.043    86,7 NerdCulture               4.2.12   1.000
Mo 02.09.2024 00:01:14     7.234      +1      626.380    86,6 NerdCulture               4.2.12   1.000
So 01.09.2024 00:00:05     7.233      -2      625.866    86,5 NerdCulture               4.2.12   1.000
Sa 31.08.2024 00:00:15     7.235      +1      625.526    86,5 NerdCulture               4.2.12   1.000
Fr 30.08.2024 00:01:10     7.234      +3      625.066    86,4 NerdCulture               4.2.12   1.000
Do 29.08.2024 00:01:08     7.231      -1      624.509    86,4 NerdCulture               4.2.12   1.000
Mi 28.08.2024 00:01:07     7.232       0      623.913    86,3 NerdCulture               4.2.12   1.000
Di 27.08.2024 00:01:11     7.232      +4      623.453    86,2 NerdCulture               4.2.12   1.000
Mo 26.08.2024 00:01:12     7.228       0      622.893    86,2 NerdCulture               4.2.12   1.000
So 25.08.2024 00:01:08     7.228       0      622.467    86,1 NerdCulture               4.2.12   1.000

Di 03.09.2024 14:46

New [Voldemort] Malware abuses Google Sheets to store stolen Data.

A new malware campaign is spreading a previously undocumented backdoor named "Voldemort" to organizations worldwide, impersonating tax agencies from the U.S., Europe and Asia.

proofpoint.com/us/blog/threat-

The campaign started on August 5, 2024 and has disseminated over 20,000 emails to over 70 targeted organizations, reaching 6,000 in a single day at the peak of its activity.

Over half of all targeted organizations are in the insurance, aerospace, transportation and education sectors. The threat actor behind this campaign is unknown, but Proofpoint believes the most likely objective is to conduct cyber espionage.

The campaign started on August 5, 2024 and has disseminated over 20,000 emails to over 70 targeted organizations, reaching 6,000 in a single day at the peak of its activity. Over half of all targeted organizations are in the insurance, aerospace, transportation and education sectors. The threat actor behind this campaign is unknown, but Proofpoint believes the most likely objective is to conduct cyber espionage.

[ImageSource: Proofpoint]

Samples of the malicious emails used in the campaign.

A new Proofpoint report says the attackers are crafting phishing emails to match a targeted organization's location based on public information.

The phishing emails impersonate taxing authorities from the organization's country, stating that there is updated tax information and includes links to associated documents.

[ImageSource: Proofpoint] Samples of the malicious emails used in the campaign. A new Proofpoint report says the attackers are crafting phishing emails to match a targeted organization's location based on public information. The phishing emails impersonate taxing authorities from the organization's country, stating that there is updated tax information and includes links to associated documents.

[ImageSource: Proofpoint]

Making the file appear as if it's located on the victim's computer.

If the victim interacts with the search-ms file, Windows Explorer is triggered to display a LNK or ZIP file disguised as a PDF. 

The use of the search-ms: URI has become popular lately with phishing campaigns as even though this file is hosted on an external WebDAV/SMB share, it is made to appear as if it resides locally in the Downloads folder to trick the victim into opening it.

[ImageSource: Proofpoint] Making the file appear as if it's located on the victim's computer. If the victim interacts with the search-ms file, Windows Explorer is triggered to display a LNK or ZIP file disguised as a PDF. The use of the search-ms: URI has become popular lately with phishing campaigns as even though this file is hosted on an external WebDAV/SMB share, it is made to appear as if it resides locally in the Downloads folder to trick the victim into opening it.

[Öffentlich] Antw.: 0 Wtrl.: 4 Fav.: 1 · via Metatext

Antw. · Weiterl. · Fav. · Lesez. · Pin · Stumm · Löschen