TrickGate, a packer used by malware to evade detection since 2016

TrickGate is a shellcode-based packer offered as a service to malware authors to avoid detection, CheckPoint researchers reported. TrickGate is a shellcode-based packer offered as a service, which is used at least since July 2016, to hide malware from defense programs. A packer (aka “Crypter” and “FUD”) implements a series of functionalities to make it harder for […]

The post TrickGate, a packer used by malware to evade detection since 2016 appeared first on Security Affairs.

i made something with internet worm maker

A worm that installs avast antivirus onto your PC. the antivirus becomes the virus but still works as an antivirus. im only sending it to those who DM me for it. and if anyone modify this to become malicious i am not to blame, they are. cropped t…

Hackers walk away with $70M Bitcoin in ransomware attacks

Immunefi recently published a report on the types of payments used in ransomware attacks. The report showed that threat actors were taking payments in cryptocurrencies such as Bitcoin. The data shows that 98% of the ransomware payments are demanded to …

Anyone planning on going to the hacker meetup in LA this Friday?

Los Angeles is meeting this Friday. I’m a total noob when it comes to hacking but I have been waiting forever to attend a meeting. Who else wants to go? The announcement has been made on LA2600 Twitter. submitted by /u/notburneddown [li…

Exploiting WordPress site with no vulnerable plugins

Hi, I’m doing a CTF on a WordPress site but WPscan shows no vulnerable plugins/themes. I have one username and wp-login page, but I’m told that brute-forcing is not required for this box. There aren’t any weird directories found via enumeration, and robots.txt only contains a line on wp-admin/admin-ajax.php.

In my experience with exploiting WordPress, usually finding something vulnerable in WPscan shows me which way to go, but now I’m stumped. Does anyone have any ideas, or is this a red herring?

submitted by /u/Slayre77
[link] [comments]

Pirating

Hey y’all I’m running a little low on cash right now so I’m trying to turn to the best source of cash I can right now so if anyone wants anything pirated Right now send me a message I’ll get it pirated for you give me like the specifications of what you want pirated and I’ll get it for you depending on what it is the the price will change I’m going to keep it as cheap as I can shoot me a message if you’re interested

submitted by /u/Fsociety621
[link] [comments]

what can ya do with a hacked printer? (jetdirect? port 9100 vuln)

my friend that owns a coffee shop asked me to poke around on his network to look for vulnerabilities in exchange for some free coffees and i saw that they had 9100 open, wasn’t familiar with it so played around and found out about PRET which gave me access to his HP printer, with transversal you can gain access to the file system etc and from what i read you can open a root shell on another port, would the scope be limited to the printer, or can the printer be used as a vector to gain access to other systems connecting to said printer?

tldr im not familar with printers and found a vuln, what do, i like my free cup-a-joes while writing my dnd campaigns.

submitted by /u/werewolfpajamas
[link] [comments]

GitHub Reports Code-Signing Certificate Theft in Security Breach

By Deeba Ahmed
GitHub states that hackers gained access to its code repositories and stole code-signing certificates for two of its desktop apps: Desktop and Atom.
This is a post from HackRead.com Read the original post: GitHub Reports Code-Signing Cer…