APT31 isn’t breaking in. They’re blending in.
Microsoft Dev Tunnels, cloud storage, signed binaries, all abused as stealthy C2.
This is trust exploitation at scale.
🔗 blackcastle.com.au/blog/apt31-t...
#APT #ThreatIntelligence #CloudSecurity #DetectionEngineering #CyberSecurity #Maldev #offsec
Malware Analysis Masterclass - Dissecting Viruses, Trojans & Malicious Code - What is Malware
twuai.com/search/VcOoV...
#AllGoodTutorials #MalwareAnalysis #CyberSecurity #ReverseEngineering #EthicalHacking #CyberSecCareer #ITTraining #AllGoodTutorials #CyberSecurityForBeginners #Maldev #Sysadmin
SK Telecom BPFDoor Malware: Malware Scanner and Detection || Malware Detector
twuai.com/search/MNene...
#maldev #redteam #pentesting #privesc #malware #BPF #Backdoor #SKTelecom #Scanner
Android Hacking for Beginners | Ethical Hacking Full Course (Step-by-Step) | mobile hacking course twuai.com/search/8z7wG...
#msfvenom #metasploit #maldev #exploiting #android #malware #hacking101 #shellcode #binwalk
The Ouroboros Of Cybercrime: Threat Actors Go From Pwn To Pwnd - Estelle Ruellan & Stuart Beck twuai.com/search/bpfEJ...
#cybercrime #ecrime #malware #steeler #maldev #cybersecurity #hacking #DFIR #infosec
Getting Started With Ghidra For Malware Analysis twuai.com/search/dW8YF...
#RE #Malware #analysis #maldev #asm #lowlevel #ghidra #debugger #nsa #cybersecurity #hacking
SOC Lvl. 2 | EP.41 | Dissecting PE Headers | TryHackMe Malware Analysis 2twu.com/post/7510085...
#cybersecurity #maldev #RE #DFIR
#MalDev Myths by @dobin
https://blog.deeb.ch/posts/maldev-myths/
Want to execute shellcode without API calls?
Abuse indirect syscalls via HAL dispatch tables.
Hook NtAllocateVirtualMemory and redirect execution stealthily. EDR visibility?
Nearly zero.
#MalDev #RedTeam #Infosec #cybersecurity #powershell
Merry Christmas, have another Windows maldev blog: writing migratory payloads. Learn the secret to disappearing from your mouse and reappearing inside explorer.exe! amethyst.systems/blog/posts/w... #infosec #malware #maldev
Finally published Part 2 of my small "Malware Development Introduction" series (aka malware dev 101).
This post covers intro to process injection, practical malware evasion concepts in C++/C#, and various resources I use.
wsummerhill.github.io/redteam/2024...
#malwaredev #maldev #redteam