🚔 Last week, international law enforcement agencies conducted #OperationEndgame to takedown key malware infrastructures. The Sekoia #TDR team supported the French law enforcement agencies by providing valuable cyber threat intelligence, particularly on #PikaBot. ⚡ #PikaBot is a malware loader widely distributed since February 2023. Initial Access Brokers (IABs) use it to establish an initial foothold within a victim’s networks and distribute additional payloads such as #CobaltStrike and #Meterpreter. Our new #TDR report provides an in-depth analysis of #PikaBot's functionalities, distribution methods, internal structure, and countermeasures used to avoid detection. Additionally, it shares technical details on PikaBot C2 #infrastructure. ➡ https://lnkd.in/eN3MKPqS Thanks to Pierre & Quentin for the technical analysis!
Nicolas Caproni’s Post
More Relevant Posts
-
🔍 Join us for an exclusive seminar focusing on Cyber Crime Investigation, tailored specifically for Law Enforcement officers. Delve into crucial topics including dark web exploration, real-life case studies, and advanced threat intelligence techniques. 🗓️ Mark your calendars for March 17th, at 9 PM. 💼 This seminar is organized with the expertise of Sagar Joshi, ensuring law enforcement professionals gain invaluable insights to combat cyber threats effectively. Don't miss this opportunity to sharpen your skills in cybercrime investigation and protect your community from digital threats! #CyberCrime #LawEnforcement #Investigation #Seminar #StaySafe
To view or add a comment, sign in
-
🔍 Join us for an exclusive seminar focusing on Cyber Crime Investigation, tailored specifically for Law Enforcement officers. Delve into crucial topics including dark web exploration, real-life case studies, and advanced threat intelligence techniques. 🗓️ Mark your calendars for July 29th, at 6 PM. 💼 This seminar is organized with the expertise of Rohit Raj, ensuring law enforcement professionals gain invaluable insights to combat cyber threats effectively. Don't miss this opportunity to sharpen your skills in cybercrime investigation and protect your community from digital threats! #CyberCrime #LawEnforcement #Investigation #Seminar #StaySafe
To view or add a comment, sign in
-
"Cyber Crime & Digital Forensics" airs THIS Sunday, March 10th, on Sky Channel 181 at 10:30 A.M. The digitalisation of the world is undeniable. People, companies and even the government now use electronics and the internet for all their needs; from the storage of information to communication to even internal processes. Keeping this in mind, cyber security and digital forensics are both massively important. In the age of hackers and online scammers, law enforcement, businesses and the general public alike are anxious about what this means for the safety of their data. Special thanks to Defended Solutions and EX1 - Digital Forensic Services Ltd for their participation in the programme. #cyberdefense #hacking #lawenforcement #forensics
To view or add a comment, sign in
-
🌍 Tackling cyber threats is a global mission, with international law enforcement making significant strides. Recently, a coordinated operation led to the arrest of four individuals, demonstrating that cybercriminals can't evade justice forever. 🔍 Here's what makes these efforts effective: - Cross-border collaboration amongst top-tier agencies. - Advanced technology to track cyber activities. - Persistent dedication to bringing offenders to justice. While they may not be caught immediately, these cybercriminals should beware—law enforcement agencies are relentless. Their run might be big, but it's certainly not indefinite. 🌐 How do you think international efforts can be further strengthened to combat cyber threats effectively? #CyberSecurity #LawEnforcement #CyberCrime #InternationalCollaboration #TechForGood #StaySafeOnline
To view or add a comment, sign in
-
In an unprecedented demonstration of international cooperation and cyber resilience, law enforcement agencies from the U.S., U.K., and other global partners have successfully orchestrated the takedown of LockBit, one of the most notorious #ransomware groups to date. This landmark operation marks a pivotal moment in the fight against #cybercrime , showcasing the potential of concerted governmental efforts to combat digital threats effectively. Join our webinar to dive into the intricate details of the LockBit disruption, the strategies employed by international law enforcement, and the broader implications for cybersecurity across the globe. https://lnkd.in/eNKi2Fi2
To view or add a comment, sign in
-
Digital forensics stands as both a guardian of justice and a frontier of innovation. In a way, it's a dynamic intersection where law enforcement and technology converge relentlessly in pursuit of truth. As cyber criminals get cleverer with their tactics, our digital forensic experts are always on their toes, using the latest tools and techniques to stay ahead of the game. Learn more about digital forensics from out latest blog 👇 https://hubs.ly/Q02PDN-g0 #cloudforensics #forensics #forensicscience #digitalforensics
To view or add a comment, sign in
-
Cyberspace is becoming increasingly popular - for both good and bad reasons. Staying up-to-date and AWARE of cyber trends is becoming a necessity. The ACFE SA supports Cybersecurity Awareness Month! https://lnkd.in/gCQ85s3Y #fraudprevention #cybersecurity #cyberawareness #awareness
Danny Myburgh explains Cyber Trafficking
https://www.youtube.com/
To view or add a comment, sign in
-
After few days of battling with some malware samples, the Supreme Court investigation is finally done. Another great lab from Security Blue Team One of the hardest investigations for me so far as I tackled dynamic malware analysis for the first time. Initial phase involves famous Microsoft MSHTML Remote Code Execution vulnerability (CVE-2021-40444) and Techniques like Data Obfuscation (T1001), Process Injection (T1055.004), Ingres Tool transfer (T1105), User Execution (T1204.001) and others were applied in this attack. I thoroughly enjoyed every step of this investigation and learned tons of new stuff regarding malware analysis and forensics. #securityblueteam #supremecourt #malwareanalysis #incidentresponse
Completed Supreme Court! - Blue Team Labs Online
blueteamlabs.online
To view or add a comment, sign in
-
Did you know cyber threats and attacks can lead to revenue loss of billions of dollars in so many sets of industries including law enforcement and internal security? 🛡️📉 Come visit us at Stand F46, Hall 2 to discuss how we can protect your valuable data from cyber-attacks and threats. See you on the last day at GPEC 2024! #GPEC2024 #internalsecurity #lawenforcement #istorage #storagesolutions #protectyourdata #securestorage #protecteddrives #pinprotected #hardwareencrypted
To view or add a comment, sign in
-
🚨 Is TOR Still Secure? The Tor Project is reassuring users that the network remains safe despite reports of law enforcement using timing attacks to deanonymize users. Top 5 takeaways: 👨⚖️ After several high profile arrests in Germany, court documents were released on how a law enforcement operation was used to target the Tor service. 🪪 A Tor user was de-anonymized using an old version of the Ricochet application through a targeted law-enforcement attack. 👮 Law enforcement agencies used timing analysis attacks to identify users by comparing the timing of data entering and leaving the network. 🛡️ Tor has implemented protections and updates, such as the Ricochet-Refresh app, to counter these attacks. They have also improved its their bandwidth, with ongoing efforts to diversify and strengthen the network. 💬 Tor emphasizes the need for more relay diversity and encourages volunteers to help improve the network’s security. For more details, read: https://lnkd.in/edRqqrNV #cybersecurity #news #tor #TorProject #deanonymize #secure #kraven #KravenSecurity #adamgoss #cti #threatintelligence
To view or add a comment, sign in