Skip to content
  • 0 Votes
    1 Posts
    2 Views
    thenewoil@mastodon.thenewoil.orgT
    A Tale of Two Bills: Lawful Access Returns With Changes to #Warrantless Access But Dangerous #Backdoor #Surveillance Risks Remainhttps://www.michaelgeist.ca/2026/03/a-tale-of-two-bills-lawful-access-returns-with-changes-to-warrantless-access-but-dangerous-backdoor-surveillance-risks-remains/#privacy #Canada #politics #MassSurveillance
  • 0 Votes
    1 Posts
    2 Views
    daniel1820815@infosec.exchangeD
    #CheckPoint Research has profiled #SilverDragon, a Chinese-aligned group linked to #APT41 that targeted government and enterprise networks across Southeast Asia and Europe. Recent operations used the #GearDoor #backdoor with SSHcmd and SilverScreen, enabling remote access, covert screen capture, and stealthy control after #phishing and server exploitation.https://research.checkpoint.com/2026/silver-dragon-targets-organizations-in-southeast-asia-and-europe/
  • 0 Votes
    1 Posts
    2 Views
    hasamba@infosec.exchangeH
    ---------------- Tool: APTs Adversary Simulation===================This repository aggregates detailed adversary simulation campaigns that mirror tactics, techniques and procedures (TTPs) attributed to state-sponsored APT groups from Russia, China, Iran and North Korea. The collection documents multiple simulated campaigns and includes artifacts such as custom command-and-control (C2) components, backdoors, stagers, bootloaders and other payloads. Research sources referenced in the collection include major industry reports from Palo Alto Unit 42, Kaspersky, Microsoft, Cisco, Trellix, CrowdStrike and WithSecure.Structure and contents• Cataloged APT simulations aligned with CrowdStrike-style group names and taxonomy. Group simulations listed include multiple “Bear” variants for Russia and several “Panda” variants for Chinese actors, plus DPRK and Iranian-themed simulations.• Artifact types enumerated in the repository include C2 servers and protocols, custom backdoor implants, initial stagers, secondary loaders/bootloaders and supporting scripts or tooling intended to emulate post-exploitation activity.• Metadata and descriptive notes map simulated behaviors to observable TTPs and reference vendor reporting where applicable, enabling defenders to correlate simulation steps with published detections.Technical scope (what is present, not how-to)• Emulated network components for C2 communications and session management.• Multiple binary and scripting artifacts representing stagers and backdoors, designed to reflect operational patterns observed in public APT reporting.• Behavioral sequences and campaign outlines that describe chain-of-actions executed by the simulated actors.Attack chain summary• Initial Access — Simulated vectors and initial stagers representing entry methods.• Download — Artifacts and payload delivery stages mimicking secondary payload retrieval.• ️ Execution — Stagers and loaders that transition payloads into memory or disk execution.• 🦠 Infection — Backdoor implants and persistence mechanisms used to emulate sustained presence.• Exfiltration — Descriptions of simulated data staging and exfiltration patterns where included.Limitations and intentThe repository is presented explicitly for educational, research and defensive security purposes. It documents emulated offensive behaviors based on public reports and is not a source of exploitation guidance. No installation, execution or deployment instructions are provided within this summary. MITRE_ATT&CK #C2 #adversary_simulation #APT #backdoor Source: https://github.com/S3N4T0R-0X0/APTs-Adversary-Simulation/tree/main/Iranian%20APT/Static%20Kitten
  • 0 Votes
    1 Posts
    2 Views
    opensuse@fosstodon.orgO
    Great coverage of the xz #backdoor exposure! Thank you #veritasium for the coverage. A reminder of why #opensource resilience matters. The #community caught it. Stay vigilant, #contribute, #test, and help keep open source #secure. #Linux https://youtu.be/aoag03mSuXQ?si=9vxgGKkKRiE90RIm