flipboard.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Welcome to Flipboard on Mastodon. A place for our community of curators and enthusiasts to inform and inspire each other. If you'd like to join please request an invitation via the sign-up page.

Administered by:

Server stats:

1.3K
active users

#word

27 posts24 participants3 posts today

Analysis of New Mobile Banking Malware

Salvador Stealer is a newly discovered Android malware that poses as a banking application to steal sensitive user information. It employs a multi-stage attack chain, utilizing a dropper APK to install the main payload. The malware incorporates a phishing website within the app to collect personal and banking data, including Aadhaar numbers, PAN card details, and net banking credentials. It exfiltrates stolen information in real-time to both a phishing server and a Telegram-based Command and Control server. Salvador Stealer also intercepts SMS messages to capture one-time passwords and banking verification codes, bypassing two-factor authentication. The malware demonstrates persistence mechanisms, automatically restarting itself if stopped and surviving device reboots. Analysis revealed exposed infrastructure, including an accessible admin panel, potentially linking the attacker to India.

Pulse ID: 67ec5957bfba1cac452b1059
Pulse Link: otx.alienvault.com/pulse/67ec5
Pulse Author: AlienVault
Created: 2025-04-01 21:23:35

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
#APK#Android#Bank

Gamaredon campaign abuses LNK files to distribute Remcos backdoor

A campaign targeting users in Ukraine with malicious LNK files has been observed since November 2024. The files, using Russian words related to troop movements as lures, run a PowerShell downloader contacting geo-fenced servers in Russia and Germany. The second stage payload uses DLL side loading to execute the Remcos backdoor. The activity is attributed to the Gamaredon threat actor group with medium confidence. The campaign uses the invasion of Ukraine as a theme in phishing attempts, distributing LNK files disguised as Office documents. The servers used are mostly hosted by GTHost and HyperHosting ISPs. The attack chain involves DLL sideloading to load the Remcos backdoor, which communicates with a C2 server on a specific port.

Pulse ID: 67e6c6b5e3b5eec595438366
Pulse Link: otx.alienvault.com/pulse/67e6c
Pulse Author: AlienVault
Created: 2025-03-28 15:56:37

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

The Microsoft-Dilemma - #Europe as a #Software Colony (43min)
kolektiva.media/w/cbb9f78a-970 (or
youtube.com/watch?v=duaYLW7LQv if you don't mind YT using/stealing your data)

This is how the #EU is paying a secret number of Millions to #Microsoft in order to stay less secure, more dependend, less self-empowered, and more corrupt.

And this was known even before the US went totally crazy, risking our future big time.

So let's change and take back control using #FOSS software and open standards for true competition and actually according to our own rules for a change.

#Windows#Word#Excel

In questa #newsletter
1️⃣ EU OS, il sistema operativo basato su #Linux per l'#Europa
2️⃣ #OpenSource nei governi: strategie vincenti per l’indipendenza #digitale
3️⃣ L’Europa contro il #cloud #Usa: a favore della #sovranità digitale
4️⃣ I #social dovranno pagare l’IVA sugli account degli utenti: il fisco italiano considera i dati una transazione commerciale
5️⃣ Non chiamatelo #Word! Come regalare pubblicità gratuita (e perdere #libertà digitale)

@informatica

bit.ly/4iFYQpw

Da zero a digital · 🚀 Da zero a digital » Newsletter n° 104By Open Genova APS