🔎New #ABE #bypass spotted ITW
#VoidStealer is the first #infostealer to weaponize a debugger-based technique that extracts the v20_master_key straight from browser memory, requiring neither privilege escalation nor code injection, making it significantly stealthier than existing methods – a truly elegant (and scary) technique.
Full technical analysis ↓ gendigital.com/blog/insights/…R
IoC: f783fde5cf7930e4b3054393efadd3675b505cbef8e9d7ae58aa35b435adeea4
#infostealer #threatresearch #Chrome #malware #abe_bypass
Manual DLL debugging takes time.
My "first view" approach:
1. DLL → EXE
2. TinyTracer to capture API behavior
Quickly reason about malicious actions before deep analysis.
#dll_to_exe#TinyTracer#BareTail
In the renewable energy sector, an attack targeted at least 30 wind and solar farms in Poland. The attack resulted in a loss of communication between the facilities and distribution system operators (DSOs), but it did not affect ongo‑ing electricity generation.
#IOCs#APT#Wiper
or Incident Report 2025
github.com/blackorbird/AP…#Sandworm DynoWiper update: Technical analysis and attribution
welivesecurity.com/en/eset-resear…
dragos 2025 poland attack report
github.com/blackorbird/AP…
mb new #wiper#malware (#ironzero#doublezero) sample likely used (or attempted to be delivered) against #Ukrainian entities/infrastructures. MD5 c74355fbaea7c49b7ceecb420edfe75c (VT). It appears to invoke NtFsControlFile with 0x980C8, to mark bytes as unallocated. #APT
Enjoy the free #magnumdb tool: magnumdb.com ("Magic Number DataBase"), just updated today with Windows SDK & DDK v10.0.26100.0.6584, K/U MDF, WinAppSDK latest. Now includes 537428 values/names, 200000 GUIDs of all sort (IID, CLSID, etc.). #winapi#win32#sdk#ddk 🥳🍸