veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

184
active users

#attacks

2 posts2 participants0 posts today

Putin signs law to strengthen cooperation with Iran

> The agreement also comes amid increased Western sanctions on #Iran due to its continued uranium enrichment

> Tehran supplied Russia with Shahed #drones, which Moscow used in #attacks on #Ukraine.

> In return, #Russia provided Iran with air defense systems. According to reports, #Israel successfully neutralized these air defense systems during the Israel Air Force’s recent attack on Iran. israelnationalnews.com/news/40

Israel National News
Israel National NewsPutin signs law to strengthen cooperation with IranBy Tziki Brandwine
Replied in thread

However, because this attack has been going on for two weeks, some endpoint protection tools (well, about a third of them) are catching on that this particular file is bad, and should feel bad.

The most important lesson here is that attackers always come up with new ways to evade detection. Using a commercially available, normally legitimate remote access tool with a valid cryptographic signature lets the attacker bypass some kinds of endpoint detection.

Remember to check the From: address in emails, and the destination of any links they point to. You can do this by hovering your mouse over the link without clicking, and waiting a second. If it says it's from the SSA, but it isn't pointing to SSA.gov, then it's a lie.

If you find content like this useful, please follow me here, or on LinkedIn: linkedin.com/in/andrew-brandt-

9/fin

Replied in thread

This is where I tell you: don't do this! I am a trained professional. I click all the bad links so you don't have to. I am going to show you what happens next.

A button appears on this page, labeled "Access Your Statement." The site serving up this payload delivers a file named "Social Security Statement Documents [six digit random number].exe"

7/

Continued thread

Finally the target lands on a page on the InMotion site that closely resembles the look-and-feel of the content in the email message.

The page tells the visitor, in part "Download your statement as a PDF file" and "For security reasons, we recommend accessing your statement through your secure device."

Spoiler alert: It was not a PDF file.

(Edit: A reader informs me that this appears to be the hosting space used by the temp agency website, and that for whatever reason, the URL appears differently here.)

6/

Continued thread

The target's browser then lands on another website, hosted by a large hosting service, InMotion Hosting. As with the temp agency website, the attackers have set up multiple URLs on this site, where the first URL performs a 302 redirect to go to the second URL, for no apparent reason other than to create the URL equivalent of a Rube Goldberg contraption.

5/

Continued thread

That link then immediately 302 redirects the target's browser to a link on a second website, one that belongs to a temp agency based in the US state of Maryland.

The attackers have created two URLs on this company's site for this purpose. The first one redirects to the second one.

Again, the site appears to have been compromised and used specifically for the purpose of obfuscating the redirection chain.

4/

Continued thread

In this attack, the spammers have been sending emails that look like this official-appearing notification from the Social Security Administration.

The message says "Your Social Security Statement is ready to review" and includes a button at the bottom labeled "Download Statement."

The button links to a shortened URL that uses the link-shortening service t.ly to lead the target to a chain of 302 redirects. Malware spammers often do this to fool web reputation services and obfuscate the final destination of the link.

2/

#Russia is using talks as a smokescreen while actively preparing new #offensives. Its forces have launched #attacks in #Sumy and #Kharkiv, and offensive actions have nearly doubled. Missile and bombing strikes on #Ukrainian cities have risen by over 1.5 times. Russia’s troop count in #Ukraine has grown fivefold to 620,000. Joint exercises with #Belarus may signal a new #invasion route. #Negotiations appear to be a cover for expanding aggression.

moscowmigrant.com/posts/the-pe

MoscowMigrant · The peace offensive... on the Sumy and Kharkiv regionsUnder the cover of negotiations, Russia is preparing a new offensive. The CDU/CSU-SPD coalition will increase support for Ukraine. Trump declared that all countries kiss his ass, while China and Canada proposed the reverse procedure.