#GTIG

Chema Alonso :verified:chemaalonso@ioc.exchange
2025-12-01

El lado del mal - AI-Powered Adversaries: Atacantes armados con IA para hacer malware, vulnerar sistemas o cometer fraudes elladodelmal.com/2025/12/ai-po #malware #Cibercrimen #Ciberespionaje #IA #AI #GenAI #Gemini #GTIG #InteligenciaArtificial

2025-11-21

GTIG is tracking a multi-year APT24 cyberespionage campaign leveraging the BADAUDIO downloader.

Notable elements:
• Control-flow flattening + DLL Search Order Hijacking
• Targeted supply chain compromises impacting 1K+ domains
• Cobalt Strike Beacon (shared watermark w/ prior APT24 ops)
• Cloud-hosted phishing + JS injection on legitimate sites
• Strategic web compromise → selective payload delivery

Full report:
technadu.com/chinese-apt24-cyb

Follow @technadu for daily threat intelligence.

#APT24 #BADAUDIO #CyberEspionage #ChinaCyber #GTIG #SupplyChainAttack #Taiwan #CobaltStrike #Malware #ThreatIntel

Chinese APT24 Cyberespionage Campaign Targets Taiwan with BADAUDIO Malware
2025-11-05

Die Cybercriminals so:
"Lass uns mal was mit AI machen!"
"Jo. Und dann fragt der Shit selbstständig bei der AI nach und besorgt sich aktuellen Code."
"Aber getarnt!"

Google’s Threat Intelligence Group (GTIG):
"Gegner nutzen künstliche Intelligenz, um neue Malware‑Familien zu verbreiten, die während der Ausführung große Sprachmodelle (LLMs) integrieren.

Dieser neue Ansatz ermöglicht ein dynamisches Ändern während der Ausführung und erreicht damit ein Maß an operativer Vielseitigkeit, das mit herkömmlicher Malware praktisch unmöglich zu erreichen ist.

Google bezeichnet die Technik als „Just‑in‑Time“‑Selbstmodifikation und hebt den experimentellen PromptFlux‑Malware‑Dropper sowie den PromptSteal‑(auch bekannt als LameHug‑)Datensammler, der in der Ukraine eingesetzt wurde, als Beispiele für dynamische Skriptgenerierung, Code‑Obfuskation und die Erstellung von On‑Demand‑Funktionen hervor."

cloud.google.com/blog/topics/t

#infosec #infosecnews #google #gtig #Malware #PromptFlux #PromptSteal

gtbarrygtbarry
2025-10-29

More than 14,000 WordPress sites hacked, used to spread malware

a new threat actor codenamed UNC5142 has been successfully hacking into WordPress sites often using flawed WordPress themes, plugins, or databases.

mashable.com/article/wordpress

Security Landsecurityland
2025-07-24

Advanced threat actor UNC6148 is actively targeting SonicWall SMA 100 series appliances with sophisticated OVERSTEP backdoor malware, bypassing patches through stolen credentials.

Read More: security.land/sonicwall-sma-10

Group of threat actors in server room
Kanenaskanenas_gr
2025-06-06

escalated from who are increasingly targeting in addition to the , as identified by the Threat Group ().

workers employ sophisticated tactics such as posing as legitimate remote workers, using fabricated identities, and engaging in extortion by threatening leak sensitive company information, including proprietary and like and government in

cloud.google.com/blog/topics/t

BGDon 🇨🇦 🇺🇸 👨‍💻BrentD@techhub.social
2025-01-30

Google Threat Intelligence Group (GTIG) report: “Adversarial Misuse of Generative AI” details how threat actors (ATP and IO actors) are attempting to misuse Google’s Gemini web application and if these efforts have created any novel or unique AI-enabled attack techniques.

High level results: At this time, AI can be useful to threat actors for performing common tasks like troubleshooting, research, learning/training, and content generation. GTIG is indicating they are NOT seeing new or novel capabilities being created by threat actor activities with AI.

“Rather than enabling disruptive change, generative AI allows threat actors to move faster and at higher volume. For skilled actors, generative AI tools provide a helpful framework” … “For less skilled actors, they also provide a learning and productivity tool, enabling them to more quickly develop tools and incorporate existing techniques.”

DL report (PDF) here: services.google.com/fh/files/m

#AI #cybersecurity #Google #GTIG #LLMs #hackers #GenAI #Gemini

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst