Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
Point32Health says the personal and protected health information of 2.5 million Harvard Pilgrim Health Care subscribers was stolen in a recent ransomware attack.
Enhancing TLS Security: Google Adds Quantum-Resistant Encryption in Chrome 116
Google has announced plans to add support for quantum-resistant encryption algorithms in its Chrome browser, starting with version 116.
"Chrome will begin supporting X25519Kyber768 for establishing symmetric secrets in TLS, starting in Chrome 116, and available behind a flag in Chrome 115," Devon O’Brien said in a post published Thursday.
Kyber was chosen by the U.S. Department of Commerce’s Read More
The Hacker News | #1 Trusted Cybersecurity News Site
Script Tracer Tool – Threat Researchers to Trace & Deobfuscate the Malware Execution
Cyber forensic tools play a crucial role in cyber investigations by helping investigators collect, analyze, and preserve digital evidence.
These tools can extract data from various sources, such as:-
Hard drives
Mobile devices
Network traffic
They also allow for identifying malware, tracking online activities, and decrypting encrypted data.
Recently, Any Run launched its new “Script Tracer,” a tool primarily made for threat researchers to trace and deobfuscate malware execution.
ANY.RUN is an interactive malware sandbox that allows users to analyze unlimited malicious files and links for free. It also has a dedicated team of analysts who continuously expand the service’s detection and analysis capabilities.
Analyzing any suspicious attachment or URL in a free interactive malware sandbox like ANY.RUN can instantly provide you with a conclusive verdict.
Script Tracer
Script Tracerin ANY.RUN’s cloud sandbox simplifies script deobfuscation and works seamlessly across all the major Windows versions, like Windows 7-11, enhancing users’ experiences.
Scripting languages empower Windows tasks but also fuel rising malware in such code. There are various types of scripting code in Windows, and here they are mentioned below:-
JScript
VBScript
VBA (Visual Basic for Applications)
Macro 4.0
All the above-mentioned scripts can be analyzed seamlessly with the help of Script Tracer. Before this update, ANY.RUN users saw execution outcomes but not attackers’ script actions like:
API calls
OS checks
WMI requests
Script Tracer provides detailed insights into deobfuscated script activities, similar to code debugging. Besides this, access the Script Tracer reports from a tracer icon in the process tree or the Advanced Process Details report.
Here below, we have mentioned the two new additions:
New Indicator in the Process Tree
A New Tab in Advanced Process Details
Apart from this, this tracer also enables users to view compiled VBE scripts like:-
The script execution process
Namely requested functions
Transferred data
Script Tracer reveals hidden insights, like request results. Scripts run via executables, as with WMIC loading and executing vbscript for malware data collection.
Encountering VBS-based malware? Examine WSHRat as an example. Easily investigate Office macros and scripts. You can also delve into the visible Windows API in a sneaky document using “alloc” and “request.”
Implementing ANY.RUN’s Threat Intelligence products are simple. Contact the Any Run teamto learn more.