R.NF

629 readers
3 users here now

Dive into R.NF – the next generation of social discourse on the Fediverse. Merging the familiarity of platforms like Reddit with the decentralized power of the Fediverse, R.NF stands as a beacon for free thinkers, curious minds, and passionate debaters. Here, your voice isn't just another drop in the ocean – it's a wave. Discover niche communities, engage in rich discussions, and shape the narrative. Welcome to a space where conversation knows no bounds. Join R.NF, and let's redefine discourse, together.

Basic Rules

  1. No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
  2. Be respectful, especially when disagreeing. Everyone should feel welcome here.
  3. No Ads / Spamming.
  4. NSFW posts must be tagged.

More R.NF

  1. https://a.r.nf/ - Alexandrite UI
  2. https://old.r.nf/ - A familiar UI
  3. https://p.r.nf/ - Photon UI
  4. https://m.r.nf/ - A mobile-first UI

Contact Administrator

  1. Mastodon
  2. Email
founded 1 year ago
ADMINS
1
 
 

cross-posted from: https://feddit.org/post/2611386

Archived link

TIDRONE, a threat actor linked to Chinese-speaking groups, targets military-related industry chains in Taiwan

  • TIDRONE, an unidentified threat actor linked to Chinese-speaking groups, has demonstrated significant interest in military-related industry chains, especially in the manufacturers of drones’ sector in Taiwan

  • The threat cluster uses enterprise resource planning (ERP) software or remote desktops to deploy advanced malware toolsets such as the CXCLNT and CLNTEND.

  • CXCLNT has basic upload and download file capabilities, along with features for clearing traces, collecting victim information such as file listings and computer names, and downloading additional portable executable (PE) files for execution

  • CLNTEND is a newly discovered remote access tool (RAT) that was used this April and supports a wider range of network protocols for communication

  • During the post-exploitation phase, telemetry logs revealed user account control (UAC) bypass techniques, credential dumping, and hacktool usage to disable antivirus products.

2
 
 

Archived link

TIDRONE, a threat actor linked to Chinese-speaking groups, targets military-related industry chains in Taiwan

  • TIDRONE, an unidentified threat actor linked to Chinese-speaking groups, has demonstrated significant interest in military-related industry chains, especially in the manufacturers of drones’ sector in Taiwan

  • The threat cluster uses enterprise resource planning (ERP) software or remote desktops to deploy advanced malware toolsets such as the CXCLNT and CLNTEND.

  • CXCLNT has basic upload and download file capabilities, along with features for clearing traces, collecting victim information such as file listings and computer names, and downloading additional portable executable (PE) files for execution

  • CLNTEND is a newly discovered remote access tool (RAT) that was used this April and supports a wider range of network protocols for communication

  • During the post-exploitation phase, telemetry logs revealed user account control (UAC) bypass techniques, credential dumping, and hacktool usage to disable antivirus products.

view more: next ›