William MacArthur (@anti_expl0it) 's Twitter Profile
William MacArthur

@anti_expl0it

Director of Threat Research & Intelligence @InQuest: All views expressed are from my own brain. “Sharing is caring”

ID: 778763839974232065

linkhttps://InQuest.net calendar_today22-09-2016 01:12:23

173 Tweet

1,1K Takipçi

387 Takip Edilen

InQuest (@inquest) 's Twitter Profile Photo

This is an odd one here with extreme uri length + directory traversal flavor a+ .dotm file suffix. AS37963 - ALIBABA (US) TECHNOLOGY. Note labs.inquest.net/dfi/sha256/167… James Joe Roosen William MacArthur dao ming si

This is an odd one here with extreme uri length + directory traversal flavor a+ .dotm file suffix.

AS37963 - ALIBABA (US) TECHNOLOGY. Note 

labs.inquest.net/dfi/sha256/167…

<a href="/James_inthe_box/">James</a> <a href="/JRoosen/">Joe Roosen</a> <a href="/Anti_Expl0it/">William MacArthur</a> <a href="/dms1899/">dao ming si</a>
InQuest (@inquest) 's Twitter Profile Photo

📌 Watch our intro video, access our open research portal: labs.inquest.net Follow our Blog: inquest.net/blog See our open-source work: github.com/InQuest Connect on LinkedIn: linkedin.com/company/inques……… Tweets with 🤖 are InQuest Labs automation.

InQuest (@inquest) 's Twitter Profile Photo

We are sharing this visual for tracking threat actors/groups related to the current #ukraine conflict. The content was collected from various sources within the #infosec community. Special thanks to all involved. William MacArthur Nick Chalard J. A. Guerrero-Saade

We are sharing this visual for tracking threat actors/groups related to the current #ukraine conflict. The content was collected from various sources within the #infosec community. Special thanks to all involved.

<a href="/Anti_Expl0it/">William MacArthur</a> <a href="/Autow00t/">Nick Chalard</a> <a href="/juanandres_gs/">J. A. Guerrero-Saade</a>
InQuest (@inquest) 's Twitter Profile Photo

An update our previous graphic we shared on the cyber-front of the #ukraine conflict. This content was collected from various sources and collaborations within the #infosec community. Special thanks to all involved. William MacArthur Nick Chalard J. A. Guerrero-Saade Jon Gorenflo 🇺🇦🌻

An update our previous graphic we shared on the cyber-front of the #ukraine conflict. This content was collected from various sources and collaborations within the #infosec community. Special thanks to all involved.

<a href="/Anti_Expl0it/">William MacArthur</a>
<a href="/Autow00t/">Nick Chalard</a>
<a href="/juanandres_gs/">J. A. Guerrero-Saade</a>
<a href="/flakpaket/">Jon Gorenflo 🇺🇦🌻</a>
InQuest (@inquest) 's Twitter Profile Photo

Interesting Doughnut 0 VT Score for a "Test?" Doc leading to #Metasploit labs.inquest.net/dfi/sha256/e40… FYI: We heard some others seeing some waves of this week. James William MacArthur ExecuteMalware Nick Chalard

Interesting Doughnut 0 VT Score  for a "Test?" Doc leading to #Metasploit 

labs.inquest.net/dfi/sha256/e40…

FYI: We heard some others seeing some waves of this week.

<a href="/James_inthe_box/">James</a>
<a href="/Anti_Expl0it/">William MacArthur</a> 
<a href="/executemalware/">ExecuteMalware</a>
<a href="/Autow00t/">Nick Chalard</a>
InQuest (@inquest) 's Twitter Profile Photo

As a follow up to the previous graphic outlining threats affecting #Ukraine, here is a high level blog on observed threats. Big thanks to the #infosec community for making this possible, #SlavaUkraini William MacArthur Nick Chalard J. A. Guerrero-Saade Jon Gorenflo 🇺🇦🌻 inquest.net/blog/2022/04/0…

As a follow up to the previous graphic outlining threats affecting #Ukraine, here is a high level blog on observed threats. Big thanks to the #infosec community for making this possible, #SlavaUkraini

<a href="/Anti_Expl0it/">William MacArthur</a>
<a href="/Autow00t/">Nick Chalard</a>
<a href="/juanandres_gs/">J. A. Guerrero-Saade</a>
<a href="/flakpaket/">Jon Gorenflo 🇺🇦🌻</a>

inquest.net/blog/2022/04/0…
InQuest (@inquest) 's Twitter Profile Photo

Looks like #Qbot is back in action. Green Lure seen at least, where is the blue :P labs.inquest.net/dfi/sha256/637… 5.254.118.]198 91.194.11.]15 146.70.87.]163 James Cryptolaemus William MacArthur Nick Chalard

Looks like #Qbot is back in action. Green Lure seen at least, where is the blue :P

labs.inquest.net/dfi/sha256/637…

5.254.118.]198
91.194.11.]15
146.70.87.]163

<a href="/James_inthe_box/">James</a> 
<a href="/Cryptolaemus1/">Cryptolaemus</a> 
<a href="/Anti_Expl0it/">William MacArthur</a>
<a href="/Autow00t/">Nick Chalard</a>
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Historic Hotel of America leads to modern malware for their guests. Why securing your inbox with more than just anti-malware engines is needed to prevent cybercrime attacks. Sponsored by InQuest #cybersecurity #emotet #phishing bleepingcomputer.com/news/security/…

InQuest (@inquest) 's Twitter Profile Photo

We've just added a notion of "collections" to the file corpus (DFI) of labs.inquest.net. Included today are files from InQuest Macro Clustering (~10k), the Enron leak (~16k), and those from the dataset used in the "Invoice #31415 attached" research paper (~15k).

We've just added a notion of "collections" to the file corpus (DFI) of labs.inquest.net. Included today are files from InQuest Macro Clustering (~10k), the Enron leak (~16k), and those from the dataset used in the "Invoice #31415 attached" research paper (~15k).
Pedram Amini (@pedramamini) 's Twitter Profile Photo

I'm very excited to share that after countless sleepless nights we're having a break-out year at InQuest and are looking to double in size in the near term. We're seeking senior talent in both research & development as well as sales & marketing: inquest.net/careers

InQuest (@inquest) 's Twitter Profile Photo

Some field notes on an active and successful Phishing campaign that leverages a low-detection document-based lure, to pivot through various hosting providers. Samples, IOCs, and more: inquest-labs.notion.site/2022-11-View-N… #phishing #malware #malwareanalysis

Some field notes on an active and successful Phishing campaign that leverages a low-detection document-based lure, to pivot through various hosting providers. Samples, IOCs, and more:

inquest-labs.notion.site/2022-11-View-N…

#phishing #malware #malwareanalysis
Pedram Amini (@pedramamini) 's Twitter Profile Photo

New InQuest blog post covering the recent rise of Microsoft OneNote as a malware carrier: inquest.net/blog/2023/02/2… We cover the timeline, campaigns, and tools. You can find downloadable samples and YARA detection logic at: github.com/InQuest/malwar… github.com/InQuest/yara-r…

New <a href="/InQuest/">InQuest</a> blog post covering the recent rise of Microsoft OneNote as a malware carrier:

inquest.net/blog/2023/02/2…

We cover the timeline, campaigns, and tools. You can find  downloadable samples and YARA detection logic at:

github.com/InQuest/malwar…

github.com/InQuest/yara-r…
InQuest (@inquest) 's Twitter Profile Photo

InQuest and Zscaler ThreatLabz have analyzed #MysticStealer, a new malware family that extracts data from various sources, including web browsers and cryptocurrency wallets, through its obfuscation techniques ➡️ bit.ly/3N7IHe1 #Malware #CyberSecurity #Cryptocurrency

InQuest and <a href="/Threatlabz/">Zscaler ThreatLabz</a> have analyzed #MysticStealer, a new malware family that extracts data from various sources, including web browsers and cryptocurrency wallets, through its obfuscation techniques ➡️ bit.ly/3N7IHe1

#Malware #CyberSecurity #Cryptocurrency
InQuest (@inquest) 's Twitter Profile Photo

In an era of sophisticated ⚠️ cyber-attacks, 📝 documenting attack sequences is crucial for proactive🛡️ prevention. 🔗 Read our blog by @anti_Expl0it for a view on threat sequencing and its significance ➡️ hubs.ly/Q02bFstM0 #ThreatSequencing #ThreatIntel #Cybersecurity