Arkbird(@Arkbird_SOLG) 's Twitter Profileg
Arkbird

@Arkbird_SOLG

Malware slayer
Member of @CuratedIntel

ID:1089248858058772480

calendar_today26-01-2019 19:48:59

6,6K Tweets

13,6K Followers

64 Following

vx-underground(@vxunderground) 's Twitter Profile Photo

Malware review:

2024-02-27- European diplomats targeted by SPIKEDWIRE with WINELOADER

Notes:
*Zscaler on release of this article did not attribute it to any state-sponsored Threat Actor
*Mandiant later attributed this payload to APT29 March, 22nd 2024 in an article titled:

Malware review: 2024-02-27- European diplomats targeted by SPIKEDWIRE with WINELOADER Notes: *Zscaler on release of this article did not attribute it to any state-sponsored Threat Actor *Mandiant later attributed this payload to APT29 March, 22nd 2024 in an article titled:
account_circle
Group-IB Threat Intelligence(@GroupIB_TI) 's Twitter Profile Photo

From late 2023 to early 2024, has continued to target government entities in the Southeast Asia. Group-IB researchers have spotted several initial infection vectors (documents/executables) similar to previous Sharp Panda operations. These malicious files deliver the

account_circle
Sinaei(@Intel80x86) 's Twitter Profile Photo

If you've ever worked with HyperDbg, you probably know that everything in HyperDbg is treated as an event.

This new debugger is designed to allow us to control the smallest unit in computers which is a clock cycle, so we can execute custom actions for each event (clock).

account_circle
Kuba Gretzky(@mrgretzky) 's Twitter Profile Photo

Really interesting how easy it is to fingerprint TLS connections established from GO applications, by checking JA4 signature patterns.

You'd be amazed how many automated malicious URL scanners also use the same JA4 signature.

From: github.com/FoxIO-LLC/ja4

Really interesting how easy it is to fingerprint TLS connections established from GO applications, by checking JA4 signature patterns. You'd be amazed how many automated malicious URL scanners also use the same JA4 signature. From: github.com/FoxIO-LLC/ja4
account_circle
Ivan Kwiatkowski(@JusticeRage) 's Twitter Profile Photo

On March 25, the FBI released an indictment of APT31 hackers. We read it carefully to find new intel, and managed to connect a few dots (including about the RAWDOOR malware family).

Full article and IOCs: harfanglab.io/en/insidethela…

account_circle
Xiu(@osint_barbie) 's Twitter Profile Photo

Russian spotted on . 1 sample flagged by 24 vendors, 2 others only by Florian Roth rule. Cryptic method names like generateRandomPathAndName, createCryptPacket may point to obfuscated malicious activities. FTP/HTTP methods hint at potential unauthorized file transfers.

Russian #APT28 spotted on #macOS. 1 sample flagged by 24 vendors, 2 others only by @cyb3rops rule. Cryptic method names like generateRandomPathAndName, createCryptPacket may point to obfuscated malicious activities. FTP/HTTP methods hint at potential unauthorized file transfers.
account_circle
Valéry Rieß-Marchive | @valerymarchive.bsky.social(@ValeryMarchive) 's Twitter Profile Photo

Le très évasif groupe vient de revendiquer une contre La Compagnie de Phalsbourg en 🇫🇷
Interrogée, la victime ne réfute pas la survenue de l'incident et indique ne pas souhaiter faire de commentaire.

Le très évasif groupe #3am vient de revendiquer une #cyberattaque contre La Compagnie de Phalsbourg en 🇫🇷 Interrogée, la victime ne réfute pas la survenue de l'incident et indique ne pas souhaiter faire de commentaire. #ransomware
account_circle
SpecterOps 🇺🇦(@SpecterOps) 's Twitter Profile Photo

While Microsoft's User Account Control is not defined as a security boundary, bypassing UAC is still something attackers frequently do. Check out this blog post from Matt Nelson detailing one method for bypassing UAC using App Paths. ghst.ly/43U8XQY

account_circle
Unit 42(@Unit42_Intel) 's Twitter Profile Photo

Malicious activity tracked under the campaign is targeting CVE-2024-3400, which exploits a vulnerability in certain versions of PAN-OS software. This threat brief covers mitigations and product protections: bit.ly/3vPUngM

Malicious activity tracked under the campaign #OperationMidnightEclipse is targeting CVE-2024-3400, which exploits a vulnerability in certain versions of PAN-OS software. This threat brief covers mitigations and product protections: bit.ly/3vPUngM
account_circle
Florian Roth(@cyb3rops) 's Twitter Profile Photo

It’s Sunday 07:03 am and I decided to read Volexity‘s article on UTA0218‘s post exploitation activity (PaloAlto CVE-2024-3400).
I saw that a generic rule of mine detected the new UPSTYLE backdoor when it was uploaded to VT yesterday (while no one else had detections for it) and

It’s Sunday 07:03 am and I decided to read @Volexity‘s article on UTA0218‘s post exploitation activity (PaloAlto CVE-2024-3400). I saw that a generic rule of mine detected the new UPSTYLE backdoor when it was uploaded to VT yesterday (while no one else had detections for it) and
account_circle
Steven Adair(@stevenadair) 's Twitter Profile Photo

Our team at Volexity has identified a new 0day exploited in the wild. This time we caught a threat actor using an unauthenticated RCE in Palo Alto Networks GlobalProtect. It has been assigned CVE-2024-3400 and is covered in this Palo Alto Networks advisory security.paloaltonetworks.com/CVE-2024-3400

account_circle
Zscaler ThreatLabz(@Threatlabz) 's Twitter Profile Photo

ThreatLabz has released an IDA plugin to deobfuscate the strings for previous versions of .

Read our blog here: zscaler.com/blogs/security…

The source code for the IDA plugin can be found here: github.com/threatlabz/pik…

ThreatLabz has released an IDA plugin to deobfuscate the strings for previous versions of #Pikabot. Read our blog here: zscaler.com/blogs/security… The source code for the IDA plugin can be found here: github.com/threatlabz/pik…
account_circle
João Victor(@joaoviictorti) 's Twitter Profile Photo

Hi guys

Currently I've added to RustRedOps the Process Ghosting technique implemented in Rust, following the POC created by hasherezade

Check it out: github.com/joaoviictorti/…

Hi guys Currently I've added to RustRedOps the Process Ghosting technique implemented in Rust, following the POC created by @hasherezade Check it out: github.com/joaoviictorti/… #hacking #rust #malware #ghosting
account_circle