EncapsulateJay (@encapsulatej) 's Twitter Profile
EncapsulateJay

@encapsulatej

SOC Analyst @HuntressLabs

ID: 1363120332111032325

calendar_today20-02-2021 13:36:37

121 Tweet

113 Followers

388 Following

Anton (@antonlovesdnb) 's Twitter Profile Photo

Got a new Huntress blog out today looking at a case that Dray Agha Josh Allman and I worked on recently - VPN compromise, lateral movement, Veeam exploitation & some methodology notes throughout that newer folks might find particularly interesting! huntress.com/blog/untold-ta…

John Hammond (@_johnhammond) 's Twitter Profile Photo

We wrote up what Huntress has been seeing for the CrushFTP authentication bypass: CVE-2025-31161 (or CVE-2025-2825, whichever side of the bed you woke up on) leading to MeshCentral agents, AnyDesk, and neato "TelegramBot" malware. Patch plz! ✌️ huntress.com/blog/crushftp-…

We wrote up what <a href="/HuntressLabs/">Huntress</a> has been seeing for the CrushFTP authentication bypass: CVE-2025-31161 (or CVE-2025-2825, whichever side of the bed you woke up on) leading to MeshCentral agents, AnyDesk, and neato "TelegramBot" malware. Patch plz! ✌️ huntress.com/blog/crushftp-…
Rem (@sudo_rem) 's Twitter Profile Photo

huntress.com/blog/cve-2025-… Check out what Huntress has been busy with this weekend! If you're an IR/SOC analyst responding to this, we've included a query using WithSecure™'s Chainsaw to help ease the lift. #cve202530406 #CentreStack

Jai Minton (@cyberraiju) 's Twitter Profile Photo

Sample deployed via low detection Octowave Loader caught: virustotal.com/gui/file/141a6… - econusi[.digital/nwmb Interestingly low detection C2 amongst the noise is the newly registered domain posing as Warhammer Official - wawrhamer[.live

Sample deployed via low detection Octowave Loader caught:
virustotal.com/gui/file/141a6…
- econusi[.digital/nwmb

Interestingly low detection C2 amongst the noise is the newly registered domain posing as <a href="/warhammer/">Warhammer Official</a> 
- wawrhamer[.live
Jai Minton (@cyberraiju) 's Twitter Profile Photo

HijackLibs.net details hundreds of publicly disclosed DLL Hijacking opportunities. With over 700 stars on GitHub and a growing list, Wietze does an amazing job maintaining it. Despite this contributing can be time consuming. That's why I've created HijackLibs Helper!👇

HijackLibs.net details hundreds of publicly disclosed DLL Hijacking opportunities. With over 700 stars on GitHub and a growing list, <a href="/Wietze/">Wietze</a> does an amazing job maintaining it.

Despite this contributing can be time consuming. That's why I've created HijackLibs Helper!👇
The DFIR Report (@thedfirreport) 's Twitter Profile Photo

🚨 Search for software, end up getting ransomware! SEO-driven #Bumblebee malware campaigns observed throughout July led to domain compromise, data theft & #Akira ransomware. Tools included #AdaptixC2 & #Netscan. thedfirreport.com/2025/08/05/fro…

Ame (@pe4chscreeching) 's Twitter Profile Photo

🚨 Case from Huntress 🔎 Cephalus seen side loading DLL 'SentinelAgentCore.dll' into legitimate 'SentinelBrowserNativeHost.exe' for ransomware execution ✏️ File extension for encrypted files - '.sss'

🚨 Case from <a href="/HuntressLabs/">Huntress</a> 

🔎 Cephalus seen side loading DLL 'SentinelAgentCore.dll' into legitimate 'SentinelBrowserNativeHost.exe' for ransomware execution 

✏️ File extension for encrypted files - '.sss'
Rem (@sudo_rem) 's Twitter Profile Photo

If you’re running an SSLVPN (SonicWall, Fortigate, etc.) and not retaining those logs, you’re setting yourself up for disaster. It's not uncommon to see sub-10 minute slices of activity in the totality of exported logs; which is next to useless.

EncapsulateJay (@encapsulatej) 's Twitter Profile Photo

There's pretty much never been a better time to start learning or get hands on blue team experience through labs. The availability and quality of labs being released today compared to 4 years ago is night and day. Training providers like Xintra are paving the way for the future!

Ayush Anand (@securityinbits) 's Twitter Profile Photo

ClickFix just got clever-ditched Win+R for Win+X (Power User Menu) ⚠️ New variant drops Lumma after Defender exclusion: - Prompts for elevation till user accept - Add defender exclusion on %temp% - Drops & runs Lumma Multiple Sigma rules fired 💥 Process Tree👇

ClickFix just got clever-ditched Win+R for Win+X (Power User Menu) ⚠️

New variant drops Lumma after Defender exclusion:

- Prompts for elevation till user accept
- Add defender exclusion on %temp%
- Drops &amp; runs Lumma

Multiple Sigma rules fired 💥

Process Tree👇