Youssef A. Mohamed (@generaleg64) 's Twitter Profile
Youssef A. Mohamed

@generaleg64

CEO, Security Guru at @BuguardLLC && @DarkAtlasSquad

ID: 4885618827

linkhttps://darkatlas.io calendar_today07-02-2016 20:02:16

2,2K Tweet

6,6K Followers

904 Following

Dark Atlas Squad (@darkatlassquad) 's Twitter Profile Photo

Have you heard about ONNX Store? A sophisticated #PhaaS Platform targets financial institutions worldwide. Dark Atlas Squad revealed the identity of the threat actor behind #ONNX Store and #Caffeine Phishing Kit. Read about our investigation and findings:

Have you heard about ONNX Store? A sophisticated #PhaaS Platform targets financial institutions worldwide.

Dark Atlas Squad revealed the identity of the threat actor behind #ONNX Store and #Caffeine Phishing Kit. 

Read about our investigation and findings:
Dark Atlas Squad (@darkatlassquad) 's Twitter Profile Photo

We just released a technical analysis of #TrollAgent malware, used by the #Kimsuky #APT between Dec 2023 and Jan 2024 to target South Korean companies. darkatlas.io/blog/kimsuky-a…

Dark Atlas Squad (@darkatlassquad) 's Twitter Profile Photo

🚨 New OPSEC Failure Alert! 🚨 We just published an article on the Medusa Ransomware Group's OPSEC failure & how we infiltrated their cloud storage account. Full Article: darkatlas.io/blog/medusa-ra… #DarkAtlasSquad #Buguard #Medusa #Ransomware

🚨 New OPSEC Failure Alert! 🚨

We just published an article on the Medusa Ransomware Group's OPSEC failure & how we infiltrated their cloud storage account.

Full Article: darkatlas.io/blog/medusa-ra…

#DarkAtlasSquad #Buguard #Medusa #Ransomware
Modather (@prefire1) 's Twitter Profile Photo

If you notice a "session" parameter during OTP login, try this: log in to your account, capture the session key and OTP, then replace these in the victim's login request to potentially access their account. small attack critical bug

If you notice a "session" parameter during OTP login, try this: log in to your account, capture the session key and OTP, then replace these in the victim's login request to potentially access their account.

small attack critical bug
Youssef A. Mohamed (@generaleg64) 's Twitter Profile Photo

So I just started doing bug bounty again after 2-year break and reported 6 P1 on bugcrowd yesterday on an asset that they're paying on it for my teammate, and the program closed them all as N/A, out of scope (: What a comeback! #BugBounty

Dark Atlas Squad (@darkatlassquad) 's Twitter Profile Photo

We just released our 2nd Identity Reveal Report. We traced the threat actor behind ZATCA Saudi Arabia Leaks #gettexik Check it out now: darkatlas.io/blog/identity-… #DarkAtlasSquad #ThreatIntelligence #DarkWeb

We just released our 2nd Identity Reveal Report.
We traced the threat actor behind ZATCA Saudi Arabia Leaks #gettexik
Check it out now: 
darkatlas.io/blog/identity-…

#DarkAtlasSquad #ThreatIntelligence #DarkWeb
Youssef A. Mohamed (@generaleg64) 's Twitter Profile Photo

This is so stupid. Any one can get such data from info stealers even from Telegram. I can give you 35K H1 accounts. This isn't a data breach.

Dark Atlas Squad (@darkatlassquad) 's Twitter Profile Photo

🚨 New Blog from DarkAtlas Operational Analysis of the Ransomware Attack Lifecycle - we break down the full ransomware kill chain, tools, and tradecraft used by top threat actors. Read Now: darkatlas.io/blog/operation… #ransomware #ThreatIntel #DarkAtlas #infosec #CyberSecurity

🚨 New Blog from DarkAtlas
Operational Analysis of the Ransomware Attack Lifecycle - we break down the full ransomware kill chain, tools, and tradecraft used by top threat actors.
Read Now:
darkatlas.io/blog/operation…

#ransomware #ThreatIntel #DarkAtlas #infosec #CyberSecurity
Dark Atlas Squad (@darkatlassquad) 's Twitter Profile Photo

🆕 New Blog from DarkAtlas In-Depth Analysis of the Qilin Ransomware Operation – we unravel the full attack lifecycle, OPSEC mistakes, GitHub activity, tooling, Yara Rule and TTPs of this ransomware group. Read Now: darkatlas.io/blog/qilin-ran… #CyberThreats #Ransomware #Qilin

🆕 New Blog from DarkAtlas
 In-Depth Analysis of the Qilin Ransomware Operation – we unravel the full attack lifecycle, OPSEC mistakes, GitHub activity, tooling, Yara Rule and TTPs of this ransomware group.
 Read Now: darkatlas.io/blog/qilin-ran…

#CyberThreats #Ransomware #Qilin
مۭــ؏ــٰٱ̍ذ (@donmo3az) 's Twitter Profile Photo

في شباب لبناني عاملين مسلسل على تيك توك من ضمن احداثه انهم صحيوا في يوم لقوا نفسهم بيتكلموا مصري

Dark Atlas Squad (@darkatlassquad) 's Twitter Profile Photo

🎯New Blog Threat Actors are weaponizing legitimate digital marketing tools—like link shorteners, IP geolocation, and CAPTCHAs—for phishing, malware, and malvertising. The same tech that powers ads and analytics is used to mask attacks and evade detection. Stay vigilant! Read

🎯New Blog
Threat Actors are weaponizing legitimate digital marketing tools—like link shorteners, IP geolocation, and CAPTCHAs—for phishing, malware, and malvertising. The same tech that powers ads and analytics is used to mask attacks and evade detection. Stay vigilant!
Read
Dark Atlas Squad (@darkatlassquad) 's Twitter Profile Photo

🚨 New findings on #MuddyWater (MOIS-linked APT): Since Oct '23, we’ve tracked a sharp uptick in their ops — spear-phishing across the Middle East, w/ Israel as a key focus. Their playbook blends legitimate RMM tools (Atera, ScreenConnect, N-Able, Syncro) w/ custom malware

🚨 New findings on #MuddyWater (MOIS-linked APT):

Since Oct '23, we’ve tracked a sharp uptick in their ops — spear-phishing across the Middle East, w/ Israel as a key focus. Their playbook blends legitimate RMM tools (Atera, ScreenConnect, N-Able, Syncro) w/  custom malware
Youssef A. Mohamed (@generaleg64) 's Twitter Profile Photo

☢️ New Podcast Episode ☢️ For years, I spoke with security researchers. Now it’s time to hear the other side. This episode features Pryx, a well-known threat actor, discussing how the cybercrime ecosystem really works - no hype, no glorification. 🎧 youtu.be/-Ec1AXYojPs

☢️ New Podcast Episode ☢️

For years, I spoke with security researchers.
Now it’s time to hear the other side.

This episode features Pryx, a well-known threat actor, discussing how the cybercrime ecosystem really works - no hype, no glorification.

🎧 youtu.be/-Ec1AXYojPs
Dark Atlas Squad (@darkatlassquad) 's Twitter Profile Photo

☢️ New Podcast Episode Alert ☢️ In this episode, we sit down with Pryx, a well-known threat actor, to uncover how the cybercrime ecosystem truly operates no hype, no glorification, just raw insight. Link: youtu.be/-Ec1AXYojPs

☢️ New Podcast Episode Alert ☢️

In this episode, we sit down with Pryx, a well-known threat actor, to uncover how the cybercrime ecosystem truly operates no hype, no glorification, just raw insight.

Link: youtu.be/-Ec1AXYojPs
JustaBreach (@justabreach) 's Twitter Profile Photo

🚨🔴 Cybersecurity Incident Report: Alleged Breach of RESecurity Systems A group identifying as #cr0wdsp1d3rz has publicly claimed full access to RESecurity (a cybersecurity and threat intelligence firm) systems. Reportedly exfiltrated data includes: - Internal chats and logs -

🚨🔴 Cybersecurity Incident Report: Alleged Breach of RESecurity Systems

A group identifying as #cr0wdsp1d3rz has publicly claimed full access to RESecurity (a cybersecurity and threat intelligence firm) systems.

Reportedly exfiltrated data includes:
- Internal chats and logs
-
Dark Atlas Squad (@darkatlassquad) 's Twitter Profile Photo

❌NEW BLOG DROP❌ Ransomware is no longer just malware — it’s a full-blown ecosystem. DarkAtlas Squad exposes how ransom operations evolve and the new trends shaping today’s attacks. Stay sharp or stay breached. Link: darkatlas.io/blog/the-ranso… #darkatlas #RansomWare #DarkWeb

❌NEW BLOG DROP❌
Ransomware is no longer just malware — it’s a full-blown ecosystem.
DarkAtlas Squad exposes how ransom operations evolve and the new trends shaping today’s attacks.
Stay sharp or stay breached.
Link: darkatlas.io/blog/the-ranso…

#darkatlas #RansomWare #DarkWeb
Dark Atlas Squad (@darkatlassquad) 's Twitter Profile Photo

We’ve just published a comprehensive technical and reverse engineering analysis of the #Banshee InfoStealer—a sophisticated threat targeting macOS users. The report includes IOCs, YARA rules, and actionable security recommendations to help detect and mitigate this threat. Read

We’ve just published a comprehensive technical and reverse engineering analysis of the #Banshee InfoStealer—a sophisticated threat targeting macOS users. The report includes IOCs, YARA rules, and actionable security recommendations to help detect and mitigate this threat.

Read