myp0cket (@myp0cket) 's Twitter Profile
myp0cket

@myp0cket

APT Follow | Analyze threats🕵️‍♂️ #bitcoin

ID: 845196919446024193

calendar_today24-03-2017 08:53:43

532 Tweet

180 Takipçi

735 Takip Edilen

Ben Zhou (@benbybit) 's Twitter Profile Photo

Bybit Hack Forensics Report As promised, here are the preliminary reports of the hack conducted by Sygnia and Verichains Screenshotted the conclusion and here is the link to the full report: docsend.com/view/s/rmdi832…

Bybit Hack Forensics Report
As promised, here are the preliminary reports of the hack conducted by <a href="/sygnia_labs/">Sygnia</a> and <a href="/Verichains/">Verichains</a> 
Screenshotted the conclusion and here is the link to the full report: docsend.com/view/s/rmdi832…
myp0cket (@myp0cket) 's Twitter Profile Photo

#Lazarus IOC goingladies[.com getstockprice[.com trashcrease[.com anglerstatic[.com 70.34.245.118 178.128.77.132 131.226.2.43 23.236.169.233 185.194.178.88 45.86.202.224

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

🚨 Mandiant has detected threat actors leveraging x86-64 compiled macOS malware, likely due to broader compatibility and relaxed execution policies. Understand how to investigate these intrusions → bit.ly/4haFZ4j

🚨 Mandiant has detected threat actors leveraging x86-64 compiled macOS malware, likely due to broader compatibility and relaxed execution policies.

Understand how to investigate these intrusions → bit.ly/4haFZ4j
blackorbird (@blackorbird) 's Twitter Profile Photo

Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of #Lazarus’s Subgroup blogs.jpcert.or.jp/en/2025/03/cla…

Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of #Lazarus’s Subgroup

blogs.jpcert.or.jp/en/2025/03/cla…
blackorbird (@blackorbird) 's Twitter Profile Photo

Update⚠️ More IOCs From Contagious to #ClickFake Interview: #Lazarus leveraging the ClickFix tactic blog.sekoia.io/clickfake-inte…

Update⚠️ More IOCs
From Contagious to #ClickFake Interview: #Lazarus leveraging the ClickFix tactic
blog.sekoia.io/clickfake-inte…
Grafana (@grafana) 's Twitter Profile Photo

23pds (山哥) To follow up: At this time, our investigation has found no evidence of code modifications, unauthorized access to production systems, exposure of customer data, or access to personal information. grafana.com/blog/2025/04/2…

CZ 🔶 BNB (@cz_binance) 's Twitter Profile Photo

Just got this security warning. Ledger's Discord admin account was hacked. The scammer falsely claimed a security flaw and urged users to enter their recovery phrases on a phishing site. Lessons: 1. Never give up your private key recovery phrases no matter who is doing the

blackorbird (@blackorbird) 's Twitter Profile Photo

#IOS iMessage Vulnerability(Nickname) IOCs The vulnerability impacts iOS "Share Name and Photo" feature in iMessage #mvt Forensics (p4) process "imagent" crash logs consistently show failures in objc_retain() github.com/blackorbird/AP…

#IOS iMessage Vulnerability(Nickname) IOCs
The vulnerability impacts iOS "Share Name and Photo" feature in iMessage
#mvt Forensics (p4) process "imagent"
crash logs consistently show failures in objc_retain()

github.com/blackorbird/AP…
矩阵之门Matrixport官方华语 (@matrixport_cn) 's Twitter Profile Photo

🎉周五来咯 !来点特别的 抽3位粉丝送出 Matrixport 夹娃娃机 or 限量周边 🎁 参与方法超简单: 1️⃣:关注 Matrixport Official & 矩阵之门Matrixport官方华语 2️⃣:RT + 评论区tag 3位朋友

blackorbird (@blackorbird) 's Twitter Profile Photo

ToolShell Mass Exploitation (CVE-2025-53770) Stealing machine keys to maintain persistent access SharePoint -> The exchange server is the next target research.eye.security/sharepoint-und…

ToolShell Mass Exploitation (CVE-2025-53770)
Stealing machine keys to maintain persistent access
SharePoint -&gt; The exchange server is the next target
research.eye.security/sharepoint-und…
Zscaler ThreatLabz (@threatlabz) 's Twitter Profile Photo

Zscaler ThreatLabz has uncovered NodeCordRAT exploiting supply chain vulnerabilities via NPM. Hidden in three separate NPM packages, NodeCordRAT steals browser credentials, files containing API secrets, and cryptocurrency wallet data. The C2 communication occurs via Discord.

Zscaler ThreatLabz has uncovered NodeCordRAT exploiting supply chain vulnerabilities via NPM. Hidden in three separate NPM packages, NodeCordRAT steals browser credentials, files containing API secrets, and cryptocurrency wallet data. The C2 communication occurs via Discord.
blackorbird (@blackorbird) 's Twitter Profile Photo

A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby Google Project Zero published the first part of a three-part series detailing a fully remote 0-click exploit chain targeting the Google Pixel 9 (running Android as of early 2026). The research was conducted to

A 0-click exploit chain for the Pixel 9 Part 1: Decoding Dolby

Google Project Zero published the first part of a three-part series detailing a fully remote 0-click exploit chain targeting the Google Pixel 9 (running Android as of early 2026). The research was conducted to
blackorbird (@blackorbird) 's Twitter Profile Photo

Fake 7-Zip Site 7zip[.]com Serves Malware: Turns Home PCs Into Proxy Nodes The top-level domain 7zip[.]com, registered back in 1999, is now distributing Trojan-infected 7-Zip installers. While the software appears to work normally for file extraction, it silently drops

Fake 7-Zip Site 7zip[.]com Serves Malware: Turns Home PCs Into Proxy Nodes
The top-level domain 7zip[.]com, registered back in 1999, is now distributing Trojan-infected 7-Zip installers. While the software appears to work normally for file extraction, it silently drops