codekia (@codekias) 's Twitter Profile
codekia

@codekias

ID: 1379963708445650945

calendar_today08-04-2021 01:06:08

10 Tweet

1 Followers

83 Following

Shadow Chaser Group (@shadowchasing1) 's Twitter Profile Photo

Today our researchers have found new sample which belongs to #Kimsuky #APT group ITW:946f787c129bf469298aa881fb0843f4 filename:210927 코로나 대응(보령-태안1)_취합_수정.PIF C2:hxxp://movie.youtoboo.kro.kr/test.php ITW:e33a34fa0e0696f6eae4feba11873f56 filename:Icon.pif

Today our researchers have found new sample which belongs to #Kimsuky #APT group
ITW:946f787c129bf469298aa881fb0843f4
filename:210927 코로나 대응(보령-태안1)_취합_수정.PIF
C2:hxxp://movie.youtoboo.kro.kr/test.php
ITW:e33a34fa0e0696f6eae4feba11873f56
filename:Icon.pif
CyberWar - 싸워 (@cyberwar_15) 's Twitter Profile Photo

#북한 #NorthKorea #CyberWar 북한 사이버 공작원이 건강검진 결과서 내용처럼 위장해 주요 관계자에게 해킹 공격을 수행하고 있습니다. 아래 아이피를 차단하시기 바랍니다. 121.162.94.185

#북한 #NorthKorea #CyberWar 

북한 사이버 공작원이 건강검진 결과서 내용처럼 위장해 주요 관계자에게 해킹 공격을 수행하고 있습니다. 아래 아이피를 차단하시기 바랍니다.
121.162.94.185
Kaspersky (@kaspersky) 's Twitter Profile Photo

New Ransomware Tool - Bitlocker Researchers from Kaspersky's GERT have uncovered a new cyberattack that utilises the native Windows protection tool, Bitlocker, to encrypt victims' disks. The malicious software, known as ShrinkLocker, is executed as a complex VBscript that

New Ransomware Tool - Bitlocker

Researchers from Kaspersky's GERT have uncovered a new cyberattack that utilises the native Windows protection tool, Bitlocker, to encrypt victims' disks.

The malicious software, known as ShrinkLocker, is executed as a complex VBscript that
Kyle Cucci (@d4rksystem) 's Twitter Profile Photo

#MalwareAnaysis tip: I've been using "shellcode2exe" a lot lately. It makes it a lot easier to statically analyze and especially debug shellcode, or run the shellcode in a sandbox. Shellcode2exe basically adds a PE header to your raw shellcode. 🤓 Any similar tools you all use?

#MalwareAnaysis tip: I've been using "shellcode2exe" a lot lately. It makes it a lot easier to statically analyze and especially debug shellcode, or run the shellcode in a sandbox. Shellcode2exe basically adds a PE header to your raw shellcode. 🤓

Any similar tools you all use?
Het Mehta (@hetmehtaa) 's Twitter Profile Photo

Malware reverse engineering for beginners. Part 1: intezer.com/blog/malware-a… Part 2: intezer.com/blog/incident-… #malware #infosec

Stephen Sims (@steph3nsims) 's Twitter Profile Photo

Join me next Friday, July 5th with allthingsida, as we take a look at various Plugins and Work-flows he's created for reversing with IDA Pro! youtube.com/watch?v=iJ8SEg… youtube.com/@OffByOneSecur… discord.gg/offbyonesecuri…

Join me next Friday, July 5th with <a href="/allthingsida/">allthingsida</a>, as we take a look at various Plugins and Work-flows he's created for reversing with IDA Pro!

youtube.com/watch?v=iJ8SEg…

youtube.com/@OffByOneSecur…

discord.gg/offbyonesecuri…
SecAI (@secai_ai) 's Twitter Profile Photo

We’ve uncovered a malicious domain linked to the notorious #Kimsuky #APT group: http-nid[.]cert[.]p-e[.]kr, tied to #phishing and uses #DDNS tech to dodge detection. This group known for targeting South Korea.🕵️‍♂️ Check out: secai.ai/share?threadId… #CyberSecurity #ThreatIntel

We’ve uncovered a malicious domain linked to the notorious #Kimsuky #APT group: 
http-nid[.]cert[.]p-e[.]kr, tied to #phishing and uses #DDNS tech to dodge detection. This group known for targeting South Korea.🕵️‍♂️

Check out: secai.ai/share?threadId…

#CyberSecurity #ThreatIntel