crep1x(@crep1x) 's Twitter Profileg
crep1x

@crep1x

Lead cybercrime analyst, tracking adversaries activities & infrastructure, at @sekoia_io

ID:624192041

calendar_today01-07-2012 23:52:17

574 Tweets

2,1K Followers

292 Following

crep1x(@crep1x) 's Twitter Profile Photo

Thanks for sharing!

Additional loader C2s:
cdn-inform.]com
utm-adschuk.]com
utm-adsgoogle.]com
utm-adsname.]com
utm-advrez.]com
utm-msh.]com

twitter.com/esthreat/statu…

account_circle
BleepingComputer(@BleepinComputer) 's Twitter Profile Photo

New MFA-bypassing phishing kit targets Microsoft 365, Gmail accounts - Bill Toulas
bleepingcomputer.com/news/security/…

bleepingcomputer.com/news/security/…

account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

Sekoia researchers present an in-depth analysis of the Tycoon 2FA Phishing-as-a-Service (PhaaS) kit and the recent developments they spotted such as obfuscation, anti-detection capabilities and new network traffic patterns. blog.sekoia.io/tycoon-2fa-an-…

Sekoia researchers present an in-depth analysis of the Tycoon 2FA Phishing-as-a-Service (PhaaS) kit and the recent developments they spotted such as obfuscation, anti-detection capabilities and new network traffic patterns. blog.sekoia.io/tycoon-2fa-an-…
account_circle
Sekoia.io(@sekoia_io) 's Twitter Profile Photo

The latest version of 2FA enhances its obfuscation and anti-detection capabilities, and changes network traffic patterns.

Our blog post aims to present an in-depth analysis of Tycoon 2FA and detail the recent developments we spotted in the phishing kit.

The latest version of #Tycoon 2FA enhances its obfuscation and anti-detection capabilities, and changes network traffic patterns. Our blog post aims to present an in-depth analysis of Tycoon 2FA and detail the recent developments we spotted in the phishing kit.
account_circle
Sekoia.io(@sekoia_io) 's Twitter Profile Photo

We just released an analysis of the latest version of Tycoon 2FA Phishing-as-a-Service ( ), uncovered by the Sekoia TDR team in October 2023.

2FA remains one of the most prevalent Adversary-in-The-Middle ( ) kits in early 2024.

blog.sekoia.io/tycoon-2fa-an-…

account_circle
Sekoia.io(@sekoia_io) 's Twitter Profile Photo

🤝 Explore our first joint report by CERT Orange Cyberdefense World Watch team and Sekoia TDR team aimed at demystifying Residential Proxies and highlighting their systemic growth and the transparency issues surrounding their sourcing

blog.sekoia.io/unveiling-the-…

🤝 Explore our first joint #CTI report by @CERTCyberdef World Watch team and Sekoia TDR team aimed at demystifying Residential Proxies #RESIP and highlighting their systemic growth and the transparency issues surrounding their sourcing blog.sekoia.io/unveiling-the-…
account_circle
CERT Orange Cyberdefense(@CERTCyberdef) 's Twitter Profile Photo

🤝For the last months, our World Watch team collaborated with Sekoia.io TDR team to investigate and demystify Residential Proxies and highlight their systemic growth and the transparency issues surrounding their sourcing ⤵️
orangecyberdefense.com/global/blog/re…

Orange Cyberdefense

🤝For the last months, our World Watch team collaborated with @sekoia_io TDR team to investigate and demystify Residential Proxies #RESIP and highlight their systemic growth and the transparency issues surrounding their sourcing ⤵️ orangecyberdefense.com/global/blog/re… #cti @orangecyberdef
account_circle
crep1x(@crep1x) 's Twitter Profile Photo

For those unfamiliar with the 'crypter' threat and its use by cybercriminals, I invite you to read our analysis on the subjet!

Crypters are essential for malware distribution.

Excellent and comprehensive paper by Livia!

⬇️

twitter.com/sekoia_io/stat…

account_circle
Sekoia.io(@sekoia_io) 's Twitter Profile Photo

🗝️ Navigate the crypters ecosystem with our latest report! Our analysts detail the functioning of these widely used software and explain how attackers leverage crypters to deliver malicious payloads at scale.

blog.sekoia.io/the-architects…

🗝️ Navigate the crypters ecosystem with our latest report! Our analysts detail the functioning of these widely used software and explain how attackers leverage crypters to deliver malicious payloads at scale. blog.sekoia.io/the-architects…
account_circle
Sekoia.io(@sekoia_io) 's Twitter Profile Photo

Sekoia closely monitors the activities of the pro-Russian threat group NoName057(16) since 2023.

Our Threat Detection & Research analysts published a comprehensive report on the significant advancements in their DDoS attack strategies and infrastructure.

blog.sekoia.io/noname05716-dd…

account_circle
Sekoia.io(@sekoia_io) 's Twitter Profile Photo

⏳Yesterday, Sekoia TDR team exposed a new infrastructure built after the publications, proving that the is still in use nowadays💥

blog.sekoia.io/the-predator-s…

⏳Yesterday, Sekoia TDR team exposed a new infrastructure built after the #PredatorFiles publications, proving that the #spyware is still in use nowadays💥 blog.sekoia.io/the-predator-s…
account_circle
ANSSI(@ANSSI_FR) 's Twitter Profile Photo

EN | 🕵️‍♀️ Once again this year, strategic and industrial espionage is the threat that has most mobilised the ANSSI teams.

📚 Discover the 2023 edition of the Cyber Threat Overview: cert.ssi.gouv.fr/uploads/CERTFR…

EN | 🕵️‍♀️ Once again this year, strategic and industrial espionage is the threat that has most mobilised the ANSSI teams. 📚 Discover the 2023 edition of the Cyber Threat Overview: cert.ssi.gouv.fr/uploads/CERTFR…
account_circle