Marc (@cti_marc) 's Twitter Profile
Marc

@cti_marc

ID: 1186542753699766273

linkhttp://blog.sekoia.io calendar_today22-10-2019 07:20:30

216 Tweet

466 Takipçi

258 Takip Edilen

crep1x (@crep1x) 's Twitter Profile Photo

The indicator of compromise mentioned in the Google TAG report that corresponds to a C2 server of #Rhadamanthys is 104.156.149[.]126, active at least from January 16, 2023 to end of March according to our Sekoia.io C2 trackers. It was also publicly shared by R. on ThreatFox!

The indicator of compromise mentioned in the Google TAG report that corresponds to a C2 server of #Rhadamanthys is 104.156.149[.]126, active at least from January 16, 2023 to end of March according to our <a href="/sekoia_io/">Sekoia.io</a> C2 trackers.

It was also publicly shared by <a href="/0xrb/">R.</a> on ThreatFox!
Sekoia.io (@sekoia_io) 's Twitter Profile Photo

🎉 Breaking News! Sekoia.io has raised €35M in a new round of financing, a record amount for a European cybersecurity company in series A! 🚀 #funding #fundraising #cybersecurity

Sekoia.io (@sekoia_io) 's Twitter Profile Photo

Our #TDR analysts just released their latest blogpost, aiming at understanding the #Iran Cyber Threat over the 2022-2023 period 🇮🇷 1/6 blog.sekoia.io/iran-cyber-thr…

Our #TDR analysts just released their latest blogpost, aiming at understanding the #Iran Cyber Threat over the 2022-2023 period 🇮🇷 1/6 

blog.sekoia.io/iran-cyber-thr…
Sekoia.io (@sekoia_io) 's Twitter Profile Photo

🥷 A newly registered member on the XSS cybercrime forum known as "berya” was observed recruiting “pentesters” (partners/affiliates in the ransomware-related slang) to possibly distribute #ransomware in vulnerability exploitation campaigns.

Sekoia.io (@sekoia_io) 's Twitter Profile Photo

Awesome report from The DFIR Report! C2 for #CobaltStrike and #Metasploit were in Sekoia.io CTI feed since October 2022! To learn more about our #C2Trackers capabilities: blog.sekoia.io/command-contro… Shoutout to C2IntelFeedsBot for reporting CobaltStrike C2 first in open-source

Sekoia.io (@sekoia_io) 's Twitter Profile Photo

🎮 We analyzed an ongoing campaign targeting online gamers. Multiple malware families are delivered through fake video game websites such as #Epsilon, #Doenerium, #BByStealer, and #NovaSentinel. blog.sekoia.io/game-over-gami… #CTI #infostealer

Sekoia.io (@sekoia_io) 's Twitter Profile Photo

#DarkGate gained popularity among threat actors (e.g: #TA577, #DuckTail), our #RE analysis details the internals of the malware, how it implements technique to evade defenses: Union-API, token theft via UpdateProcThreadAttribute, APC injection. blog.sekoia.io/darkgate-inter…

#DarkGate gained popularity among threat actors (e.g: #TA577, #DuckTail), our #RE analysis  details the internals of the malware, how it implements technique to evade defenses: Union-API, token theft via UpdateProcThreadAttribute, APC injection. blog.sekoia.io/darkgate-inter…
Sekoia.io (@sekoia_io) 's Twitter Profile Photo

🏦 Our latest report provides insights on the cyber threats impacting the #financial sector in 2023. We analysed the trends in lucrative and state-sponsored ecosystems and outlined the most notable evolutions. For more details, check out our blog post: blog.sekoia.io/unmasking-the-…

Marc (@cti_marc) 's Twitter Profile Photo

Domain was serving af03329a869288967859384dd3b56b8baf30d280919497dc6de927a97017aee7 Don't really know if the Anunak/Carbanak detection is good or not on VT.

Sekoia.io (@sekoia_io) 's Twitter Profile Photo

🧵 Sekoia.io tracks C2 infrastructures for main #stealer families sold as a Malware-as-a-Service (MaaS). Our view of active C2s, combined with our observations from telemetry, forum monitoring and sample tracking, gives us a global understanding of the stealer threat. ⬇️

🧵 <a href="/sekoia_io/">Sekoia.io</a> tracks C2 infrastructures for main #stealer families sold as a Malware-as-a-Service (MaaS).

Our view of active C2s, combined with our observations from telemetry, forum monitoring and sample tracking, gives us a global understanding of the stealer threat.

⬇️
Censys (@censysio) 's Twitter Profile Photo

🔍Discover how to proactively detect malicious activities with Censys data in our next webinar with  Sekoia.io. Explore challenges in monitoring decentralized infrastructures and see MalleableC2 in action📈Book your spot now: go.censys.com/April-Lunch-an…

Sekoia.io (@sekoia_io) 's Twitter Profile Photo

👀 Discover our new report, which provides an in-depth analysis of cyber threats to elections based on past targeted elections. It identifies various types of cyber operations and proposes an assessment of threats regarding the major elections in 2024. blog.sekoia.io/guarding-democ…

👀 Discover our new report, which provides an in-depth analysis of cyber threats to elections based on past targeted elections. It identifies various types of cyber operations and proposes an assessment of threats regarding the major elections in 2024.

blog.sekoia.io/guarding-democ…
Sekoia.io (@sekoia_io) 's Twitter Profile Photo

Have you ever heard about “#DoppelGänger”? 👀 In our new report, the Sekoia #TDR team analysed the #DoppelGänger campaign's relays, technical infrastructure, and shared narratives. blog.sekoia.io/master-of-pupp… #Influence #InformationWarfare #CTI

Have you ever heard about “#DoppelGänger”? 👀 

In our new report, the Sekoia #TDR team analysed the #DoppelGänger campaign's relays, technical infrastructure, and shared narratives. 
 
blog.sekoia.io/master-of-pupp…

#Influence #InformationWarfare #CTI
Sekoia.io (@sekoia_io) 's Twitter Profile Photo

🚨 Sekoia TDR uncovered key insights into the infrastructure behind #Emmenthal Loader distribution using #WebDAV as a service! Thanks to CERT Orange Cyberdefense & Mandiant (part of Google Cloud) for their research, which helped shed light on this! 🙏 Read the full report here: blog.sekoia.io/webdav-as-a-se…

🚨 Sekoia TDR uncovered key insights into the infrastructure behind #Emmenthal Loader distribution using #WebDAV as a service! 

Thanks to <a href="/CERTCyberdef/">CERT Orange Cyberdefense</a> &amp; <a href="/Mandiant/">Mandiant (part of Google Cloud)</a> for their research, which helped shed light on this! 🙏

Read the full report here: 
blog.sekoia.io/webdav-as-a-se…
Sekoia.io (@sekoia_io) 's Twitter Profile Photo

Since mid-2023, the Sekoia #TDR team has investigated an infrastructure which controls compromised edge devices transformed into Operational Relay Boxes (#ORBs) used to support operations of multiple 🇨🇳 intrusion sets. Check out the full report ⤵️ blog.sekoia.io/bulbature-bene…

Since mid-2023, the Sekoia #TDR team has investigated an infrastructure which controls compromised edge devices transformed into Operational Relay Boxes (#ORBs) used to support operations of multiple 🇨🇳 intrusion sets.

Check out the full report ⤵️

blog.sekoia.io/bulbature-bene…
Sekoia.io (@sekoia_io) 's Twitter Profile Photo

🚨 Discover #Mamba2FA, a previously unknown adversary-in-the-middle (AiTM) #phishing kit, sold as phishing-as-a-service (PhaaS) ⚠️ blog.sekoia.io/mamba-2fa-a-ne…

🚨 Discover #Mamba2FA, a previously unknown adversary-in-the-middle (AiTM) #phishing kit, sold as phishing-as-a-service (PhaaS) ⚠️

blog.sekoia.io/mamba-2fa-a-ne…
Sekoia.io (@sekoia_io) 's Twitter Profile Photo

🔍 TDR investigated the emerging #ClickFix social engineering tactic, which several intrusion sets adopted in 2024 to distribute their malware. Our research provides a chronological overview of the observed ClickFix campaigns and their victimology. blog.sekoia.io/clickfix-tacti…

🔍 TDR investigated the emerging #ClickFix social engineering tactic, which several intrusion sets adopted in 2024 to distribute their malware.

Our research provides a chronological overview of the observed ClickFix campaigns and their victimology.

blog.sekoia.io/clickfix-tacti…
Sekoia.io (@sekoia_io) 's Twitter Profile Photo

🇨🇳 We're excited to announce the publication of the latest Sekoia #TDR team report, « A Three Beats Waltz: The ecosystem behind Chinese state-sponsored cyber threats." blog.sekoia.io/a-three-beats-…

🇨🇳 We're excited to announce the publication of the latest Sekoia #TDR team report, « A Three Beats Waltz: The ecosystem behind Chinese state-sponsored cyber threats." 

blog.sekoia.io/a-three-beats-…