CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile
CTI Labs πŸ§ͺ

@ctilabs

πŸ” Cyber Threat Intelligence | OSINT | Dark Web | APT | ICS | Stay updated with latest feeds, tools and insights.

ID: 1652365960341344256

calendar_today29-04-2023 17:36:02

642 Tweet

185 Followers

601 Following

CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 Horns & Hooves Campaign Delivers NetSupport RAT 🚨 A new phishing campaign, dubbed "Horns & Hooves," is targeting users with malicious scripts disguised as business documents. Here's what you need to know: πŸ”‘ Key Details: - Campaign active since March 2023, targeting

🚨 Horns & Hooves Campaign Delivers NetSupport RAT 🚨  

A new phishing campaign, dubbed "Horns & Hooves," is targeting users with malicious scripts disguised as business documents. Here's what you need to know:  

πŸ”‘ Key Details:  
- Campaign active since March 2023, targeting
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 Kimsuky APT Group's Phishing Campaign Analysis 🚨 The Kimsuky group, a North Korea-linked APT, continues to target South Korean organizations with phishing campaigns. Here's what you need to know: πŸ”‘ Key Details: - Targets: Researchers, government, and related

🚨 Kimsuky APT Group's Phishing Campaign Analysis 🚨  

The Kimsuky group, a North Korea-linked APT, continues to target South Korean organizations with phishing campaigns. Here's what you need to know:  

πŸ”‘ Key Details:  
- Targets: Researchers, government, and related
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 AgentTesla Returns with Updated Loader & Advanced Encryption 🚨 The infamous **AgentTesla** infostealer is back, with attackers refining their techniques after a failed campaign. Here's what you need to know: πŸ”‘ Key Details: - Initial attack failed due to a missing

🚨 AgentTesla Returns with Updated Loader & Advanced Encryption 🚨  

The infamous **AgentTesla** infostealer is back, with attackers refining their techniques after a failed campaign. Here's what you need to know:  

πŸ”‘ Key Details:  
- Initial attack failed due to a missing
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 SmokeLoader Targets Companies in Taiwan 🚨 A sophisticated phishing campaign using **SmokeLoader** malware has been observed targeting industries in Taiwan, including manufacturing, healthcare, and IT. Here's what you need to know: πŸ”‘ Key Details: - **Delivery

🚨 SmokeLoader Targets Companies in Taiwan 🚨  

A sophisticated phishing campaign using **SmokeLoader** malware has been observed targeting industries in Taiwan, including manufacturing, healthcare, and IT. Here's what you need to know:  

πŸ”‘ Key Details:  
- **Delivery
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 RevC2 & Venom Loader Campaigns Unveiled 🚨 Zscaler ThreatLabz has uncovered two new malware families, **RevC2** and **Venom Loader**, used in sophisticated campaigns by the Venom Spider group. Here's what you need to know: πŸ”‘ Key Details: - **RevC2**: A backdoor using

🚨 RevC2 & Venom Loader Campaigns Unveiled 🚨  

Zscaler ThreatLabz has uncovered two new malware families, **RevC2** and **Venom Loader**, used in sophisticated campaigns by the Venom Spider group. Here's what you need to know:  

πŸ”‘ Key Details:  
- **RevC2**: A backdoor using
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 Threat Assessment: Howling Scorpius (Akira Ransomware) 🚨 The **Howling Scorpius** group, behind the Akira ransomware, is among the top 5 most active ransomware groups. Here's what you need to know: πŸ”‘ Key Details: - **Double Extortion**: Exfiltrates data before

🚨 Threat Assessment: Howling Scorpius (Akira Ransomware) 🚨  

The **Howling Scorpius** group, behind the Akira ransomware, is among the top 5 most active ransomware groups. Here's what you need to know:  

πŸ”‘ Key Details:  
- **Double Extortion**: Exfiltrates data before
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 New Andromeda/Gamarue C2 Cluster Discovered 🚨 Cybereason has uncovered a new cluster of Andromeda/Gamarue C2 servers targeting manufacturing and logistics companies in the APAC region. Here's what you need to know: πŸ”‘ Key Details: - Target: APAC manufacturing and

🚨 New Andromeda/Gamarue C2 Cluster Discovered 🚨  

Cybereason has uncovered a new cluster of Andromeda/Gamarue C2 servers targeting manufacturing and logistics companies in the APAC region. Here's what you need to know:  

πŸ”‘ Key Details:  
- Target: APAC manufacturing and
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 November 2024: Security Issues in the Financial Industry 🚨 AhnLab's latest report highlights major cyber threats targeting the financial sector in South Korea and globally. Here's a breakdown: πŸ”‘ Key Threats: - Database leaks: - Hungarian bank OT*** data leaked on

🚨 November 2024: Security Issues in the Financial Industry 🚨  

AhnLab's latest report highlights major cyber threats targeting the financial sector in South Korea and globally. Here's a breakdown:  

πŸ”‘ Key Threats:  
- Database leaks:  
  - Hungarian bank OT*** data leaked on
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 Russian Programmer Wanted by FBI to Stand Trial in Kaliningrad 🚨 A programmer accused of creating ransomware is set to face trial in Kaliningrad. Here's what we know: πŸ”‘ Key Details: - The accused, identified as Mikhail Matveev, is wanted by the FBI, which has offered

🚨 Russian Programmer Wanted by FBI to Stand Trial in Kaliningrad 🚨  

A programmer accused of creating ransomware is set to face trial in Kaliningrad. Here's what we know:  

πŸ”‘ Key Details:  
- The accused, identified as Mikhail Matveev, is wanted by the FBI, which has offered
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 Operation Destabilise: NCA Disrupts Multi-Billion Russian Money Laundering Networks 🚨 The National Crime Agency (NCA) has dismantled Russian money laundering networks linked to drugs, ransomware, and espionage. Here's what you need to know: πŸ”‘ Key Details: - Two

🚨 Operation Destabilise: NCA Disrupts Multi-Billion Russian Money Laundering Networks 🚨  

The National Crime Agency (NCA) has dismantled Russian money laundering networks linked to drugs, ransomware, and espionage. Here's what you need to know:  

πŸ”‘ Key Details:  
- Two
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 Joint Advisory Warns of PRC-Backed Cyber Espionage Targeting Telecom Networks 🚨 A joint advisory from Australia, Canada, New Zealand, and the U.S. highlights a cyber espionage campaign by **PRC-backed Salt Typhoon** targeting telecom providers. Here's what you need to

🚨 Joint Advisory Warns of PRC-Backed Cyber Espionage Targeting Telecom Networks 🚨  

A joint advisory from Australia, Canada, New Zealand, and the U.S. highlights a cyber espionage campaign by **PRC-backed Salt Typhoon** targeting telecom providers. Here's what you need to
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware 🚨 The Black Basta ransomware group has launched a new social engineering campaign with updated tactics and malware payloads. Here's what you need to know: πŸ”‘ Key Details: - Initial access: Email

🚨 Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware 🚨  

The Black Basta ransomware group has launched a new social engineering campaign with updated tactics and malware payloads. Here's what you need to know:  

πŸ”‘ Key Details:  
- Initial access: Email
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 From a Regular Infostealer to an Obfuscated Version 🚨 A new analysis reveals how attackers are using advanced obfuscation techniques to bypass security controls and make malware analysis more challenging. Here's what you need to know: πŸ”‘ Key Details: - Malware:

🚨 From a Regular Infostealer to an Obfuscated Version 🚨  

A new analysis reveals how attackers are using advanced obfuscation techniques to bypass security controls and make malware analysis more challenging. Here's what you need to know:  

πŸ”‘ Key Details:  
- Malware:
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 Phishing Malware Impersonating the National Tax Service (NTS) 🚨 AhnLab has observed a surge in phishing emails impersonating the National Tax Service (NTS), especially during tax filing periods. Here's what you need to know: πŸ”‘ Key Details: - Delivery methods: 1.

🚨 Phishing Malware Impersonating the National Tax Service (NTS) 🚨  

AhnLab has observed a surge in phishing emails impersonating the National Tax Service (NTS), especially during tax filing periods. Here's what you need to know:  

πŸ”‘ Key Details:  
- Delivery methods:  
  1.
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 C2 in Browser Isolation Environments: A Novel Attack Technique 🚨 Mandiant has uncovered a new method to bypass browser isolation technologies using QR codes for command-and-control (C2). Here's what you need to know: πŸ”‘ Key Details: - **Browser Isolation Types**:

🚨 C2 in Browser Isolation Environments: A Novel Attack Technique 🚨  

Mandiant has uncovered a new method to bypass browser isolation technologies using QR codes for command-and-control (C2). Here's what you need to know:  

πŸ”‘ Key Details:  
- **Browser Isolation Types**:
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 Threat Actor Targets Manufacturing Industry with Lumma Stealer & Amadey Bot 🚨 Cyble has uncovered a sophisticated campaign targeting the manufacturing sector. Here's what you need to know: πŸ”‘ Key Details: - Attack starts with a malicious LNK file disguised as a PDF,

🚨 Threat Actor Targets Manufacturing Industry with Lumma Stealer & Amadey Bot 🚨  

Cyble has uncovered a sophisticated campaign targeting the manufacturing sector. Here's what you need to know:  

πŸ”‘ Key Details:  
- Attack starts with a malicious LNK file disguised as a PDF,
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 VPN Exploitation in SaaS Environments: Darktrace Detection 🚨 Darktrace uncovered a phishing attack leveraging VPNs to exploit SaaS environments. Here's what happened: πŸ”‘ Key Details: - Attack began with a phishing email compromising an internal account. - Threat

🚨 VPN Exploitation in SaaS Environments: Darktrace Detection 🚨  

Darktrace uncovered a phishing attack leveraging VPNs to exploit SaaS environments. Here's what happened:  

πŸ”‘ Key Details:  
- Attack began with a phishing email compromising an internal account.  
- Threat
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 The Growing Threat of DocuSign Phishing Attacks 🚨 Cado Security Labs has identified a spearphishing campaign targeting tech executives using fake DocuSign emails. Here's what you need to know: πŸ”‘ Key Details: - Attackers mimic DocuSign branding to trick users into

🚨 The Growing Threat of DocuSign Phishing Attacks 🚨  

Cado Security Labs has identified a spearphishing campaign targeting tech executives using fake DocuSign emails. Here's what you need to know:  

πŸ”‘ Key Details:  
- Attackers mimic DocuSign branding to trick users into
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 Payroll Pirates: HR Phishing Campaign Targets Payroll Systems 🚨 Silent Push has uncovered a phishing campaign, dubbed "Payroll Pirates," targeting HR payroll systems to redirect employee funds. Here's what you need to know: πŸ”‘ Key Details: - Attackers use phishing

🚨 Payroll Pirates: HR Phishing Campaign Targets Payroll Systems 🚨  

Silent Push has uncovered a phishing campaign, dubbed "Payroll Pirates," targeting HR payroll systems to redirect employee funds. Here's what you need to know:  

πŸ”‘ Key Details:  
- Attackers use phishing
CTI Labs πŸ§ͺ (@ctilabs) 's Twitter Profile Photo

🚨 German Authorities Shut Down Crimenetwork, Germany's Largest Crime Marketplace 🚨 German authorities have dismantled Crimenetwork, a major online crime marketplace. Here's what you need to know: πŸ”‘ Key Details: - Crimenetwork was a hub for illegal activities, including

🚨 German Authorities Shut Down Crimenetwork, Germany's Largest Crime Marketplace 🚨  

German authorities have dismantled Crimenetwork, a major online crime marketplace. Here's what you need to know:  

πŸ”‘ Key Details:  
- Crimenetwork was a hub for illegal activities, including