James Northey (@darkrym11) 's Twitter Profile
James Northey

@darkrym11

SOC Analyst @HuntressLabs | Malware junkie | 5+ yrs in Military Cyber
Always learning, always curious

ID: 1938750130204876805

linkhttp://www.darkrym.com/ calendar_today28-06-2025 00:03:57

0 Tweet

14 Takipçi

88 Takip Edilen

James Northey (@darkrym11) 's Twitter Profile Photo

In a recent investigation Huntress we uncovered how attackers used LFI for log-poisoning with an AntSword Shell to drop Nezha and then Ghost RAT. Big shoutout to Jai Minton and alden learnt heaps from them while working this one.

Ben (@polygonben) 's Twitter Profile Photo

My first Huntress blog is live: we break down some funky ClickFix lures that lead to a loader which uses steganography to extract shellcode and ultimately deliver LummaC2/Rhadamanyths stealers. Big thanks to RussianPanda 🐼 🇺🇦 for the help! 😇 huntress.com/blog/clickfix-…

My first <a href="/HuntressLabs/">Huntress</a> blog is live: we break down some funky ClickFix lures that lead to a loader which uses steganography to extract shellcode and ultimately deliver LummaC2/Rhadamanyths stealers.

Big thanks to <a href="/RussianPanda9xx/">RussianPanda 🐼 🇺🇦</a> for the help! 😇

huntress.com/blog/clickfix-…
James Northey (@darkrym11) 's Twitter Profile Photo

Investigated a very interesting attack at Huntress . Where the threat actors weaponised a slew of legitimate tools (Velociraptor, VS Code, and Cloudflared) to establish persistent access, culminating in Warlock ransomware. Check out the full technical breakdown!

James Northey (@darkrym11) 's Twitter Profile Photo

Great peek behind the curtain for how we do what we do, if your looking at getting into SOC work or just curious how we investigate this is well worth a read.