CryptoInsane (@cryptoinsane) 's Twitter Profile
CryptoInsane

@cryptoinsane

Threat Intelligence | Analyst/Researcher | #Malware | #Reverse | #OSINT | #Programmer | #Cryptographer | Physicist & Mathematician | 🕵️‍♂️🦾🇵🇪

ID: 3740550016

linkhttps://binsider-lab.blogspot.com/ calendar_today22-09-2015 16:26:42

3,3K Tweet

13,13K Followers

156 Following

CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🔍 "The Ant Trying to Shake a Tree" — Investigation Report on Cyberattack Activities by the 'Information and Electronic Warfare Force' Hacker Organization under the DPP Authorities in Taiwan. Five Advanced Persistent Threat (APT) groups, allegedly operated under Taiwan’s

🔍 "The Ant Trying to  Shake a Tree" — Investigation Report on Cyberattack Activities by the  'Information and Electronic Warfare Force' Hacker Organization under the  DPP Authorities in Taiwan.

Five  Advanced Persistent Threat (APT) groups, allegedly operated under  Taiwan’s
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🚨 New ransomware alert: Nova Ransomware 🧬 A new ransomware-as-a-service operation named Nova Ransomware has emerged. Written in Rust, it delivers custom-built lockers for Windows, Linux, and VMware ESXi, and uses AES and ChaCha20-Poly1305 encryption algorithms. 💬 Nova

🚨 New ransomware alert: Nova Ransomware

🧬 A new ransomware-as-a-service operation named Nova Ransomware has emerged. Written in Rust, it delivers custom-built lockers for Windows, Linux, and VMware ESXi, and uses AES and ChaCha20-Poly1305 encryption algorithms.

💬 Nova
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🔐 [Critical Alert] Possible Data Breach: Banco de la Nación (🇵🇪) A recent post in an underground forum is offering a data dump of ~60,000 client records allegedly from Banco de la Nación del Perú (2025). 📋 Includes: Full names, emails, and national IDs 💣 Intended use: Fraud,

🔐 [Critical Alert] Possible Data Breach: Banco de la Nación (🇵🇪)

A recent post in an underground forum is offering a data dump of ~60,000 client records allegedly from Banco de la Nación del Perú (2025).

📋 Includes: Full names, emails, and national IDs
💣 Intended use: Fraud,
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🚨 Chihuahua Stealer 👾🖥️ Internal alias: Normaldaki 2.2 🧬 Classification: Modular Infostealer This malware, written in C#, exhibits the following technical characteristics: 🔍 Sensitive Data Collection Extracts credentials and browser data from multiple Chromium and

🚨 Chihuahua Stealer  👾🖥️

Internal alias: Normaldaki 2.2

🧬 Classification: Modular Infostealer

This malware, written in C#, exhibits the following technical characteristics:

🔍 Sensitive Data Collection

Extracts credentials and browser data from multiple Chromium and
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🔍 Technical report exposes cyber sabotage via malicious firmware in Iranian industrial terminals 🖥️💣 A recently surfaced report reveals a surgical attack targeting critical devices using destructive firmware. The code checks for specific MAC addresses and, if matched, triggers

🔍 Technical report exposes cyber sabotage via malicious firmware in Iranian industrial terminals 🖥️💣

A recently surfaced report reveals a surgical attack targeting critical devices using destructive firmware. The code checks for specific MAC addresses and, if matched, triggers
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🚨 False alarm about Pegasus 🕵️‍♂️💻 Apparently, an actor had leaked the alleged source code of Pegasus, the infamous spyware developed by NSO Group. However, it seems to be a hoax ⚠️📉 This kind of misinformation can mislead the cybersecurity community and divert valuable

🚨 False alarm about Pegasus 🕵️‍♂️💻

Apparently, an actor had leaked the alleged source code of Pegasus, the infamous spyware developed by NSO Group. However, it seems to be a hoax ⚠️📉

This kind of misinformation can mislead the cybersecurity community and divert valuable
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🦅🔍 APT NightEagle (APT-Q-95) is a highly sophisticated group operating mainly during Beijing night hours, with fixed and methodical working patterns. 🌐 Forensic evidence suggests a likely origin in North America (GMT-8 time zone), with campaigns targeting critical sectors in

🦅🔍 APT NightEagle (APT-Q-95) is a highly sophisticated group operating mainly during Beijing night hours, with fixed and methodical working patterns.

🌐 Forensic evidence suggests a likely origin in North America (GMT-8 time zone), with campaigns targeting critical sectors in
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

Shinobi Ransomware 🕵️👾🔐 📌 Shinobi ransomware features a rich and modular command-line interface, allowing attackers to customize encryption strategies and execution behavior with precision. Key insights from its argument set: 🗂️ Configurable encryption modes: --mode fast

Shinobi Ransomware  🕵️👾🔐

📌 Shinobi ransomware features a rich and modular command-line interface, allowing attackers to customize encryption strategies and execution behavior with precision. Key insights from its argument set:

🗂️ Configurable encryption modes:

--mode fast
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🔍 Unmasking AsyncRAT: Navigating a Complex Ecosystem of Malicious Forks By ESET Research ESET has released a detailed report shedding light on AsyncRAT, an open-source Remote Access Trojan (RAT) that has evolved into a vast and intricate ecosystem of malicious forks.

🔍 Unmasking AsyncRAT: Navigating a Complex Ecosystem of Malicious Forks By ESET Research

ESET has released a detailed report shedding light on AsyncRAT, an open-source Remote Access Trojan (RAT) that has evolved into a vast and intricate ecosystem of malicious forks.
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🔐 Google strengthens cybersecurity with AI: Big Sleep takes the lead 🔐 Google has introduced Big Sleep, a powerful AI agent capable of identifying real-world software vulnerabilities before they’re exploited. 💥 It has already uncovered flaws like CVE‑2025‑6965, helping

🔐 Google strengthens cybersecurity with AI: Big Sleep takes the lead 🔐

Google  has introduced Big Sleep, a powerful AI agent capable of identifying  real-world software vulnerabilities before they’re exploited.

💥 It has already uncovered flaws like CVE‑2025‑6965, helping
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🧠💣 Deep Dive into Matanbuchus Loader – Reverse Engineering a Modern Malware-as-a-Service 🚨 Here's a technical breakdown of Matanbuchus, a stealthy malware loader used by APT groups to deploy payloads like Cobalt Strike, Sliver, and more. This analysis reveals how it avoids

🧠💣 Deep Dive into Matanbuchus Loader – Reverse Engineering a Modern Malware-as-a-Service

🚨  Here's a technical breakdown of Matanbuchus, a stealthy malware loader  used by APT groups to deploy payloads like Cobalt Strike, Sliver, and  more. This analysis reveals how it avoids
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🔐 Major blow to international cybercrime 🚨 Europol, in coordination with 🇫🇷 France and 🇺🇦 Ukraine, has successfully apprehended the key administrator of XSS.is, one of the largest Russian-speaking cybercrime forums 🕵️‍♂️. 👤 The arrested individual: Acted as a

🔐 Major blow to international cybercrime 🚨

Europol, in coordination with 🇫🇷 France and 🇺🇦 Ukraine, has successfully apprehended the key administrator of XSS.is, one of the largest Russian-speaking cybercrime forums 🕵️‍♂️.

👤 The arrested individual:

Acted as a
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🦅 APT “NightEagle”: Precision Cyber-Espionage Targeting Semiconductors, AI & Defense Recent threat intelligence research has identified APT NightEagle (APT-Q-95), a highly sophisticated cyber-espionage operation. The group exploits Microsoft Exchange zero-day vulnerabilities

🦅 APT “NightEagle”: Precision Cyber-Espionage Targeting Semiconductors, AI & Defense

Recent  threat intelligence research has identified APT NightEagle (APT-Q-95), a  highly sophisticated cyber-espionage operation. The group exploits  Microsoft Exchange zero-day vulnerabilities
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🚨 Bug Bounty Market Insights 🚨 The image highlights how high the stakes are in today’s vulnerability market 💰. Some of the most valuable mobile exploits include: 📱 SMS/MMS exploits reaching up to $20M. 🍏 Apple iOS Zero-click full chains valued at $15M. 🤖 Android

🚨 Bug Bounty Market Insights 🚨

The image highlights how high the stakes are in today’s vulnerability market 💰. Some of the most valuable mobile exploits include:

📱 SMS/MMS exploits reaching up to $20M.
🍏 Apple iOS Zero-click full chains valued at $15M.
🤖 Android
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🔒 Sombras en la red: Anatomía de la ofensiva silenciosa de los APT Taiwaneses 🇹🇼 Taiwán despliega una ofensiva digital coordinada y precisa, muy lejos de ser ataques improvisados: APT-C-01 PoisonVine ⏳ Espionaje prolongado 🖥️ RAT en memoria (QuasarRAT, Sliver) 🎯 2022: salud

🔒 Sombras en la red: Anatomía de la ofensiva silenciosa de los APT Taiwaneses 🇹🇼

Taiwán despliega una ofensiva digital coordinada y precisa, muy lejos de ser ataques improvisados:

APT-C-01 PoisonVine

⏳ Espionaje prolongado
🖥️ RAT en memoria (QuasarRAT, Sliver)
🎯 2022: salud
CryptoInsane (@cryptoinsane) 's Twitter Profile Photo

🛰️ Cyberattack Attributed to the NSA Against China’s National Time Service Center (NTSC) 🇨🇳 China’s cybersecurity authorities released a detailed technical report accusing the U.S. National Security Agency (NSA) of conducting a long-term cyber-espionage campaign against the

🛰️ Cyberattack Attributed to the NSA Against China’s National Time Service Center (NTSC) 🇨🇳

China’s cybersecurity authorities released a detailed technical report accusing the U.S. National Security Agency (NSA) of conducting a long-term cyber-espionage campaign against the