Aidan H (@thehappydinoa) 's Twitter Profile
Aidan H

@thehappydinoa

Security Researcher, Developer, and Collaborator at @censysio

ID: 781161167678996481

linkhttps://aidan.davisholland.com calendar_today28-09-2016 15:58:30

741 Tweet

1,1K Followers

873 Following

Censys (@censysio) 's Twitter Profile Photo

๐Ÿšจ An unpatched zero-day vulnerability in AsyncOS, the operating system used by Cisco Secure Email Gateway (ESA), allows unauthenticated remote compromise. ๐Ÿ”ด CVSS 10 ๐Ÿ”ด Actively exploited in the wild ๐Ÿ”ด No patch available at time of posting โ€” Cisco recommends applying

๐Ÿšจ An unpatched zero-day vulnerability in AsyncOS, the operating system used by Cisco Secure Email Gateway (ESA), allows unauthenticated remote compromise. 

๐Ÿ”ด CVSS 10
๐Ÿ”ด Actively exploited in the wild
๐Ÿ”ด No patch available at time of posting โ€” Cisco recommends applying
Silas Cutler // p1nk (@silascutler) 's Twitter Profile Photo

Some unusual #CobaltStrike activity we observed at Censys before the holiday. At the start of December, we saw a spike in CobaltStrike in AS138415 followed by a matching spike two days after on AS133199. Report: censys.com/blog/recap-of-โ€ฆ

Some unusual #CobaltStrike activity we observed at Censys before the holiday. At the start of December, we saw a spike in CobaltStrike in AS138415 followed by a matching spike two days after on AS133199.

Report: censys.com/blog/recap-of-โ€ฆ
Censys (@censysio) 's Twitter Profile Photo

๐Ÿšจ MongoBleed (CVE-2025-14847) MongoDB w/ zlib enabled (default) may leak uninitialized heap memory to unauthenticated attackers, risking credentials & tokens. ๐Ÿ“Œ Censys sees 87K+ potentially vulnerable instances. โœ… Patch: 8.2.3+, 8.0.17+, 7.0.28+, 6.0.27+, 5.0.32+, 4.4.30+ ๐Ÿ”—

๐Ÿšจ MongoBleed (CVE-2025-14847)

MongoDB w/ zlib enabled (default) may leak uninitialized heap memory to unauthenticated attackers, risking credentials & tokens.

๐Ÿ“Œ Censys sees 87K+ potentially vulnerable instances.
โœ… Patch: 8.2.3+, 8.0.17+, 7.0.28+, 6.0.27+, 5.0.32+, 4.4.30+
๐Ÿ”—
Censys (@censysio) 's Twitter Profile Photo

Censys is observing a notable drop in responsiveness from previously reachable hosts in Iran, consistent with reports of an infrastructure-level outage. Weโ€™re seeing this across both IPv4 and IPv6. ๐Ÿ“Œ For background on what weโ€™ve observed in previous Iran outages:

Censys is observing a notable drop in responsiveness from previously reachable hosts in Iran, consistent with reports of an infrastructure-level outage. Weโ€™re seeing this across both IPv4 and IPv6.

๐Ÿ“Œ For background on what weโ€™ve observed in previous Iran outages:
Aidan H (@thehappydinoa) 's Twitter Profile Photo

Wrote up ErrTraffic, a ClickFix panel that corrupts your screen with garbage characters so you believe something's broken. Honestly, the visual chaos stuff is clever. The rest is standard: token downloads, bot detection, CIS blocklist. censys.com/blog/errtraffiโ€ฆ

Censys (@censysio) 's Twitter Profile Photo

๐Ÿ”Ž NEW CENSYS RESEARCH: The SOCKS protocol is the 15th most observed protocol on the Internet. Itโ€™s notorious for its ability to mask the true origin of a connection by proxying client traffic to arbitrary servers. Our research team took a closer look at the scan data to

๐Ÿ”Ž NEW CENSYS RESEARCH: The SOCKS protocol is the 15th most observed protocol on the Internet. Itโ€™s notorious for its ability to mask the true origin of a connection by proxying client traffic to arbitrary servers. Our research team took a closer look at the scan data to
Censys (@censysio) 's Twitter Profile Photo

๐Ÿ€ AsyncRAT is an open-source .NET remote access trojan (RAT) with extensive credential theft capabilities and persistent access mechanisms. Our latest research uncovers methods for detecting AsyncRAT threats and analyzes what these indicators tell us about how theyโ€™re configured

๐Ÿ€ AsyncRAT is an open-source .NET remote access trojan (RAT) with extensive credential theft capabilities and persistent access mechanisms. Our latest research uncovers methods for detecting AsyncRAT threats and analyzes what these indicators tell us about how theyโ€™re configured
Andrew Northern ๐“…“ (@ex_raritas) 's Twitter Profile Photo

New research dropped today showing how prolific AsyncRAT is, how to hunt for it in Censys, and how to extract the config and validate that itโ€™s actually AsyncRAT. ๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡

New research dropped today showing how prolific AsyncRAT is, how to hunt for it in Censys, and how to extract the config and validate that itโ€™s actually AsyncRAT. 

๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡
Censys (@censysio) 's Twitter Profile Photo

๐Ÿ’ฌ New Censys research analyzes an emerging threat that uses fake (but convincing) German-language voicemail messages to convince victims to unknowingly enroll their device into an attacker-controlled environment. ๐Ÿค Attacks like these highlight the effectiveness of a

๐Ÿ’ฌ New Censys research analyzes an emerging threat that uses fake (but convincing) German-language voicemail messages to convince victims to unknowingly enroll their device into an attacker-controlled environment. 

๐Ÿค  Attacks like these highlight the effectiveness of a
Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

Motivated by Moonlock Labโ€™s recent findings on ClickFix attacks surfacing via Google Search results and even LLMs ๐Ÿคฏ, Iโ€™ve added basic protection against most of these attacks to BlockBlock ๐ŸŽ๐Ÿ›ก๏ธ Read: โ€œClickFix: Stopped at โŒ˜+Vโ€ objective-see.org/blog/blog_0x85โ€ฆ

Censys (@censysio) 's Twitter Profile Photo

๐ŸŒ Vshell is a mature post exploitation tool that follows the same logical structure as Cobalt Strike. However, its use of Mandarin Chinese makes it a popular alternative for native speaking adversaries. Learn how it works and what defenders need to know to protect themselves in

๐ŸŒ Vshell is a mature post exploitation tool that follows the same logical structure as Cobalt Strike. However, its use of Mandarin Chinese makes it a popular alternative for native speaking adversaries. Learn how it works and what defenders need to know to protect themselves in
Censys (@censysio) 's Twitter Profile Photo

๐Ÿ”Ž ResidentBat is Belarus KGB Android spyware (RSF Dec 2025) targeting journalists and civil society. The Censys Threat Module surfaces ResidentBat C2 by self-signed CN=server + banner hash. Install requires physical access + ADB. Defenders: use the Platform to hunt and block

๐Ÿ”Ž ResidentBat is Belarus KGB Android spyware (RSF Dec 2025) targeting journalists and civil society. The Censys Threat Module surfaces ResidentBat C2 by self-signed CN=server + banner hash. Install requires physical access + ADB. Defenders: use the Platform to hunt and block
Censys (@censysio) 's Twitter Profile Photo

๐ŸชถCensys ARC has identified a new threat campaign: BrewJack Key findings: โ€ข Non-traditional network transport โ€ข C2 over IPoAC (RFC 2549) Full advisory: hubs.ly/Q049fHXY0 #CensysARC #BrewJack

๐ŸชถCensys ARC has identified a new threat campaign: BrewJack

Key findings:
โ€ข Non-traditional network transport 
โ€ข C2 over IPoAC (RFC 2549)

Full advisory: hubs.ly/Q049fHXY0 

#CensysARC #BrewJack