602 (@602zz4ng) 's Twitter Profile
602

@602zz4ng

ID: 1795216416586784768

linkhttps://yks-study.tistory.com calendar_today27-05-2024 22:12:11

16 Tweet

5 Followers

111 Following

Germán Fernández (@1zrr4h) 's Twitter Profile Photo

Interesting sample targeting Spain 🇪🇸 Attackers use an #openredirect on a @Barracuda Networks server and then, the Twitter/X URL shortener t[.]co to redirect the victim to malware download 🚨 ▪ PDF Link:

Interesting sample targeting Spain 🇪🇸

Attackers use an #openredirect on a @Barracuda Networks server and then, the Twitter/<a href="/X/">X</a> URL shortener t[.]co to redirect the victim to malware download 🚨

▪ PDF Link:
JAMESWT (@jameswt_wt) 's Twitter Profile Photo

#asyncrat from #booking spam email Samples bazaar.abuse.ch/browse/tag/Fre… AnyRun app.any.run/tasks/0434cf44… app.any.run/tasks/1f006b3a… C2 enviasept.]duckdns.]org

#asyncrat from #booking spam email
Samples
bazaar.abuse.ch/browse/tag/Fre…
AnyRun
app.any.run/tasks/0434cf44…
app.any.run/tasks/1f006b3a…
C2
enviasept.]duckdns.]org
DaveTheResearcher (@davelikesmalwre) 's Twitter Profile Photo

Hi Steam why do you allow threat actors to utilise Steam account names to host C2 for their information stealers? Some of these are here a while. Also, the C2 gets changed out every so often for a new one. CC: MalwareHunterTeam

Hi <a href="/Steam/">Steam</a> why do you allow threat actors to utilise Steam account names to host C2 for their information stealers?

Some of these are here a while. Also, the C2 gets changed out every so often for a new one.

CC: <a href="/malwrhunterteam/">MalwareHunterTeam</a>
Karol Paciorek (@karol_paciorek) 's Twitter Profile Photo

🚨 Cybercriminals are sending fake Gift Cards to victims, where a .lnk file hides #xworm malware. This malware steals data from victims' devices and sends it via Telegram. ⚠️#opendir: 216.173.64[.63:4646 ⚠️#domain: remember-humidity-floppy-choosing.trycloudflare[.com

🚨 Cybercriminals are sending fake Gift Cards to victims, where a .lnk file hides #xworm malware. This malware steals data from victims' devices and sends it via Telegram.

⚠️#opendir: 216.173.64[.63:4646
⚠️#domain: remember-humidity-floppy-choosing.trycloudflare[.com
BingX (@bingxofficial) 's Twitter Profile Photo

🚨 Security Update 🚨 At 4 AM (SGT) on Sept 20, our team detected abnormal access to the BingX hot wallet, suspecting a hacker attack. We immediately initiated an emergency response, including asset transfers and pausing withdrawals. 🔒 Only minor losses so far, and we’ve got

Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

🎮 Roblox - Massive Database Leak Exposes User Data A major data breach has reportedly affected Roblox, one of the largest online gaming platforms worldwide. The leaked database, now circulating on dark web forums, contains sensitive information on millions of Roblox users. This

🎮 Roblox - Massive Database Leak Exposes User Data

A major data breach has reportedly affected Roblox, one of the largest online gaming platforms worldwide. The leaked database, now circulating on dark web forums, contains sensitive information on millions of Roblox users. This
LaurieWired (@lauriewired) 's Twitter Profile Photo

What operating system does your AirPods run? Sounds like a weird question. Until you realize you have the equivalent processing power of an iPhone 4 in *each* ear. Bluetooth audio SoCs are seldom talked about, but a fascinating field.

What operating system does your AirPods run?

Sounds like a weird question. 

Until you realize you have the equivalent processing power of an iPhone 4 in *each* ear.

Bluetooth audio SoCs are seldom talked about, but a fascinating field.
햄스터아저씨 (@hamstersyria) 's Twitter Profile Photo

도메인 사서 helloworld.txt 만 있는 폴더 연결만 했을 뿐인데 24시간 내 공격받은 로그 그 누구에게 단 한번도 공유한 적 없었지만 40번의 조회가 있었고, 그 중 반정도는 공격 뭘 타겟해서 공격했나 보자 - 라라벨, 워드프레스(버전별 admin 모두) - 냅다 POST - server.key - config.xml 계속

도메인 사서 helloworld.txt 만 있는 폴더 연결만 했을 뿐인데  24시간 내 공격받은 로그

그 누구에게 단 한번도 공유한 적 없었지만 40번의 조회가 있었고, 그 중 반정도는 공격

뭘 타겟해서 공격했나 보자
- 라라벨, 워드프레스(버전별 admin 모두)
- 냅다 POST
- server.key 
- config.xml
계속
Malcore (@malcoreio) 's Twitter Profile Photo

This function was found in the decompiled TikTok Android app in 2023 after they said "we don't collect location information" I literally found this on the flight to Australia.

This function was found in the decompiled TikTok Android app in 2023 after they said "we don't collect location information"

I literally found this on the flight to Australia.
vx-underground (@vxunderground) 's Twitter Profile Photo

Hi, We've archived the MITRE CVE database. The CVE DB is free and open source on GitHub. However, we're providing a backup location for the data. We doubt it'll magically disintegrate in ash, but if it does we have a copy. vx-underground.org/Archive/CVE

602 (@602zz4ng) 's Twitter Profile Photo

과제 하던 중에 win11 설치가 아아주 오래 걸려서 힘들어하고 있었는데, 동기가 vmx 파일을 줬다. 최고!!!🤩

과제 하던 중에 win11 설치가 아아주 오래 걸려서 힘들어하고 있었는데, 동기가 vmx 파일을 줬다. 최고!!!🤩
602 (@602zz4ng) 's Twitter Profile Photo

아.. 과제를 다시 읽어보니 “최초” 부팅 시 실행되는 프로세스를 조사해야 한다.. 다시 해야겠군 ㅋㅋㅋ 😂😭 그냥 설치 켜놓고 내일(몇 시간 뒤)에 와서 해야겠다… 난 할 수 있다……

602 (@602zz4ng) 's Twitter Profile Photo

며칠 전에 페이스북에서 이런 피싱 광고를 발견해서 흥미롭게 탐색했었는데 asec 블로그에 분석글이 올라왔다! 친절하게 악성토드를 설치하는 방법까지 알려주는 피싱 사이트… asec.ahnlab.com/ko/89347/

며칠 전에 페이스북에서 이런 피싱 광고를 발견해서 흥미롭게 탐색했었는데 asec 블로그에 분석글이 올라왔다!

친절하게 악성토드를 설치하는 방법까지 알려주는 피싱 사이트…

asec.ahnlab.com/ko/89347/
kiding 🧑‍💻 | Dongsung "Donny" Kim (@kid1ng) 's Twitter Profile Photo

"김수키" 멤버가 사용한 것으로 추정되는 VM 두개에서 추출된 파일 덤프를 DDoSecrets와 Phrack이 공개. 로그, 암호, 이력, 백도어, 툴, 페이로드 등이 포함됨. 리포트에 언급된 공격/피싱 대상: 방첩사, 외교부, 행안부, KT, 시큐어키, U+, 한겨레, 통일부, 네이버, 다음, 카카오, 개발원, 검찰청 등.

ESET Research (@esetresearch) 's Twitter Profile Photo

#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/6

#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/6