MalasadaTech (@malasadatech808) 's Twitter Profile
MalasadaTech

@malasadatech808

ALOJAHZ WORLD! HOBBYIST THRUNTELLISEARCHER. VIEWS ARE MY OWN! 808 MALASADA.TECH

ID: 1956187113256607744

calendar_today15-08-2025 02:53:02

21 Tweet

1 Followers

76 Following

Unit 42 (@unit42_intel) 's Twitter Profile Photo

Belarus-based #APT #WhiteLynx is using a #CAPTCHAmacro technique, enticing users to enable macros on Office docs, generating a CAPTCHA verification window to proceed. We found follow-up malware that communicates with agelessinvesting[.]xyz. Details at bit.ly/4rRgFa9

Belarus-based #APT #WhiteLynx is using a #CAPTCHAmacro technique, enticing users to enable macros on Office docs, generating a CAPTCHA verification window to proceed. We found follow-up malware that communicates with agelessinvesting[.]xyz. Details at bit.ly/4rRgFa9
Squiblydoo (@squiblydooblog) 's Twitter Profile Photo

CertCentral is now TheCertGraveyard[.]org & CertGraveyard[.]org. The CertCentral API returns an error directing to use the new domains. Please give me a like or a share to get the word out. Also use the site to report and investigate certificates used to sign malware. :)

Squiblydoo (@squiblydooblog) 's Twitter Profile Photo

From 2020-2024, I tracked the SolarMarker malware, and in 2024, monitored a self-infection for months to learn their actions-on-objectives: on-device fraud. I didn't publish the details of my months long investigation until now. Check the link the the attached comment.

From 2020-2024, I tracked the SolarMarker malware, and in 2024, monitored a self-infection for months to learn their actions-on-objectives: on-device fraud.

I didn't publish the details of my months long investigation until now. Check the link the the attached comment.
Szabolcs Schmidt (@smica83) 's Twitter Profile Photo

'SSA_Yearly_Templater.msi' seen from Australia abuse.ch bazaar.abuse.ch/sample/5bef26a… hxxps://sas-portal(.)com/check/SSA_Yearly_Commander.msi

'SSA_Yearly_Templater.msi' seen from Australia <a href="/abuse_ch/">abuse.ch</a>
bazaar.abuse.ch/sample/5bef26a… 
hxxps://sas-portal(.)com/check/SSA_Yearly_Commander.msi
Squiblydoo (@squiblydooblog) 's Twitter Profile Photo

#100DaysofYARA - Day 2 YARA rule to detect the default Delphi darkmode dib icon. I've seen this icon excessively over the years. Using UNPACME 's YARA hunting tools, I saw 0 known goodware and 800 packed junk. Rule at end 1/4

#100DaysofYARA - Day 2
YARA rule to detect the default Delphi darkmode dib icon.
I've seen this icon excessively over the years. Using <a href="/unpacme/">UNPACME</a> 's YARA hunting tools, I saw 0 known goodware and 800 packed junk.

Rule at end
1/4
KB4ThreatLabs (@kb4threatlabs) 's Twitter Profile Photo

🚨 PHISH ALERT: When Legitimate Software Becomes First-Stage Payload: The RMM Problem" KnowBe4 ThreatLabs tracking sophisticated campaign weaponizing Social Security notifications to deploy RMM tools (SimpleHelp Remote Access Client) as persistent backdoors. No traditional

🚨 PHISH ALERT:  When Legitimate Software Becomes First-Stage Payload: The RMM Problem"

KnowBe4 ThreatLabs tracking sophisticated campaign weaponizing Social Security notifications to deploy RMM tools (SimpleHelp Remote Access Client) as persistent backdoors.

No traditional
Squiblydoo (@squiblydooblog) 's Twitter Profile Photo

Thorough analysis of AnyPDF malware by rifteyy The code-signing certificate has been reported for revocation; was signed by "Lupus Tech Limited" and added to TheCertGraveyard.

Thorough analysis of AnyPDF malware by <a href="/rifteyy/">rifteyy</a> 

The code-signing certificate has been reported for revocation; was signed by "Lupus Tech Limited" and added to TheCertGraveyard.
Gi7w0rm (@gi7w0rm) 's Twitter Profile Photo

Popular Text Editor Notepad++ was compromised by a nation state attacker presumably from June through December 2, 2025. The state actor used the access to reroute software update traffic to attacker controlled servers making this a supply chain attack. notepad-plus-plus.org/news/hijacked-…

Luke Acha (@luke92881) 's Twitter Profile Photo

MalasadaTech Rust based, the embedded PE file is pdfium.dll. app.any.run/tasks/b71ca08e… HTTP comms to hopinpoint[.]com. Some custom encoded traffic here that I have not played with yet.

<a href="/MalasadaTech/">MalasadaTech</a> Rust based, the embedded PE file is pdfium.dll. app.any.run/tasks/b71ca08e…

HTTP comms to hopinpoint[.]com. Some custom encoded traffic here that I have not played with yet.
Squiblydoo (@squiblydooblog) 's Twitter Profile Photo

rifteyy ܛܔܔܔܛܔܛܔܛ Thanks! Certificate has been reported. In regards to funny certificates, my favorite signer has been "Just Add Water Italian Pizza Bread Pasta Mix Ltd." ea18b965ab43d927a1d690f395f4e2b55a15db9744f68454a86b5508b302c404 The payload was a fake Adobe installer.

KB4ThreatLabs (@kb4threatlabs) 's Twitter Profile Photo

🚨Tax Season is Phishing Season: How IRS Lures are Dropping RMM Backdoors In our last report blog.knowbe4.com/the-skeleton-k… we highlighted how threat actors weaponized Social Security notifications to deploy RMM tools. Now, they’ve pivoted to the next seasonal hook: IRS and Tax

🚨Tax Season is Phishing Season: How IRS Lures are Dropping RMM Backdoors

In our last report blog.knowbe4.com/the-skeleton-k… we highlighted how threat actors weaponized Social Security notifications to deploy RMM tools. Now, they’ve pivoted to the next seasonal hook: IRS and Tax