basy (@basywho) 's Twitter Profile
basy

@basywho

Computer Aristocrat. Malware Analysis | Threat Intelligence

ID: 1073611757975941121

calendar_today14-12-2018 16:12:44

56 Tweet

16 Takipçi

489 Takip Edilen

Andy Greenberg (@agreenberg at the other places) (@a_greenberg) 's Twitter Profile Photo

As an IRS agent, Tigran Gambaryan was perhaps the most effective crypto investigator ever. Then last year he was charged in Nigeria with money laundering and thrown in prison. Throughout, he was texting me from a secret phone. This is his full story. wired.com/story/untold-s…

Pix🔎 (@pixonchain) 's Twitter Profile Photo

This is Lazarus They just stole $1.46 billion from Bybit And they didn’t break the code — they broke the people Here’s untold story of how they did it (and why no one is truly safe) 👇

This is Lazarus

They just stole $1.46 billion from Bybit

And they didn’t break the code — they broke the people

Here’s untold story of how they did it (and why no one is truly safe) 👇
CZ 🔶 BNB (@cz_binance) 's Twitter Profile Photo

Some thoughts on the recent hack(s). There is a pattern where hackers were able to steal large amounts of crypto from multi-sig “cold storage” solutions, as with ByBit, Phemex, WazirX and potentially others. In the most recent ByBit case, the hackers were able to make the

Ven0m (@v3n0mstrike) 's Twitter Profile Photo

🚨 ALERTA: Campaña Activa de Grandoreiro en 🇨🇱 Se detecta una nueva campaña del troyano bancario Grandoreiro, propagada vía correos #phishing de notificación judicial y demandas . Los atacantes usan VPS en OVH para distribuir los correos y Contabo para distribuir el loader,

🚨 ALERTA: Campaña Activa de Grandoreiro en 🇨🇱

Se detecta una nueva campaña del troyano bancario Grandoreiro, propagada vía correos #phishing de notificación judicial y demandas . Los atacantes usan VPS en OVH para distribuir los correos y Contabo para distribuir el loader,
Andy Greenberg (@agreenberg at the other places) (@a_greenberg) 's Twitter Profile Photo

Garantex, a major Russian cashout point for dirty cryptocurrency of all kinds in recent years, is currently down with a law enforcement seizure notice.

Garantex, a major Russian cashout point for dirty cryptocurrency of all kinds in recent years, is currently down with a law enforcement seizure notice.
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Since late February 2025, Microsoft has observed Moonstone Sleet, a North Korean state actor, deploying Qilin ransomware at a limited number of orgs. Qilin is a ransomware as a service (RaaS) payload used by multiple threat actors, both state-sponsored and cybercriminal groups.

JAMESWT (@jameswt_wt) 's Twitter Profile Photo

#booking #clickfix #fakecaptcha 👇 ⛔️boxiesreservguste].com/ 👇 ⛔️alt-check-v3.]com/j8oGN6XCdTtHqFVq.html 👇 ⛔️92.255.85.]2/ b.mp4 (ps1) a.mp4 (ps1) cmd.bat pq.exe ✅Samples bazaar.abuse.ch/browse/tag/92-… ✅AnyRun app.any.run/tasks/8d844358…

#booking #clickfix #fakecaptcha 
👇
⛔️boxiesreservguste].com/
👇
⛔️alt-check-v3.]com/j8oGN6XCdTtHqFVq.html
👇
⛔️92.255.85.]2/
b.mp4 (ps1)
a.mp4 (ps1)
cmd.bat 
pq.exe
✅Samples
bazaar.abuse.ch/browse/tag/92-…
✅AnyRun
app.any.run/tasks/8d844358…
Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

Fake GitHub repositories deploying SmartLoader and Lumma Stealer are exploiting trusted platforms with AI-generated content. Discover how to spot these threats and defend your network. Read our article for actionable information: ⬇️ research.trendmicro.com/41Xk9ge

Who said what? (@g0njxa) 's Twitter Profile Photo

Fresh #Clickfix design campaign spreading #Lumma stealer on X ads impersonating AI sites /newflave.rf.gd /gltgirl.rf.gd Payload: /kutt.it/ReStarT >> /snippet.host/migppg Build hosted on Azure DevOps repo Detonation: app.any.run/tasks/617fda4e…

Fresh #Clickfix design campaign spreading #Lumma stealer on X ads impersonating AI sites

/newflave.rf.gd
/gltgirl.rf.gd

Payload: /kutt.it/ReStarT >> /snippet.host/migppg

Build hosted on Azure DevOps repo

Detonation: app.any.run/tasks/617fda4e…
vx-underground (@vxunderground) 's Twitter Profile Photo

Guy posts on social media that he is amazed by technology as he's begun to learn basic programming skills. He's developed a new perspective on technology. Dorks come to the comment section to share negativity. If you learned to code because of money you won't go very far.

Guy posts on social media that he is amazed by technology as he's begun to learn basic programming skills. He's developed a new perspective on technology.

Dorks come to the comment section to share negativity.

If you learned to code because of money you won't go very far.
The Haag™ (@m_haggis) 's Twitter Profile Photo

Top things I learned while analyzing fake CAPTCHA sites 🧩🔍 1️⃣ You can build a page in under 100 lines of HTML/JS that quietly drops commands into the clipboard 🖱️📋 2️⃣ Most security layers focus on network traffic 🌐 …but these tricks live in the presentation layer 🎭 3️⃣

Top things I learned while analyzing fake CAPTCHA sites 🧩🔍

1️⃣ You can build a page in under 100 lines of HTML/JS that quietly drops commands into the clipboard 🖱️📋
2️⃣ Most security layers focus on network traffic 🌐 …but these tricks live in the presentation layer 🎭
3️⃣
Marius Benthin (@marius_benthin) 's Twitter Profile Photo

Recently published VSIX extensions on #OpenVSX related to #GlassWorm Dart-vsc/code-dart Vsceue/volar-vscode clangdcode/clangd-vscode SolBlanco/svelte-vscode Nextron Research ⚡️ Eclipse Foundation

ANY.RUN (@anyrun_app) 's Twitter Profile Photo

🚨 A new PhaaS “chimera” is making phishing attribution harder. #Salty2FA and #Tycoon2FA, once separate phishing kits, now appear inside the same campaigns and even the same payloads. 👾 See analysis of a hybrid payload: app.any.run/tasks/ccf7d689… ➡️ Read the full breakdown of

🚨 A new PhaaS “chimera” is making phishing attribution harder. #Salty2FA and #Tycoon2FA, once separate phishing kits, now appear inside the same campaigns and even the same payloads.

👾 See analysis of a hybrid payload: app.any.run/tasks/ccf7d689…

➡️ Read the full breakdown of
GuidedHacking (@guidedhacking) 's Twitter Profile Photo

Everyone I meet is obsessed with two fantasies: 1. Get Rich Quick. 2. Become YouTube Famous. If they don't get rich and famous within 1 week of doing something, they give up on life. I've learned to ditch anyone with this mentality instantly as they just aren't genuine people.

ZachXBT (@zachxbt) 's Twitter Profile Photo

John Daghita (Lick) was arrested in the Caribbean yesterday as a direct result of my investigation. In late January 2026, I exposed how John stole $ 46M+ in seized crypto assets from the US government by abusing access at CMDSS, his father's company, which held a USMS contract.

John Daghita (Lick) was arrested in the Caribbean yesterday as a direct result of my investigation.

In late January 2026, I exposed how John stole $ 46M+ in seized crypto assets from the US government by abusing access at CMDSS, his father's company, which held a USMS contract.
Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

New blog post: Building a Pipeline for Agentic Malware Analysis Agentic RE + malware analysis with custom skills, MCP tooling, and persistent case state to automate intial triage Link: synthesis.to/2026/03/18/age… Github: github.com/mrphrazer/agen…

New blog post: Building a Pipeline for Agentic Malware Analysis

Agentic RE + malware analysis with custom skills, MCP tooling, and persistent case state to automate intial triage

Link: synthesis.to/2026/03/18/age…

Github: github.com/mrphrazer/agen…