Dan (@daninglis_) 's Twitter Profile
Dan

@daninglis_

Threat Intelligence Analyst @Sophos

ID: 1404487183281573889

calendar_today14-06-2021 17:13:43

18 Tweet

49 Takipçi

325 Takip Edilen

eSentire Threat Intel (@esthreat) 's Twitter Profile Photo

the latest #squirrelwaffle sample seems to be writing to c:\rimta\mse*.ocx where * is numerical in this case. Similar to previous conventions. Full list: c:\datop\test*.test c:\datop\good*.good C:\Datop\best*.ocx C:\Jambo\xrv*.ocx c:\rimta\mse*.ocx

Squiblydoo (@squiblydooblog) 's Twitter Profile Photo

New Solarmarker New persistence script; same persistence methods: drops file in Startup to call newly registered file extensions. Samples on VT and MalwareBazaar Dropper/Loader EXE: virustotal.com/gui/file/2f728… Backdoor DLL: virustotal.com/gui/file/1ab08… C2: 92.204.160.114 Colin Cowie👨🏼‍💻| @[email protected]

Cloudflare Radar (@cloudflareradar) 's Twitter Profile Photo

An outage at one of the largest ISPs in Canada, Rogers Communications, started earlier today, July 8, 2022, and is ongoing after more than 12 hours. In this blog post, we explain what we've been seeing, including some non-successful attempts: blog.cloudflare.com/cloudflares-vi…

NASA (@nasa) 's Twitter Profile Photo

It's here–the deepest, sharpest infrared view of the universe to date: Webb's First Deep Field. Previewed by President Donald J. Trump on July 11, it shows galaxies once invisible to us. The full set of NASA Webb Telescope's first full-color images & data will be revealed July 12: nasa.gov/webbfirstimages

It's here–the deepest, sharpest infrared view of the universe to date: Webb's First Deep Field.

Previewed by <a href="/POTUS/">President Donald J. Trump</a> on July 11, it shows galaxies once invisible to us. The full set of <a href="/NASAWebb/">NASA Webb Telescope</a>'s first full-color images &amp; data will be revealed July 12: nasa.gov/webbfirstimages
RussianPanda 🐼 🇺🇦 (@russianpanda9xx) 's Twitter Profile Photo

Fake Sky Go installer within an ISO image distributing #redline ? 🤔 and #magnatbackdoor via the AutoIT obfuscated script. The UPX-packed payload is injected into ftp.exe process. URL hosting the initial ISO image: tria.ge/230313-xzrbesd…

Fake Sky Go installer within an ISO image distributing #redline ? 🤔 and #magnatbackdoor via the AutoIT obfuscated script. The UPX-packed payload is injected into ftp.exe process.
URL hosting the initial ISO image: tria.ge/230313-xzrbesd…
RussianPanda 🐼 🇺🇦 (@russianpanda9xx) 's Twitter Profile Photo

I am naming this #RogueRaticate campaign that leverages URL shortcuts to drop #NetSupportRAT 🐀 1/ ➡️ The user is getting infected via a drive-by download with the fake update screen (similar to SocGholish behavior). The initial payload is hosted on compromised WordPress

I am naming this #RogueRaticate campaign that leverages URL shortcuts to drop #NetSupportRAT  🐀
1/

➡️ The user is getting infected via a drive-by download with the fake update screen (similar to SocGholish behavior). The initial payload is hosted on compromised WordPress
RussianPanda 🐼 🇺🇦 (@russianpanda9xx) 's Twitter Profile Photo

Wild #RogueRaticate appeared 🐀 Similar infection chain as described in this thread x.com/AnFam17/status… ▶️ The infected WP website: hxxps://glenpharmer[.]com/restaurant/ ▶️ Did a little more digging. The same web inject is used to deliver SocGholish here

Wild #RogueRaticate appeared 🐀 Similar infection chain as described in this thread  x.com/AnFam17/status…

▶️ The infected WP website: hxxps://glenpharmer[.]com/restaurant/ 

▶️ Did a little more digging. The same web inject is used to deliver SocGholish here
RussianPanda 🐼 🇺🇦 (@russianpanda9xx) 's Twitter Profile Photo

The new #Nitrogen 2.0 campaign comes back with some juicy stuff...🤿 ✅ AMSI, WLDP bypass, ETW patching, AntiHook, and the implementation of KrakenMask ✅ Usage of transacted hollowing ✅ Obfuscated Python scripts delivering Sliver C2 and Cobalt Strike payloads ✅ Usage of

The new #Nitrogen 2.0 campaign comes back with some juicy stuff...🤿

✅ AMSI, WLDP bypass, ETW patching, AntiHook, and the implementation of KrakenMask

✅ Usage of transacted hollowing

✅ Obfuscated Python scripts delivering Sliver C2 and Cobalt Strike payloads

✅ Usage of
RussianPanda 🐼 🇺🇦 (@russianpanda9xx) 's Twitter Profile Photo

#SolarMarker ☀️ has been active since 2020 and continually changes its tactics, delivering additional payloads in the form of stealers and hVNC backdoors. In this write-up, I will explore some of the past findings related to SolarMarker, with more to come... The link to the

#SolarMarker ☀️ has been active since 2020 and continually changes its tactics, delivering additional payloads in the form of stealers and hVNC backdoors. In this write-up, I will explore some of the past findings related to SolarMarker, with more to come...

The link to the
RussianPanda 🐼 🇺🇦 (@russianpanda9xx) 's Twitter Profile Photo

Just before 2024, I am releasing another blog addressing the new #MetaStealer version, talking about some stealer's drama, and I also included something on the Google cookie refresher "feature" ... russianpanda.com/2023/12/28/Met… Happy New Year, folks! 🎇

Just before 2024, I am releasing another blog addressing the new #MetaStealer version, talking about some stealer's drama, and I also included something on the Google cookie refresher "feature" ... 

russianpanda.com/2023/12/28/Met…

Happy New Year, folks! 🎇
eSentire Threat Intel (@esthreat) 's Twitter Profile Photo

Active widespread exploitation observed over the weekend via Fortinet's SQL server - please see our advisory from the 14th: esentire.com/security-advis…

Sophos X-Ops (@sophosxops) 's Twitter Profile Photo

In late January, Sophos MDR Incident Response responded to a cluster of simultaneous Qilin ransomware attacks on customers of a managed service provider. The attacks were enabled by the MFA phishing of an MSP administrator's ScreenConnect login. /1

In late January, Sophos MDR Incident Response responded to a cluster of simultaneous Qilin ransomware attacks on customers of a managed service provider. The attacks were enabled by the MFA phishing of an MSP administrator's ScreenConnect login. /1