James (@james_inthe_box) 's Twitter Profile
James

@james_inthe_box

ID: 703614655

calendar_today18-07-2012 19:06:32

26,26K Tweet

21,21K Takipçi

458 Takip Edilen

James (@james_inthe_box) 's Twitter Profile Photo

Another #malicious #gotoresolve / #logmeinrescue at: https://fbsi\ .org/Receipt_Copy.msi Company ID: 9119452146254695709 app.any.run/tasks/2b763be2…

RussianPanda 🐼 🇺🇦 (@russianpanda9xx) 's Twitter Profile Photo

Good morning! ☀️ #GootLoader woke up and chose violence (again) Grab your coffee, this one's JUICY 💣 huntress.com/blog/gootloade…

James (@james_inthe_box) 's Twitter Profile Photo

#malware #opendir #xloader (small one works, big one not so much) at: https://royfils\.com/encrypt/ 2cd9b8fb88e7cbbc5c049441fb61e0aea7be23dc7aa2c109c13abefe7a2ac943 4733feaca04e871d4e0bb052f2437a2f46f10852602ea4f8b2f0170f4838dd87

#malware #opendir #xloader (small one works, big one not so much) at:

https://royfils\.com/encrypt/

2cd9b8fb88e7cbbc5c049441fb61e0aea7be23dc7aa2c109c13abefe7a2ac943

4733feaca04e871d4e0bb052f2437a2f46f10852602ea4f8b2f0170f4838dd87
Br3akp0int (@tccontre18) 's Twitter Profile Photo

Happy to share the latest #STRT blog covering the updated version of the .NET Steganography Loader being used by several RATs and Trojan stealers, including #Lokibot. The blog includes the analysis, simple tooling, TTPs, and Splunk detections. 🙂 splunk.com/en_us/blog/sec…

Happy to share the latest #STRT blog covering the updated version of the .NET Steganography Loader being used by several RATs and Trojan stealers, including #Lokibot. The blog includes the analysis, simple tooling, TTPs, and Splunk detections. 🙂

splunk.com/en_us/blog/sec…
The DFIR Report (@thedfirreport) 's Twitter Profile Photo

🐈 Cat’s Got Your Files: Lynx Ransomware 🎉New report out by Friff, Daniel Casenove & Mattie Schuch!🎉 Attackers used stolen creds to access RDP, quickly pivoted to a DC with a second compromised admin, created impersonation accounts, mapped the environment, and more.

🐈 Cat’s Got Your Files: Lynx Ransomware

🎉New report out by <a href="/Friffnz/">Friff</a>, Daniel Casenove &amp; <a href="/MittenSec/">Mattie Schuch</a>!🎉

Attackers used stolen creds to access RDP, quickly pivoted to a DC with a second compromised admin, created impersonation accounts, mapped the environment, and more.
James (@james_inthe_box) 's Twitter Profile Photo

Evil #logmeinrescue at: https:// connectme-1ke.pages. dev/LogMeInResolve_Unattended.msi e56e5f1f37b6c2ae9f4f1b2e7ab2f7aee9ca91c4c84334dd5bb49675de619736 Company ID: 8400521075231559185

James (@james_inthe_box) 's Twitter Profile Photo

An unusually large, moments ago #botnet scan all from source port 19000 (not the "usual" Amazon sourced scans that I see every morning like clockwork at 06:45). Raw logs and source IP's: gist.github.com/silence-is-bes…

An unusually large, moments ago #botnet scan all from source port 19000 (not the "usual" Amazon sourced scans that I see every morning like clockwork at 06:45).  Raw logs and source IP's:

gist.github.com/silence-is-bes…
James (@james_inthe_box) 's Twitter Profile Photo

A csv formatted list of #malspam campaigns that crossed my path in November to include #malware type, c2, hash, subject, and some email exfil addresses: gist.github.com/silence-is-bes… #retrohunt

A csv formatted list of #malspam campaigns that crossed my path in November to include #malware type, c2, hash, subject, and some email exfil addresses:

gist.github.com/silence-is-bes…

#retrohunt