LoaderInsightAgency
@lia_intel
Tracking malware loader botnets for fun
ID: 1802744468866502656
https://loaderinsight.agency 17-06-2024 16:47:11
37 Tweet
323 Takipรงi
1 Takip Edilen
Using collected intelligence, we correlated Vidar build IDs with loader task data and linked the threat actor to a Lumma Stealer campaign. Botnet identifiers are searchable in LIA and are crucial to creating a big-picture analysis. insights.loaderinsight.agency/posts/vidar-buโฆ #Vidar #Lumma #Stealer
New intel cable posted! ๐ต๏ธโโ๏ธ (Login required) Read how a (suspected) BP hoster outage made a threat actor change hosting provider. LIA telemetry shows clear overlaps and enables continuous tracking. And also; dashboards have been updated showing data for 7, 14 and 30 days ๐