Maldatabase (@maldatabase) 's Twitter Profile
Maldatabase

@maldatabase

Malware analysis. Threat intelligence. Data science.
Contact: [email protected]

ID: 947114278657712128

linkhttps://maldatabase.com calendar_today30-12-2017 14:36:55

2,2K Tweet

1,1K Takipçi

795 Takip Edilen

Leonid Bezvershenko (@bzvr_) 's Twitter Profile Photo

Magic is here! We have discovered a previously unknown #APT that has been attacking organizations in the area affected by the conflict between Russia and Ukraine. Observed victims were compromised with previously unknown implants that we dubbed #PowerMagic and #CommonMagic. [1/4]

Magic is here! We have discovered a previously unknown #APT that has been attacking organizations in the area affected by the conflict between Russia and Ukraine. Observed victims were compromised with previously unknown implants that we dubbed #PowerMagic and #CommonMagic. [1/4]
Zscaler ThreatLabz (@threatlabz) 's Twitter Profile Photo

ThreatLabz has discovered a #GitHub repository owned by a member of the #APT37 threat group. Due to an #opsec failure, the group leaked a wealth of information about malicious activities dating as far back as October 2020. More details here: zscaler.com/blogs/security…

ThreatLabz has discovered a #GitHub repository owned by a member of the #APT37 threat group. Due to an #opsec failure, the group leaked a wealth of information about malicious activities dating as far back as October 2020. More details here: zscaler.com/blogs/security…
Unit 42 (@unit42_intel) 's Twitter Profile Photo

2023-04-03 (Monday) - IoC update: A consistently reliable indicator of #Qakbot (#Qbot) over the past few years has been C2 traffic using TCP port 65400. Since 2021-09-20, this has occurred on 23.111.114[.]52. However, today Qakbot TCP port 65400 traffic switched to 172.107.98[.]3

2023-04-03 (Monday) - IoC update: A consistently reliable indicator of #Qakbot (#Qbot) over the past few years has been C2 traffic using TCP port 65400. Since 2021-09-20, this has occurred on 23.111.114[.]52. However, today Qakbot TCP port 65400 traffic switched to 172.107.98[.]3
The DFIR Report (@thedfirreport) 's Twitter Profile Photo

IcedID Macro Ends in Nokoyawa Ransomware ➡️Initial Access: IcedID XLS Macro ➡️Credentials: LSASS, Creds in Files ➡️Persistence: Scheduled Task ➡️Lateral: RDP, SMB, WMI, WinRM, Psexec ➡️C2: IcedID, Cobalt Strike, VNC ➡️Impact: Nokoyawa Ransomware thedfirreport.com/2023/05/22/ice… 1/X

blackorbird (@blackorbird) 's Twitter Profile Photo

#Kimsuky Group’s Phishing Attacks Targetting North Korea-Related Personnel asec.ahnlab.com/en/52970/ Kimsuky Group Using Meterpreter to Attack Web Servers asec.ahnlab.com/en/53046/

#Kimsuky Group’s Phishing Attacks Targetting North Korea-Related Personnel
asec.ahnlab.com/en/52970/
Kimsuky Group Using Meterpreter to Attack Web Servers
asec.ahnlab.com/en/53046/
Lokesh (@loki_re_artist) 's Twitter Profile Photo

#Pikabot ddef0c551d3e5c1ec331bc4239db316a-Loader 56f1a42100754f98594ad8a282e8b648-injector #antidebug & geography region check etc. #malware #reversing #Cybersecurity #MaaS #ThreatIntelligence MalwareHunterTeam JAMESWT_MHT James Florian Roth ⚡️ bohops Michael Gillespie

#Pikabot
ddef0c551d3e5c1ec331bc4239db316a-Loader
56f1a42100754f98594ad8a282e8b648-injector
#antidebug & geography region check etc.

#malware #reversing #Cybersecurity #MaaS #ThreatIntelligence 

<a href="/malwrhunterteam/">MalwareHunterTeam</a> <a href="/JAMESWT_MHT/">JAMESWT_MHT</a> <a href="/James_inthe_box/">James</a> <a href="/cyb3rops/">Florian Roth ⚡️</a> <a href="/bohops/">bohops</a> <a href="/demonslay335/">Michael Gillespie</a>
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft has detected increased credential attack activity by the threat actor Midnight Blizzard using residential proxy services to obfuscate the source of their attacks. These attacks target governments, IT service providers, NGOs, defense industry, and critical manufacturing.

Unit 42 (@unit42_intel) 's Twitter Profile Photo

The Unit 42 Managed Threat Hunting team observed #Mythic being delivered by #Blister and #Socgholish (Socgholish → Blister → Mythic). Mythic using makethumbmoney[.]com on 104.243.33[.]129:443 for its C2 traffic.

The Unit 42 Managed Threat Hunting team observed #Mythic being delivered by #Blister and #Socgholish (Socgholish → Blister → Mythic). Mythic using makethumbmoney[.]com on 104.243.33[.]129:443 for its C2 traffic.
vx-underground (@vxunderground) 's Twitter Profile Photo

Lockbit ransomware group, which has been relatively inactive for a few months, just dropped 20+ victims in a single day. They've also reindexed their entire site, over 100+ previous victims are now listed as being leaked today.

Lockbit ransomware group, which has been relatively inactive for a few months, just dropped 20+ victims in a single day.

They've also reindexed their entire site, over 100+ previous victims are now listed as being leaked today.
Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Trend Micro researchers analyse a new Android banking trojan. MMRat is capable of capturing user input, screen content, and remotely controlling the devices of its victims. trendmicro.com/en_us/research…

Trend Micro researchers analyse a new Android banking trojan. MMRat is capable of capturing user input, screen content, and remotely controlling the devices of its victims. trendmicro.com/en_us/research…
Germán Fernández (@1zrr4h) 's Twitter Profile Photo

#DarkGate now also delivered via Microsoft Teams REF: truesec.com/hub/blog/darkg… by ICSNick 🙌 Two additional runs most likely related to this campaign: + app.any.run/tasks/cba90c5e… Sharepoint URL

#DarkGate now also delivered via Microsoft Teams
REF: truesec.com/hub/blog/darkg… by <a href="/IcsNick/">ICSNick</a> 🙌

Two additional runs most likely related to this campaign:
+ app.any.run/tasks/cba90c5e… 
Sharepoint URL
Unit 42 (@unit42_intel) 's Twitter Profile Photo

#GuLoader and #RedLineStealer are two malware families featured in this article on extracting #C2 configurations. Using a system written in #Python that scans memory dumps by these families, we make note of newer techniques employed by malware authors. bit.ly/3vhi0y8

#GuLoader and #RedLineStealer are two malware families featured in this article on extracting #C2 configurations. Using a system written in #Python that scans memory dumps by these families, we make note of newer techniques employed by malware authors. bit.ly/3vhi0y8
보안프로젝트 (@ngnicky) 's Twitter Profile Photo

SecretCalls Spotlight: A Formidable App of Notorious Korean Financial Fraudster (Part 1) S2W의 안드로이드 악성코드 분석 사례!!! Read this story from S2W on Medium: medium.com/s2wblog/secret…

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

In their latest article Fortinet's Cara Lin & Vincent Li provide detailed insights into the propagation and actions of the Goldoon botnet targeting D-Link devices vulnerable to CVE-2015-2051. fortinet.com/blog/threat-re…

In their latest article Fortinet's Cara Lin &amp; Vincent Li provide detailed insights into the propagation and actions of the Goldoon botnet targeting D-Link devices vulnerable to CVE-2015-2051. fortinet.com/blog/threat-re…
Ptrace Security GmbH (@ptracesecurity) 's Twitter Profile Photo

Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware blog.kandji.io/malware-cuckoo… #Pentesting #Malware #CyberSecurity #Infosec

Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware blog.kandji.io/malware-cuckoo… #Pentesting #Malware #CyberSecurity #Infosec
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft Incident Response researchers uncovered a novel remote access trojan (RAT) that demonstrates sophisticated techniques to evade detection, persist in the target environment, and exfiltrate sensitive data. msft.it/6013qVXAl