Roy Moshilov (@royxmos) 's Twitter Profile
Roy Moshilov

@royxmos

Expert Security Researcher of malware, exploits and shellcodes. #Hunter #Programming #Pentesting #Reversing #Exploits #Malware #CyberSecurity

ID: 792033000317943809

linkhttps://about.me/roym calendar_today28-10-2016 15:59:17

264 Tweet

428 Followers

560 Following

Roy Moshilov (@royxmos) 's Twitter Profile Photo

#Cridex: Recent samples target mostly well-known US investment banks. The popular attack vector relies on redirecting users with infected machines to fake websites where their usernames and #passwords are then stolen. #CyberSecurity #F5 #evasion

#Cridex: Recent samples target mostly well-known US investment banks. The popular attack vector relies on redirecting users with infected machines to fake websites where their usernames and #passwords are then stolen.
#CyberSecurity #F5 #evasion
F5 Labs (@f5labs) 's Twitter Profile Photo

[Article] “#Panda #malware: It’s not just about cryptocurrencies anymore” by Remi Cohen and Roy Moshailov: bit.ly/2UETtLq

[Article] “#Panda #malware: It’s not just about cryptocurrencies anymore” by Remi Cohen and Roy Moshailov: bit.ly/2UETtLq
F5 Labs (@f5labs) 's Twitter Profile Photo

[Article] “#Gozi banking trojan pivots towards Italian banks in February and March” by @sarab0ddy, Roy Moshailov and Remi Cohen: bit.ly/2V8Dp9S

[Article] “#Gozi banking trojan pivots towards Italian banks in February and March” by @sarab0ddy, Roy Moshailov and Remi Cohen: bit.ly/2V8Dp9S
Roy Moshilov (@royxmos) 's Twitter Profile Photo

2 #Danabot samples discover 2 campaigns: one targets 10 #Polish #banks and 3 digital currency exchanges; the other attacks 4 financial institutions in #Australia and #NewZealand. #Fraud #CyberSecurity #F5

2 #Danabot samples discover 2 campaigns: one targets 10 #Polish #banks and 3 digital currency exchanges; the other attacks 4 financial institutions in #Australia and #NewZealand. #Fraud #CyberSecurity #F5
Vitali Kremez (@vk_intel) 's Twitter Profile Photo

2019-05-20: #Gozi #ISFB v3 Banking #Malware { version: 300725, group: 2000, key: '0dTpwUl8Hb3Ps8Dm' } DNSPOD Resolution | Registry Installer MD5: 9EF548E73315B705A8BFC1623B0ABB7D h/t JAMESWT_MHT

2019-05-20: #Gozi #ISFB v3 Banking #Malware
{ version: 300725, group: 2000, key: '0dTpwUl8Hb3Ps8Dm' }
DNSPOD Resolution | Registry Installer 
MD5: 9EF548E73315B705A8BFC1623B0ABB7D
h/t <a href="/JAMESWT_MHT/">JAMESWT_MHT</a>
F5 Labs (@f5labs) 's Twitter Profile Photo

[In Review] New campaign spotted spreading #XBash #malware via #Elastic Search CVE-2015-1427 vulnerability. #HFS exposes additional tools the attacker has but isn’t using for this attack.

[In Review] New campaign spotted spreading #XBash #malware via #Elastic Search CVE-2015-1427 vulnerability. #HFS exposes additional tools the attacker has but isn’t using for this attack.
Roy Moshilov (@royxmos) 's Twitter Profile Photo

#danabot is everywhere! Many samples we’ve recently investigated deliver malicious client-side code that’s removed milliseconds after injection. Targets include large financial institutions in Poland and Australia, popular social networks, and adult sites. #malspam #Exploits #F5

#danabot is everywhere! Many samples we’ve recently investigated deliver malicious client-side code that’s removed milliseconds after injection. Targets include large financial institutions in Poland and Australia, popular social networks, and adult sites.  #malspam #Exploits #F5
Roy Moshilov (@royxmos) 's Twitter Profile Photo

The new #rConfig unauthenticated #RCE (CVE-2019-16662) has been spotted in the wild. #cve201916662 #Exploit #RCE #Cybersecurity #F5

The new #rConfig unauthenticated #RCE (CVE-2019-16662) has been spotted in the wild. 
#cve201916662 #Exploit #RCE #Cybersecurity #F5
Roy Moshilov (@royxmos) 's Twitter Profile Photo

#Gozi/#Ursnif uses the stealthy #fileless attacks where legitimate tools are being used, to inject code to another process. This one is Ursnif’s #APC injection which calls SleepEx API to enter an alertable state. This funnel could end with #stealing sensitive credentials.#F5

#Gozi/#Ursnif uses the stealthy #fileless attacks where legitimate tools are being used, to inject code to another process. This one is Ursnif’s #APC injection which calls SleepEx API to enter an alertable state. This funnel could end with #stealing sensitive credentials.#F5
Roy Moshilov (@royxmos) 's Twitter Profile Photo

#DanaBot kicking off the phishing and fraud season traditionally seen around year-end holidays with new tactics and techniques to steal money and sensitive information. #evasive #facebook #groupon #paypal #trojan. Read more:

Roy Moshilov (@royxmos) 's Twitter Profile Photo

#Ursnif / #Gozi malware is currently targeting nearly 20 online commercial banks, focusing on the largest banks in the U.S. #trojan #banking #cybersec #F5

#Ursnif / #Gozi malware is currently targeting nearly 20 online commercial banks, focusing on the largest banks in the U.S.
#trojan #banking #cybersec #F5
Roy Moshilov (@royxmos) 's Twitter Profile Photo

#Fraudsters are taking advantage of #COVID19 and the health crisis in #Italy. The latest analysis of #Ursnif’s #webinject targets 28 major Italian financial institutions. See attached image. #cybersecurity #F5

#Fraudsters are taking advantage of #COVID19 and the health crisis in #Italy. The latest analysis of #Ursnif’s #webinject targets 28 major Italian financial institutions. See attached image. #cybersecurity #F5
Roy Moshilov (@royxmos) 's Twitter Profile Photo

#Ursnif operators’ effort to steal from online users isn't stopping, even when the historic #pandemic is striking Europe, especially #Italy, where this sample is targeting 16 prominent financial institutions. #COVID19 #CyberSecurity #infosec #F5

#Ursnif operators’ effort to steal from online users isn't stopping, even when the historic #pandemic is striking Europe, especially #Italy, where this sample is targeting 16 prominent financial institutions. #COVID19 #CyberSecurity #infosec #F5
Roy Moshilov (@royxmos) 's Twitter Profile Photo

In a recent investigation, our research team examined #danabot targeting known financial organizations in Germany, Poland, and Australia. Most of the webinjects were removed after execution. However, one corrupted the CSP so it could run without interference. #CyberSecurity #F5

In a recent investigation, our research team examined #danabot targeting known financial organizations in Germany, Poland, and Australia. Most of the webinjects were removed after execution. However, one corrupted the CSP so it could run without interference. #CyberSecurity #F5
Roy Moshilov (@royxmos) 's Twitter Profile Photo

#IcedID, a crafty, #fileless #malware, is here with new stealth and anti-sandboxing techniques. #cybersecurity #Exploit go.f5.net/hm3yt

#IcedID, a crafty, #fileless #malware, is here with new stealth and anti-sandboxing techniques.  
#cybersecurity #Exploit go.f5.net/hm3yt
Roy Moshilov (@royxmos) 's Twitter Profile Photo

#Android #malware #flubot 5.0 and later versions add new sophisticated capabilities. Get our analysis report that includes customized decryption tools. #exploit #cybersecurity #packer go.f5.net/b73vf3

#Android #malware #flubot 5.0 and later versions add new sophisticated capabilities.
Get our analysis report that includes customized decryption tools.
#exploit #cybersecurity #packer
go.f5.net/b73vf3