Doel Santos (@santosdoel) 's Twitter Profile
Doel Santos

@santosdoel

Threat Intel and enjoyer of memes

ID: 371490349

calendar_today10-09-2011 23:39:06

841 Tweet

227 Takipçi

486 Takip Edilen

Yeti (@yeti_sec) 's Twitter Profile Photo

#opendir #ransomware #hacktool #CobaltStrike #medusalocker #avoslocker Update on 95.213.145.101. Ransomware binaries and additional payloads. virustotal.com/gui/file/0f22a… virustotal.com/gui/file/f064d…

#opendir #ransomware #hacktool #CobaltStrike #medusalocker #avoslocker

Update on 95.213.145.101. Ransomware binaries and additional payloads.

virustotal.com/gui/file/0f22a…
virustotal.com/gui/file/f064d…
Unit 42 (@unit42_intel) 's Twitter Profile Photo

2023-01-19 (Thur) - #TridentUrsa / #Gamaredon English language lure targeting Ukrainian allies. MD5 6e2ea6a4c6e047e91f217933bea3e1a4 --> ed48f91182c67f0e1ad99906cfc76968 --> 8d07baadbb98d00e330dd043388ee621 --> hxxp://194.180.174[.]158/18.01/quicker.rtf (Thx, MalwareHunterTeam)

2023-01-19 (Thur) - #TridentUrsa / #Gamaredon English language lure targeting Ukrainian allies. 
MD5 6e2ea6a4c6e047e91f217933bea3e1a4 --&gt; ed48f91182c67f0e1ad99906cfc76968 --&gt; 8d07baadbb98d00e330dd043388ee621 --&gt; hxxp://194.180.174[.]158/18.01/quicker.rtf (Thx, <a href="/malwrhunterteam/">MalwareHunterTeam</a>)
Unit 42 (@unit42_intel) 's Twitter Profile Photo

A new method for delivering #RedLineStealer via #OneNote attachments was observed (e03d1dc90b981455ff453c996a919848074c6e735719148eeb8e1185935c28b3). Extracted C2 configuration: {"C2 url": ["172.245.45.213:3235"], "Bot Id": "Skijay2"}

A new method for delivering #RedLineStealer via #OneNote attachments was observed (e03d1dc90b981455ff453c996a919848074c6e735719148eeb8e1185935c28b3). Extracted C2 configuration: {"C2 url": ["172.245.45.213:3235"], "Bot Id": "Skijay2"}
vx-underground (@vxunderground) 's Twitter Profile Photo

.Activision was breached December 4th, 2022. The Threat Actors successfully phished a privileged user on the network. They exfiltrated sensitive work place documents as well as scheduled to be released content dating to November 17th, 2023. Activision did not tell anyone.

.<a href="/Activision/">Activision</a> was breached December 4th, 2022. The Threat Actors successfully phished a privileged user on the network. They exfiltrated sensitive work place documents as well as scheduled to be released content dating to November 17th, 2023.

Activision did not tell anyone.
Brett Callow (@brettcallow) 's Twitter Profile Photo

"#Dallas Police Department computers are still down after the city’s system was attacked by #ransomware on Wednesday, so it’s hard for them get information on prior calls to the home, they say." wfaa.com/article/news/c…

vx-underground (@vxunderground) 's Twitter Profile Photo

Here is the full video of the Polish CBZC (Central Bureau for Combating Cybercrime) arresting individuals associated with DDoS as a Service providers. Viewer discretion is advised. The levels of dorkiness are off of the charts.

Unit 42 (@unit42_intel) 's Twitter Profile Photo

2023-10-12 (Thursday): The latest example of #DarkGate malware distributed through Microsoft Teams. Attacker poses as target organization's CEO and sends victim a Teams invite. Message contains password-protected zip archive. IOCs available at bit.ly/3rY1hi1

2023-10-12 (Thursday): The latest example of #DarkGate malware distributed through Microsoft Teams. Attacker poses as target organization's CEO and sends victim a Teams invite. Message contains password-protected zip archive. IOCs available at bit.ly/3rY1hi1
RAKESH KRISHNAN (@rakeshkrish12) 's Twitter Profile Photo

#INCRansomware #dataleak IP exposed! incapt.]su/blog/leaks Email:[email protected] IP:31.41.44.202 ASN:56577 Loc:🇷🇺 Previously hosted:Leak Site of #RanzyLocker in 2020 ranzy-leak./hk ranzylock./hk #infosec #security #OSINT #malware #darkweb #deepweb #ransomware #cybersecurity

#INCRansomware #dataleak IP exposed!

incapt.]su/blog/leaks
Email:gansbronz@gmail.com
IP:31.41.44.202
ASN:56577
Loc:🇷🇺

Previously hosted:Leak Site of #RanzyLocker in 2020
ranzy-leak./hk
ranzylock./hk
#infosec #security #OSINT #malware #darkweb #deepweb #ransomware #cybersecurity
BSidesCharm (@bsidescharm) 's Twitter Profile Photo

BSidesCharm extends its deepest sympathies to all affected by the Key Bridge tragedy. Our hearts are with the individuals and families impacted, and we commend the swift action of our first responders to save lives. Let us unite in support and solidarity as Charm City. We will

Unit 42 (@unit42_intel) 's Twitter Profile Photo

Our telemetry revealed an interesting case of #BoggySerpens (#MuddyWater) against a Middle East target: Persistence through scheduled task that runs PowerShell to abuse AutodialDLL registry key. AutodialDLL loads DLL for C2 framework. Details at bit.ly/4aIQDMU

Our telemetry revealed an interesting case of #BoggySerpens (#MuddyWater) against a Middle East target: Persistence through scheduled task that runs PowerShell to abuse AutodialDLL registry key. AutodialDLL loads DLL for C2 framework. Details at bit.ly/4aIQDMU
☠️ Andy Piazza ☠️ (@klrgrz) 's Twitter Profile Photo

New job post! We’re hiring a senior principal threat researcher to join one of my teams - read: seasoned threat hunter with lots of experience in large datasets. jobs.smartrecruiters.com/PaloAltoNetwor…

Unit 42 (@unit42_intel) 's Twitter Profile Photo

🏆 Unit 42 research wins the Péter Szőr Award at #VB2025! The development of our Attribution Framework by Andy Piazza, Kyle Wilhoit, Robert Falcone and David Fuertes is recognized as outstanding technical security research. Read it here: bit.ly/46nvHvB

🏆 Unit 42 research wins the Péter Szőr Award at #VB2025! The development of our Attribution Framework by Andy Piazza, Kyle Wilhoit, Robert Falcone and David Fuertes is recognized as outstanding technical security research. Read it here: bit.ly/46nvHvB