Szabolcs Schmidt(@smica83) 's Twitter Profileg
Szabolcs Schmidt

@smica83

Threat Intel Specialist and Incident Responder. Private account. All opinions expressed here are mine only.
https://t.co/7dQQO1JwUd

ID:147667505

calendar_today24-05-2010 18:50:54

15,1K Tweets

1,5K Followers

314 Following

Virus Bulletin(@virusbtn) 's Twitter Profile Photo

Splunk researchers look into the tactics, techniques and procedures employed by APT29 in a recent campaign. The attack chain begins with a spear-phishing email leading to the delivery of the WINELOADER backdoor. splunk.com/en_us/blog/sec…

Splunk researchers look into the tactics, techniques and procedures employed by APT29 in a recent campaign. The attack chain begins with a spear-phishing email leading to the delivery of the WINELOADER backdoor. splunk.com/en_us/blog/sec…
account_circle
Ivan Kwiatkowski(@JusticeRage) 's Twitter Profile Photo

On March 25, the FBI released an indictment of APT31 hackers. We read it carefully to find new intel, and managed to connect a few dots (including about the RAWDOOR malware family).

Full article and IOCs: harfanglab.io/en/insidethela…

account_circle
John Scott-Railton(@jsrailton) 's Twitter Profile Photo

NEW: 578 people hacked with under previous government, confirms 🇵🇱 Attorney General Adam Bodnar.

This commendable transparency is an first.

Follows on heels of recent notifications by PL gov to victims.

Source (translated):
wiadomosci.wp.pl/bodnar-podal-d…

NEW: 578 people hacked with #Pegasus under previous government, confirms 🇵🇱#Poland Attorney General @Adbodnar. This commendable transparency is an #EU first. Follows on heels of recent notifications by PL gov to victims. Source (translated): wiadomosci.wp.pl/bodnar-podal-d…
account_circle
Greg Lesnewich(@greglesnewich) 's Twitter Profile Photo

New piece on TA427 (overlaps with Emerald Sleet, APT43, the K-word) 🇰🇵🇰🇵

Lots of benign email conversations to gather strategic information from NGOs, think tanks, and academics in the DPRK research space 📧📮

DMARC, typosquats, and solicitation oh my!

proofpoint.com/us/blog/threat…

account_circle
Marcus Brinkmann(@lambdafu) 's Twitter Profile Photo

We found a critical vulnerability in SSH client with NIST P-521 keys, that allows private key recovery from only 60 signatures, CVE-2024-31497! If you use or with ECDSA P-521, upgrade now and generate a new key! Joint work with Fabian Bäumer, details ⬇️

account_circle
PT ESC(@TI_ESC) 's Twitter Profile Photo

We analyzed a massive attack by group that used several such as , etc. In attacks, the threat actor actively used technique
A detailed analysis of the campaign can be found here:
ptsecurity.com/ww-en/analytic…

We analyzed a massive attack by #cybercrime group #TA558 that used several #malware such as #AgentTesla, #Remcos etc. In attacks, the threat actor actively used #steganography technique A detailed analysis of the campaign can be found here: ptsecurity.com/ww-en/analytic…
account_circle
Shanholo(@ShanHolo) 's Twitter Profile Photo

🚨 uncovered on the devices.

🔥MD5: 0c1554888ce9ed0da1583dbdf7b31651
VT1/60
It downloads it's own payload here⬇️

systempth = '/usr/lib/python3.6/site-packages/system.pth'

🔥CVE-2024-3400

🚨#UPSTYLE #python #Backdoor uncovered on the #Paloalto #FW devices. 🔥MD5: 0c1554888ce9ed0da1583dbdf7b31651 VT1/60 It downloads it's own payload here⬇️ systempth = '/usr/lib/python3.6/site-packages/system.pth' 🔥CVE-2024-3400
account_circle
Sathwik Ram Prakki(@PrakkiSathwik) 's Twitter Profile Photo



-zipped
7bb8f92770816f488f3a8f6fe25e71a7
303b75553c5df52af087b5b084d50f98

All details.xlam
f436aa95838a92b560f4cd1e1c321fe7

Imp message from dgms.xlam
afb24ec01881b91c220fec8bb2f53291

204.44.124.134
9149, 15597, 18518, 26791, 28329

#TransparentTribe #APT36 #Base64-zipped #CrimsonRAT 7bb8f92770816f488f3a8f6fe25e71a7 303b75553c5df52af087b5b084d50f98 All details.xlam f436aa95838a92b560f4cd1e1c321fe7 Imp message from dgms.xlam afb24ec01881b91c220fec8bb2f53291 204.44.124.134 9149, 15597, 18518, 26791, 28329
account_circle
Jazi(@h2jazi) 's Twitter Profile Photo

It seems is using CVE-2023-3881 to attack Ukraine. This sample was submitted to VT from Poland.
d8ccaef116cada9c558f9e912d5cf7ef2978082611e677f6f55ca233f47a2f68

It seems #Gamaredon #APT is using CVE-2023-3881 to attack Ukraine. This sample was submitted to VT from Poland. d8ccaef116cada9c558f9e912d5cf7ef2978082611e677f6f55ca233f47a2f68
account_circle
Szabolcs Schmidt(@smica83) 's Twitter Profile Photo

Possible sample with a well known signature and low detection rates. Uploaded from
Sample: bazaar.abuse.ch/sample/a351667…
Mikhail Kasimov Simon Kenin any idea?

account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

Malwarebytes' Jérôme Segura describes an ongoing Nitrogen campaign delivered via malicious Google ads for PuTTY & FileZilla. Nitrogen is usually used to gain initial access to private networks, followed by data theft & ransomware deployment. malwarebytes.com/blog/threat-in…

Malwarebytes' Jérôme Segura describes an ongoing Nitrogen campaign delivered via malicious Google ads for PuTTY & FileZilla. Nitrogen is usually used to gain initial access to private networks, followed by data theft & ransomware deployment. malwarebytes.com/blog/threat-in…
account_circle
lc4m(@luc4m) 's Twitter Profile Photo

cool finding Fox_threatintel ! Also reGeorg reverse proxy .

🤨Cisco Talos Intelligence Group found similar one in ops. In a tunnel they have 165.154.227,192 which was related to .. interesting to investigate 🧐🧐🧐

Michael Koczwara Kimberly Arda Büyükkaya Jazi

cool finding @banthisguy9349 ! Also reGeorg reverse proxy #tunnel . 🤨@TalosSecurity found similar one in #China ops. In a tunnel they have 165.154.227,192 which was related to #apt41.. interesting to investigate 🧐🧐🧐 @MichalKoczwara @StopMalvertisin @WhichbufferArda @h2jazi
account_circle