d2hvYW1p (@iamwinstonm) 's Twitter Profile
d2hvYW1p

@iamwinstonm

Cyber Security Researcher , UnD3R M@lw@re s3dati0n ;)

ID: 3032102221

calendar_today20-02-2015 04:05:18

124 Tweet

331 Takipçi

149 Takip Edilen

ᴘᴀʀᴛʜɪ (@cyber__sloth) 's Twitter Profile Photo

Someone is testing out their tool/script to weaponize #LNK files. This screenshot shows at least 4 different ways you can download code from internet via Shortcut files. #ThreatIntel #ThreatHunting James _re_fox Security Doggo JAMESWT_MHT B3rt0 Arkbird

Someone is testing out their tool/script to weaponize #LNK files. This screenshot shows at least 4 different ways you can download code from internet via Shortcut files. #ThreatIntel #ThreatHunting  <a href="/James_inthe_box/">James</a> <a href="/_re_fox/">_re_fox</a> <a href="/securitydoggo/">Security Doggo</a> <a href="/JAMESWT_MHT/">JAMESWT_MHT</a> <a href="/rpsanch/">B3rt0</a> 
<a href="/Arkbird_SOLG/">Arkbird</a>
d2hvYW1p (@iamwinstonm) 's Twitter Profile Photo

#Venom #RAT #Velos #stealer samples a4a92cfdc1b3a949970eb6f5b20e1f21 8e0459ea44e2e136a66683b4bb1b9c66 The hardcoded IP 91.134.207.16 contains the encoded bob payload now;)#ThreatIntel #Malware MalwareHunterTeam JAMESWT_MHT James Arkbird blog.malwarelab.pl/posts/venom/

#Venom #RAT #Velos #stealer samples
a4a92cfdc1b3a949970eb6f5b20e1f21
8e0459ea44e2e136a66683b4bb1b9c66
The hardcoded IP 91.134.207.16 contains the encoded bob payload now;)#ThreatIntel #Malware <a href="/malwrhunterteam/">MalwareHunterTeam</a> <a href="/JAMESWT_MHT/">JAMESWT_MHT</a> <a href="/James_inthe_box/">James</a> <a href="/Arkbird_SOLG/">Arkbird</a> 
blog.malwarelab.pl/posts/venom/
ςεяβεяμs - мαℓωαяε яεsεαяςнεя (@c3rb3ru5d3d53c) 's Twitter Profile Photo

Anomali has done the world better, they have now released the file hashes for #smaug #ransomware. Take a moment to thank them for sharing these with the community, censorship has now been removed from the paywall.

RedDrip Team (@reddrip7) 's Twitter Profile Photo

By decoding the #DGA domain names, we discovered nearly a hundred domains suspected to be attacked by #UNC2452 #SolarWinds, including universities, governments and high tech companies such as @Intel and Cisco. Visit our github project to get the script. github.com/RedDrip7/SunBu…

By decoding the #DGA domain names, we discovered nearly a hundred domains suspected to be attacked by #UNC2452 #SolarWinds, including universities, governments and high tech companies such as @Intel and <a href="/Cisco/">Cisco</a>. Visit our github project to get the script.

github.com/RedDrip7/SunBu…
d2hvYW1p (@iamwinstonm) 's Twitter Profile Photo

There are two types of Threat Actors out there. Publicly known #APT Actors and Unknown #APT Actors. To attribute either of them, we need to "know" about Known Threat Actors anyways ;) #ThreatIntel #cybersecurity #ThreatHunting Vitali Kremez Anomali James ClearSky Cyber Security

d2hvYW1p (@iamwinstonm) 's Twitter Profile Photo

Painful to see #UNC #APT actor's #Backdoor play ITW while new exchange compromise saga continues in region 224a324dcf54ea168a4a5b302d10a239 -System.Web.TransportClient.dll From #UAE .It seems likely actor got another way;) JAMESWT_MHT James #threatintel #malware

Anomali (@anomali) 's Twitter Profile Photo

Via CyberWire Daily, by N2K: Anomali Threat Research experts d2hvYW1p, Gage, Yury Polozov join Dave Bittner @[email protected] to discuss research into the Static Kitten campaign targeting government agencies in the UAE and Kuwait. Definitely worth a listen: thecyberwire.com/podcasts/resea… #threatintelligence

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

"YARA rule match shows CobaltStrike beacon in svchost.exe process memory" Analyst: "I've checked the hash of the executable on Virustotal and it said <trusted>." Me: