dougy

921 posts

dougy

dougy

@R3dHash

Cyber Threat Intelligence | OSINT | Misinformation | Threat Hunting

가입일 Nisan 2018
2.5K 팔로잉863 팔로워
dougy 리트윗함
Who said what?
Who said what?@g0njxa·
#3/3 - Windows malware Windows users get on pwin[.]onelink[.]me/zmFc/dt38769z >> warboardgame[.]com/github-download.html This fake Github download page is serving a ZIP Download (image 1). The same template has been observed in the past serving other Windows stealers. Downloads are managed by warboardgame[.]com/archiveProxy.php, sending download stats to /statProxy.php The build analyzed has been detonated here: app.any.run/tasks/83b9cbfe… ZIP Sample -> 67fcd19f1be87ff47246a5fa40549df24da60eb81c62450efd5254fcb3628c1c Inside ZIP, a .vbs script downloads a build via Powershell from botshield[.]vu/kFcjld. Once b64 decoded -> 15de71073f44c657c23f5f97caa11f1b12e654d4d17684bfc628cc1e5b6bcdd5 This file loads another file from Stealer C2 hxxp://45.93.20.61:5466/api/CryptoByte (4e90d386c1c7d3d1fd4176975795a2f432d95685690778e09313b4a1dbab9997) This file sends a log zip to hxxp://45.93.20.61:5466/api/upload Sandbox log has been saved here -> 4ebbb900e083ccc240a8d354fb6466b339a5c4e7c1711a749ad00b1343bd96eb On the log you can observe infected machine information (copying the format of Rhadamanthys) (image 3), a screenshot of the machine, default user agents used in browsers and a file "browser_decryption.log" that describes the runtime of an additional payload download from: hxxp://45.93.20.61:5466/api/client (751e45828a3ff877ed4add1508b3e54463376cfb11f3171bfac160653ca9813c) This build scans the system looking for Browsers installation folders, decrypting the encryption of the browsers to extract data (such as User Agent in this preliminary log sent to C2), scan for crypto wallet files and extensions (that will also be extracted and send in log if found) and scan and extract Telegram session related files. This file is also responsible to create persistence on the machine with scheduled tasks via CLI and via a XML file (image 3) Additionally and to finish, the build makes requests to hxxp://45.93.20.195:5000 on /api/get_credentials , /api/get_challenge and /api/get_port using a Python client. The client makes the machine to establish and maintain a reverse SSH tunnel, by retrieving SSH login credentials from the server (Request a challenge, send a response, and decrypt credentials). Then the reverse SSH tunnel is established on a free port of the C2 requested previously, attempting to act as a SOCKS5 proxy Thank you to whoever leaked/extracted a related client, we love you <3. It helps much to understand what is going on (image 4) 4893748008f7c2a1508bb1bb4fa16a7a92de658b89fe7cc1e68e05a02a9aa4b4 No further analysis has been done, feel free to play with it 🏁
Who said what? tweet mediaWho said what? tweet mediaWho said what? tweet mediaWho said what? tweet media
English
0
3
11
1.2K
dougy 리트윗함
rat king 🐀
rat king 🐀@MikeIsaac·
amazon's internal A.I. coding assistant decided the engineers' existing code was inadequate so the bot deleted it to start from scratch that resulted in taking down a part of AWS for 13 hours and was not the first time it had happened incredible ft.com/content/00c282…
rat king 🐀 tweet media
English
385
3.2K
23.1K
6.5M
dougy 리트윗함
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft Defender researchers observed attackers using yet another evasion approach to the ClickFix technique: Asking targets to run a command that executes a custom DNS lookup and parses the `Name:` response to receive the next-stage payload for execution.
Microsoft Threat Intelligence tweet media
English
21
240
989
165.1K
dougy 리트윗함
MalwareHunterTeam
MalwareHunterTeam@malwrhunterteam·
Possible interesting "topwebcomicsv1.msi": 5a1c14335d0a8b007ff2813e6ef738e8836be38257cc82fe03c02b71d71e1b01 It is using Deno, "the next-generation JavaScript runtime". Seeing malware using Deno is not a common thing, at least yet... 🤷‍♂️
MalwareHunterTeam tweet mediaMalwareHunterTeam tweet mediaMalwareHunterTeam tweet media
English
5
7
27
52.8K
dougy 리트윗함
Who said what?
Who said what?@g0njxa·
These fake Fortinet websites, still present on top browser search engines results, are now delivering a fake FortiClient app, signed "Taiyuan Lihua Near Information Technology Co., Ltd. (Certum-given)" Its a phishing app, that will send credentials to vpn-connection[.]pro Based on other signed files with same EV cert, recently the TA were also spreading applications impersonating Sophos, WatchGuard and Ivanti. Analysis: app.any.run/tasks/e83886f5…
Who said what? tweet media
Who said what?@g0njxa

Watch out for fake Fortinet websites! Also do not blindly trust search engines AI summarizations as they can also lead to malicious redirects. These redirects lead the user to a phishing site asking FortiClient credentials, sending to myfiles2[.]download, and downloading legit builds as decoy after a valid submission >> Redirect vpn-fortinet[.]github[.]io fortinet-vpn[.]com >> Phishing vpn-fortinet[.]com

English
7
151
562
104.7K
dougy 리트윗함
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
MongoBleed (CVE-2025-14847) is basically Heartbleed for MongoDB - unauthenticated memory disclosure - public POC, trivial to exploit - leaks creds, tokens, cloud keys straight from RAM - huge exposed surface on the internet Good writeups and technical details here: doublepulsar.com/merry-christma… ox.security/blog/attackers… blog.ecapuano.com/p/hunting-mong… Patch fast, rotate secrets, and assume exposed instances were scanned(!)
English
41
609
3.4K
653.1K
dougy 리트윗함
React
React@reactjs·
We found that the fix to address the DoS vulnerability in React Server Components (CVE-2025-55184) was incomplete and does not prevent an attack in a specific case. This is disclosed as CVE-2025-67779. New patches are available now, please update immediately.
English
19
52
384
161.5K
dougy 리트윗함
abuse.ch
abuse.ch@abuse_ch·
We are excited that we were once again part in the coordinated international operation #OpEndgame 📣, taking action against the notorious information and credential stealer #Rhadamanthys 🕵️ We assisted in the takedown of threat actor infrastructure and share a full list of #Rhadamanthys botnet C2s on ThreatFox 🦊 Full list of Rhadamanthys botnet C2s: 📡threatfox.abuse.ch/browse/tag/OpE… Europol press release: 🚨 europol.europa.eu/media-press/ne…
abuse.ch tweet media
English
7
32
117
15.4K
dougy 리트윗함
GangExposed RU
GangExposed RU@GangExposed_RU·
Possible new leak of internal Conti / Trickbot chats A valuable dataset of internal communications that appears to be missing from public leaks. Some conversations are dated 2019. Not previously published in Conti-Leaks; partially overlaps with Trick-Leaks, but in a different form. #4S9TvMtiCRl-Ra_sR8z6Kmqj-r47HVjBCGpGKI-8Ju0" target="_blank" rel="nofollow noopener">mega.nz/file/hsx0xQxA#…
English
2
9
45
6.7K
dougy 리트윗함
Intrinsec
Intrinsec@Intrinsec·
When you think there’s a new APT in town... Relax, it’s just our Red Team doing their thing (thanks to @Defte_ technique)😅 Want to improve your detections or challenge your team? Contact us!
Expel@ExpelSecurity

⚠️ Our threat intel team just caught attackers using a clever new trick to bypass security tools: cache smuggling. Instead of downloading malware, they hide it in fake images that browsers automatically cache. Then PowerShell extracts and runs it—no web requests needed.

English
2
19
169
25.5K
dougy 리트윗함
Will
Will@BushidoToken·
⚠️ Breach Notification from F5 Networks: “In August 2025, we learned a highly sophisticated nation-state threat actor maintained long-term, persistent access to, and downloaded files from, certain F5 systems.” my.f5.com/manage/s/artic…
English
1
61
167
77K
dougy 리트윗함
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
Now you know why the China tab in the APT spreadsheet is the biggest one. You can only imagine the scale of damage their industrial espionage caused - and why some believe it’s far worse than anything ransomware groups ever did.
Xixi®茜茜大姐 🇨🇳🇭🇰🇲🇴@Xixi_2328857214

@sahilypatel From software, equipment to materials, China is reconstructing an entire ecosystem inside the country

English
8
57
337
48.9K
dougy 리트윗함
John Hultquist
John Hultquist@JohnHultquist·
We are releasing details on BRICKSTORM malware activity, a China-based threat hitting US tech to potentially target downstream customers and hunt for data on vulnerabilities in products. This actor is stealthy, and we've provided a tool to hunt for them. cloud.google.com/blog/topics/th…
English
6
121
359
96.9K
dougy 리트윗함
vx-underground
vx-underground@vxunderground·
CyberNews pushed the same fucking story last year. It's even written by the same author. You can't keep fear mongering people every time a Threat Actor assembles a data leak package
vx-underground tweet mediavx-underground tweet media
English
46
255
1.7K
105.5K