DFIR hero
602 posts



In December 2024, Microsoft Threat Intelligence observed limited activity by an unattributed threat actor using a publicly available, static ASP. NET machine key to inject malicious code and deliver the Godzilla post-exploitation framework. msft.it/6010U5ip8


تشخیص یک نمونه از #chatgpt installer مخرب که امروز روش کار کردم رو رو باهم ببینیم. نکات خوبی داره و مثل همیشه هکرا رو موج سوار میشن.

It seems like the Fortinet team is under heavy pressure as they’ve released a list of attacker IPs. However, I advise against blindly blocking these IPs. They might belong to CDNs or could have already been reassigned to legitimate services. Always verify before taking action.

🚨 After seeing the Snake driver sniff inbound traffic from a mail server using an incredible technique, now we encounter something new: a Linux kernel module that hijacks inbound network traffic to compromised systems. Innovation in attack vectors is relentless.








