Damag3dRoot

50 posts

Damag3dRoot

Damag3dRoot

@Damag3dRoot

Cyber Analyst - Malware - Threat intel

Katılım Mart 2024
205 Takip Edilen116 Takipçiler
Damag3dRoot retweetledi
Israel
Israel@f1tym1·
CTI Research: Sandworm / APT44 ift.tt/SXM19Tq Evidence-Labeled Threat Intelligence Assessment and SOC Defensive Guidance (2009 — March 2026) Table of Contents Report Metadata Methodology & Evidence Labels Confidence & What Changes Confidence Executive Summary Ac…
English
0
17
70
7K
Damag3dRoot retweetledi
VECERT Analyzer
VECERT Analyzer@VECERTRadar·
🚨 CRITICAL THREAT ALERT: NUCLEAR SCADA SYSTEM COMPROMISE 🚨 🏢 Victim: Golfech Nuclear Power Plant (NPP) - Unit 2 👤 Threat Actor: Apollon / MONARCH (Russian-affiliated) 🗓️ Date: 2026-03-12 🇫🇷 Country: France The threat organization "MONARCH" has released visual evidence of unauthorized access to the Golfech Nuclear Power Plant in France. The actor, "Apollon," claims they have bypassed security to gain full control over the secondary coolant loop. Screenshots show a SIEMENS HMI (Human-Machine Interface) panel for Unit 2, as well as evidence of lateral movement within the SCADA-02 operator network and the execution of PowerShell scripts on internal systems. The visual proof includes internal IP addresses and server logs from GOLFECH-SCADA-02. Infrastructure security teams must immediately audit all SIEMENS HMI interfaces and monitor for unauthorized logins in ICS/SCADA environments. Monitor: analyzer.vecert.io #ThreatIntel #CyberSecurity #France #NuclearSecurity #Golfech #SCADA #ICS #InfoSec #CriticalInfrastructure #MonarchAttack
VECERT Analyzer tweet media
English
12
38
89
9.1K
Damag3dRoot retweetledi
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
The cybercriminal threat actor tracked by Microsoft Threat Intelligence as Storm-2561 is running an SEO-poisoning campaign that redirects people searching for enterprise VPN software to spoofed sites and malicious ZIP downloads leading to credential theft. msft.it/6019Qlydd The ZIP file contains a malicious, digitally signed installer that masquerade as a trusted VPN client. The attack chain ultimately loads a variant of Hyrax infostealer that captures VPN sign-in credentials and VPN configuration data, and exfiltrates it to attacker infrastructure. Read the full Microsoft Defender Experts analysis of the tactics, techniques, and procedures (TTPs) and indicators of compromise of this Storm-2561 campaign, and get protection, detection, and hunting guidance:
English
2
34
84
15.2K
Damag3dRoot
Damag3dRoot@Damag3dRoot·
How to invest malicious IP Methodology @DamagedRoot/how-to-malicious-ip-investigation-complete-methodology-part2-95cba8cb93c1" target="_blank" rel="nofollow noopener">medium.com/@DamagedRoot/h…
English
0
1
2
114
Damag3dRoot
Damag3dRoot@Damag3dRoot·
How to invest malicious IP ? @DamagedRoot/how-to-malicious-ip-investigation-complete-methodology-phase-1-b0033cdb2340" target="_blank" rel="nofollow noopener">medium.com/@DamagedRoot/h…
English
0
1
3
100
Damag3dRoot retweetledi
vx-underground
vx-underground@vxunderground·
This is really cool. I like this code, proof-of-concept, and paper A LOT. Basically he is modifying the raw bytes of .LNK files (Windows shortcuts) to make them perform malicious actions while also operating correctly as a .LNK file. When examined from the user they will appear completely legitimate, but it's not. This is really, really, really cool. This is a great malware technique. I can't recall the last time I read anything on .LNK files being abused in this manner. Historically they're "hijacked", not modified at the byte level. My only criticism is he wrote this proof-of-concept in Python (not C or C++, like a gangster). Excellent work.
Wietze@Wietze

Can LNK files ever be trusted? ⚡ My latest blog post demonstrates several new LNK abuse methods, allowing you to fully spoof the target shown in Explorer. It also introduces tools to create your own LNKs, and detected spoofed ones yourself. 🐬 wietzebeukema.nl/blog/trust-me-…

English
20
163
2K
87.5K
Damag3dRoot retweetledi
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft Defender researchers observed attackers using yet another evasion approach to the ClickFix technique: Asking targets to run a command that executes a custom DNS lookup and parses the `Name:` response to receive the next-stage payload for execution.
Microsoft Threat Intelligence tweet media
English
21
241
995
164.9K
Damag3dRoot retweetledi
SpecterOps
SpecterOps@SpecterOps·
WSL2 is a powerful attacker hideout because it runs as a separate Hyper-V VM, and defenders rarely monitor it. Daniel Mayer explains how attackers pivot into WSL2 and what it took to build tooling that works across WSL2 versions. Read more ⤵️ ghst.ly/45fPUma
English
8
174
729
102.7K
Damag3dRoot retweetledi
Bert-Jan 🛡️
Bert-Jan 🛡️@BertJanCyber·
Pushed a script that lists the browser extensions of Chrome, Edge and Firefox. If you do not have TVM premium you know the struggle. Recommended to use in Live Response to speed up your browser based investigations. github.com/Bert-JanP/Inci…
English
5
26
142
14.2K
Damag3dRoot retweetledi
Bitshadow
Bitshadow@fbgwls245·
New Orion #Ransomware Leak Site👀 13 Victims cjfntkj5qeizxowuy3srceg7zo6namc3kfeor7pfn6bpdkl3w265ooid[.]onion
Bitshadow tweet media
Indonesia
2
21
70
13K
Damag3dRoot retweetledi
RussianPanda 🐼 🇺🇦
RussianPanda 🐼 🇺🇦@RussianPanda9xx·
NEW BLOG: The Great VM Escape 💕 We caught threat actors deploying a VMware ESXi exploit toolkit in the wild - potentially was a zero-day developed over a year before VMware's disclosure 👀 If anyone has thoughts on it let me know, but I needed almost a full case of beer to wrap my head around this one 🍺 Full technical breakdown 👇 huntress.com/blog/esxi-vm-e…
English
26
192
784
167.4K
Damag3dRoot retweetledi
Clandestine
Clandestine@akaclandestine·
GitHub - yogeshHax/ZeroPoint-Intel: ZeroPoint Intel is a full-stack Threat Intelligence system that autonomously scans global feeds for critical CVEs and Zero-Day exploits. It features real-time risk scoring, strict asset monitoring, and instant github.com/yogeshHax/Zero…
English
1
12
45
2.5K
Damag3dRoot retweetledi
Clandestine
Clandestine@akaclandestine·
GitHub - rubenformation/ms-photos_NTLM_Leak: New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click github.com/rubenformation…
English
0
47
153
9.4K
Damag3dRoot retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
I created a new GitHub repo for tracking daily hunting findings: exposed servers, open ports, and infrastructure linked to threat activity. I will format what I have already added in the coming days. github.com/DarkWebInforme…
English
2
21
119
15.4K
Damag3dRoot
Damag3dRoot@Damag3dRoot·
🚶‍➡️🚶‍➡️🚶‍➡️👨‍🦯‍➡️PoC Implementation combining Stack Moonwalking and Memory Encryption. 🌕 github.com/klezVirus/Moon…
English
0
0
2
50