Daniel Stepanic

312 posts

Daniel Stepanic

Daniel Stepanic

@DanielStepanic

Malwarez at @elasticseclabs | Macrodata Refinement

Katılım Mart 2011
646 Takip Edilen1.3K Takipçiler
Daniel Stepanic retweetledi
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
We uncovered a new Brazilian banking trojan campaign: TCLBANKER. What makes TCLBANKER notable isn’t just the malware itself, but how it spreads. The campaign uses compromised WhatsApp and Outlook accounts to propagate through trusted user relationships, deploys targeted banking overlays, and incorporates anti-analysis techniques designed to evade detection. For defenders, it’s another example of malware increasingly blending into legitimate user behavior and everyday communication channels, making detection harder and trust easier to exploit. Our latest research breaks down the infection chain, propagation methods, evasion tactics, and detection opportunities observed across the campaign. Read the full analysis: go.es.io/4ewvCKF
Elastic Security Labs tweet media
English
1
32
90
13.4K
Daniel Stepanic retweetledi
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
LLMs have gotten good enough at reverse engineering to recover source code from obfuscated binaries with real accuracy. So we asked the obvious next question: how fast and cheap is it to use one to build obfuscation specifically designed to beat it? We benchmarked Claude Opus 4.6 against the Tigress obfuscator across 20 targets first, to map its strengths and failure modes. 40% solve rate. Phase 3 multi-layer combos hit 0%, with cost explosions that killed the runs. Then we ran a dev/test/refine loop to build 3 purpose-built obfuscation variants targeting the same crackme, iterating directly against the model's known weaknesses. The finding: LLM-targeted obfuscation is fast and cheap to develop. Context windows, budget caps, and shortcut biases are all exploitable attack surfaces. The arms race just shifted.
Elastic Security Labs tweet media
English
5
88
320
30.1K
Daniel Stepanic retweetledi
SolidSnake
SolidSnake@soolidsnakee·
Here's a fun one from our latest research: PHANTOMPULSE resolves its C2 from blockchain transactions. The malware reads the most recent transaction of a wallet to decrypt the input data, and uses it as the C2 URL. The problem? It doesn't verify the sender. 🧵
SolidSnake@soolidsnakee

New #research together with @SBousseaden and @DanielStepanic at @elasticseclabs. We uncovered a campaign abusing Obsidian plugins and vault feature to deliver multi-platform payloads targeting both #Windows and #macOS. The final stage is #PHANTOMPULSE, an AI-built RAT that resolves its #C2 from Ethereum blockchain transactions and its loader #PHANTOMPULL A deep dive into the RAT internals is coming next. Stay tuned. elastic.co/security-labs/…

English
1
3
9
1K
Daniel Stepanic retweetledi
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
We have identified a novel social engineering campaign abusing Obsidian, the popular note taking app, to deliver a previously undocumented RAT #PHANTOMPULSE and it’s loader #PHANTOMPULL targeting individuals in finance and crypto. The attack never exploits a vulnerability. It abuses Obsidian's own plugin ecosystem to execute code the moment a victim opens a shared vault. Full analysis: go.es.io/4cld0dB
English
3
42
118
14.1K
Daniel Stepanic retweetledi
Joe Desimone
Joe Desimone@dez_·
We published a pair of articles on the axios compromise and deep dive on the malware, alongside detection strategies elastic.co/security-labs/…
English
6
27
137
16.1K
Daniel Stepanic retweetledi
Daniel Stepanic retweetledi
Virus Bulletin
Virus Bulletin@virusbtn·
Elastic Security Labs has been observing malicious campaigns delivering a multi-stage infection involving a previously undocumented loader. The SILENTCONNECT loader delivers ScreenConnect - a RMM tool used to control victim machines - as its final payload. elastic.co/security-labs/…
Virus Bulletin tweet media
English
0
12
41
8.7K
Daniel Stepanic retweetledi
Joe Desimone
Joe Desimone@dez_·
Patch Diff to SYSTEM - using LLMs to exploit a LPE vuln on Windows. More importantly, some thoughts on model capabilities the implications on our security industry elastic.co/security-labs/…
Joe Desimone tweet media
English
3
75
264
22.3K
Daniel Stepanic retweetledi
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
Elastic Security Labs uncovered a large-scale SEO poisoning campaign deploying #BADIIS malware on 1,800+ IIS servers worldwide. Compromised systems—spanning government, corporate, and education sectors—are monetized to push gambling and illicit content. Learn more here: ela.st/badiis
English
0
22
100
16.2K
Daniel Stepanic retweetledi
SolidSnake
SolidSnake@soolidsnakee·
We are tracking #clickfix campaign hosted and served by two compromised websites. Lua in-memory script loader and a #RAT that we are naming #MimicRat. A blog post will follow soon on @elasticseclabs. www.ndibstersoft[.]com d15mawx0xveem1.cloudfront[.]net xMRi[.]neTwOrk
English
2
7
25
2K
Daniel Stepanic retweetledi
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
New from the developer of #FINALDRAFT: Meet #NANOREMOTE, a newly-discovered Windows backdoor that leverages the Google Drive API for data theft and payload staging. Get the full analysis and defense strategies: ela.st/nanoremote
English
0
27
56
14.7K
Daniel Stepanic retweetledi
Daniel Stepanic retweetledi
Virus Bulletin
Virus Bulletin@virusbtn·
Elastic Security Labs publishes nightMARE, a Python library (v0.16) for malware analysis and for building configuration extractors. elastic.co/security-labs/…
Virus Bulletin tweet media
English
0
38
139
10.7K
Daniel Stepanic retweetledi
Devon Kerr
Devon Kerr@_devonkerr_·
@elasticseclabs is currently researching a new family of IIS malware impacting a large number of organizations globally. With a US university-based MDR provider, we’ve observed a novel attack chain, RMMs, a Godzilla-forked framework, and a malicious driver. Details coming soon.
English
1
11
59
4.6K
Daniel Stepanic retweetledi
Elastic Security Labs
Elastic Security Labs@elasticseclabs·
#ElasticSecurityLabs is observing #ValleyRAT infections using the following #LOLBins for execution: - DeviceCredentialDeployment.exe (proxy execution) - Tttracer (proxy execution) - Renames curl[.]exe (masquerade) - Ttdinject (remote injection) - Pester (proxy execution)
Elastic Security Labs tweet media
English
1
16
70
4.7K