Group-IB Threat Intelligence

397 posts

Group-IB Threat Intelligence banner
Group-IB Threat Intelligence

Group-IB Threat Intelligence

@GroupIB_TI

Official account of the @GroupIB Threat Intelligence Unit. Latest research, analytics, IOCs and threat alerts.

Katılım Ocak 2023
183 Takip Edilen15.6K Takipçiler
Group-IB Threat Intelligence
How do affiliates evolve into RaaS operators? The Gentlemen's playbook reveals a heavy focus on operational efficiency: weaponizing MeshCentral/AnyDesk for persistence, deploying password-protected executables via NETLOGON for domain-wide spread. Defend the #TTPs, not just the name. Read the full analysis here: link.group-ib.com/41defXc
Group-IB Threat Intelligence tweet media
English
0
0
10
655
Group-IB Threat Intelligence
The process involves using a Python script (userpassfort.py) to parse and organize valid credentials extracted from compromised Fortinet devices, then using these credentials across the network through NetExec. #TheGentlemen operationalizes every step of the attack chain., The Gentlemen operationalizes every step. They target backup infrastructure (Veeam) for credential harvesting and use custom tools like VCENTER.ps1 to disable HA/DRS on VMware clusters before encryption, maximizing impact. #IncidentResponse #ThreatIntel
Group-IB Threat Intelligence tweet media
English
1
0
10
1.1K
Group-IB Threat Intelligence
The Gentlemen is a newly emerged Ransomware-as-a-Service (RaaS) operation consisting of approximately 20 members. Originating from a #Qilin payment dispute, the operator "hastalamuerte" had already developed a locker while still an affiliate. Their primary initial access? A database of ~14,700 compromised FortiGate devices (CVE-2024-55591) and over 900 brute-forced VPN credentials ready for deployment. #Ransomware #DFIR
Group-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet media
English
3
32
172
11.4K
Group-IB Threat Intelligence
Group-IB Threat Intelligence@GroupIB_TI·
Infrastructure overlap confirms it: The #C2 server for GhostFetch (promoverse[.]org) shares HTML artifacts with a known MuddyWater domain from Oct 2025. Meanwhile, the HTTP_VIP C2 server stores victim geolocation and security products in a SQL DB. Read the full technical breakdown here: link.group-ib.com/4aYMTKa
Group-IB Threat Intelligence tweet media
English
0
4
13
962
Group-IB Threat Intelligence
Group-IB Threat Intelligence@GroupIB_TI·
Signs of AI-assisted #malware and website development. The CHAR backdoor contains debug strings with emojis, a trait rarely seen in human-authored code. This aligns with reports of #MuddyWater using Gemini to write malware. Defenders must now track not just TTPs, but also AI-specific code artifacts. #AI
Group-IB Threat Intelligence tweet media
English
1
1
8
1.3K
Group-IB Threat Intelligence
Group-IB Threat Intelligence@GroupIB_TI·
#MuddyWater is back with #OperationOlalampo, deploying four new malware families including CHAR – a rust backdoor, GhostFetch – a loader that deploys GhostBackDoor, and HTTP_VIP – a loader and a backdoor. The campaign leverages Telegram bots for C2, exposing real-time hands-on-keyboard activity and post-exploitation TTPs. #ThreatIntel
Group-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet media
English
2
48
151
12.6K
Group-IB Threat Intelligence
Group-IB Threat Intelligence@GroupIB_TI·
Even employing new techniques, adversaries are consistent with their hosting preferences, revealing predictable infrastructure patterns, strengthening attribution and early detection. Our research suggests that ShadowSyndicate operates as either an Initial Access Broker or a Bulletproof Hosting provider. Read the full analysis: link.group-ib.com/4rtTceb
Group-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet media
English
0
1
4
784
Group-IB Threat Intelligence
Group-IB Threat Intelligence@GroupIB_TI·
ShadowSyndicate infrastructure hosts offensive tools such as Cobalt Strike, Metasploit, Havoc, Mythic, Sliver, AsyncRAT, and Brute Ratel, with at least 20 servers used as #C2 nodes. Our telemetry also shows infrastructure overlaps with Cl0p, ALPHV/BlackCat, Ryuk, Black Basta, and Malsmoke operations. #CyberCrime
Group-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet media
English
1
3
13
1.7K
Group-IB Threat Intelligence
Group-IB Threat Intelligence@GroupIB_TI·
#ShadowSyndicate is a malicious activity cluster formed by numerous servers sharing the same SSH fingerprints. Since 2022, Group-IB has tracked how this infrastructure was involved in various malicious campaigns, allowing to connect seemingly unrelated #ransomware, #IAB, and other post-exploitation activity. #MalwareAnalysis
Group-IB Threat Intelligence tweet media
English
1
12
40
4.1K
Group-IB Threat Intelligence
Group-IB Threat Intelligence@GroupIB_TI·
The actor operates dedicated proxy infrastructure, with servers linked to #Polygon smart contracts for address rotation. Recent setProxy transactions indicate reactivated operations. Full technical breakdown, including IOCs and mitigation strategies, is available here: link.group-ib.com/4qPxyR9
Group-IB Threat Intelligence tweet media
English
0
1
4
812
Group-IB Threat Intelligence
Group-IB Threat Intelligence@GroupIB_TI·
DeadLock’s ransom notes have evolved from simple encryption alerts to explicit threats of #datatheft and sale, with later variants even offering "security reports" and promises not to re-target. This reflects a clear move toward double extortion and psychological coercion. #CyberCrime
English
1
1
3
1.1K
Group-IB Threat Intelligence
Group-IB Threat Intelligence@GroupIB_TI·
#DeadLock ransomware is now using Polygon smart contracts to manage proxy addresses, a stealthy, decentralized method that evades traditional defenses. This emerging trend of abusing #blockchain for malicious infrastructure marks a significant shift in attacker tradecraft. #ThreatIntel
Group-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet media
English
4
15
66
4.8K
Group-IB Threat Intelligence
From #phishing to POS cash-outs, read how Chinese cybercriminals are weaponizing NFC relay attacks to drain bank accounts remotely. Discover the technical breakdown of TX-NFC and NFU Pay, their infrastructure, and how financial institutions can defend against these evolving threats. Read the full report: link.group-ib.com/3Li56bI
Group-IB Threat Intelligence tweet media
English
0
2
11
1.2K
Group-IB Threat Intelligence
Analysis reveals these #Android malware variants share code with open-source projects like NFCProxy and are often packed with commercial protectors such as 360 Jiagu. They request extensive #NFC and network permissions, establish persistent foreground services, and exfiltrate #payment data over encrypted #C2 channels. The operations span multiple countries, with detections recorded across Europe, Southeast Asia, and the Middle East. #MalwareAnalysis
Group-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet media
English
1
1
6
1.5K
Group-IB Threat Intelligence
Chinese threat actors are deploying NFC-enabled #Androidmalware known as "Ghost Tap" to remotely relay payment data from victims’ cards via Telegram-distributed apps. Using #socialengineering, victims are tricked into installing APKs and tapping their cards, enabling fraudsters to conduct unauthorized transactions worldwide through illicit POS terminals. Group-IB researchers identified over 54 unique samples, some impersonating legitimate applications. #ThreatIntelligence
Group-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet media
English
1
25
90
7.4K