J.A.

28 posts

J.A. banner
J.A.

J.A.

@Jalbrec4

Security Researcher at Lookout, staring into the middle distance. Opinions are my own.

Katılım Ağustos 2019
310 Takip Edilen23 Takipçiler
J.A.
J.A.@Jalbrec4·
@joinedserver @krzywix @iBSparkes @i41nbeer @_bazad @ProjectZeroBugs It's not known how it was leaked to be fair. Watering hole sites were scrubbed and delivery domains were inop by working with CERTs. Both DS and Coruna were deployed at a previously unforeseen scale when discovered. Opa334 handled this responsibly, the leaker not so much.
English
1
0
0
480
Potato Soup 🇵🇸
Potato Soup 🇵🇸@joinedserver·
@krzywix @iBSparkes @i41nbeer @_bazad @ProjectZeroBugs while on it, may I ask why did you (google, iVerify, lookout) let it being repurposed publicly while mentioning there're still a big number of users on vulnerable versions? every kid can just change the C2 IP and host their full 1-click chain - this is something unexpected.
English
1
0
1
73
sparkey
sparkey@iBSparkes·
I feel like there has been a crazy [negative] response to the "DarkSword" chain, the bugs going public, and hence being publcily exploited. I don't rememebr a time in the iOS scene where this has ever previously been the case. It's been a long standing tradition for bugs to be/
English
2
8
95
17.2K
J.A.
J.A.@Jalbrec4·
Now that the DarkSword exploit chain has been leaked on GitHub, things are getting serious. I'd love to know how the researcher found it (if you read this hit me up), as it possibly came from some unknown UNC6353 infrastructure. Update your iOS18 device or try Lockdown mode gang.
English
0
0
0
147
J.A.
J.A.@Jalbrec4·
@Shorouk_News I may have evidence of someone impersonating Shorouk News to deliver malware. Please contact me, as I could not reach you via the email address on your website.
English
0
0
0
26
J.A. retweetledi
aptwhatnow
aptwhatnow@aptwhatnow·
If you're seeing APT efforts blend and not make sense...those looking at some of the more APT43 (Kimsuky), The former covid centric element, APT37, and groups that look like 37...then this might make some sense dailynk.com/english/north-… Terrific piece @The_Daily_NK
English
0
11
26
6.7K
J.A. retweetledi
Michael Koczwara
Michael Koczwara@MichalKoczwara·
🚨We're thrilled to announce a new partnership between IntelOps and Validin🚨 All our students will receive at least 3 months of complimentary access to Validin accounts, blending features from personal and professional plans🤝 Plus, we're developing a new series of lessons, ranging from beginner-friendly tutorials on utilizing Validin to advanced modules with case studies on hunting APTs🎯 Including a module on the Nation-State Actor - Muddy Water 🇮🇷 and many others 🇷🇺 🇰🇵 🇨🇳 Stay tuned for more details coming next week! @Intel_Ops_io @ValidinLLC
Intel-Ops@Intel_Ops_io

🚨New Partnership Announcement!🚨 All students will receive enhanced access to @Validin providing improved hunting capabilities. Upcoming training on Validin and real-life use cases tracking threat actors are on the way! inc. dedicated Discord channel for Validin. 🔥🔥🔥

English
1
9
66
8.6K
J.A.
J.A.@Jalbrec4·
@PunishedK19753 @Cyber_O51NT Basically, TA runs a uAdmin Live Panel while on the call with victim walking them through each step, and manually choosing the prompts (OTP, driver's license, etc). The social engineering portion seems to be what makes it most effective.
English
0
0
0
28
J.A.
J.A.@Jalbrec4·
@aptwhatnow @tiresearch1 Same, I think all three of us are linking this to another well known APT on a different continent.
English
0
0
1
56
aptwhatnow
aptwhatnow@aptwhatnow·
@tiresearch1 any additional info on why theyre related to laz...i have a small piece saying it may be from another country but im curious
English
3
0
2
141
TI Research
TI Research@tiresearch1·
#Lazarus related: ushrt[.us home-continue[.online continue-meeting[.site drive-access[.site #APT
English
2
2
9
1.2K
J.A.
J.A.@Jalbrec4·
@tiresearch1 I think one of these may be APT42 instead, would be interested in chatting.
English
0
0
0
24
TI Research
TI Research@tiresearch1·
#Lazarus related: ovcloud[.online online-processing[.online meeting-online[.site #APT
English
1
2
25
2.2K
J.A.
J.A.@Jalbrec4·
@ThreatFabric Kudos to your research team and thank you for citing us! Very impressed with the connection to LightSpy, and this answered some questions I've had.
English
0
0
2
42
Lukas Stefanko
Lukas Stefanko@LukasStefanko·
Trojanized #Signal and #Telegram apps discovered on Google Play and Galaxy Store. Espionage malware belongs to BadBazaar family It is the first case of spying on victim’s Signal communication by secretly autolinking compromised device to attacker’s Signal welivesecurity.com/en/eset-resear…
Lukas Stefanko tweet media
English
3
66
98
23.3K
J.A.
J.A.@Jalbrec4·
@CyfirmaR @bellingcat performed the initial research on Bahamut, they're not an alias for the TA as stated in the article, just an FYI...
English
0
0
0
37
J.A.
J.A.@Jalbrec4·
@ViriBack Like @saridzawa2 said, it's Dendroid, a commodity malware. Looks like a small Naver focused campaign: shopnaver[.]online, navor[.]fun, navor[.]tech, etc. Only seeing Dendroid samples, no ties to Lazarus or Kimsuky that I can see besides Naver lures which isn't exclusive.
English
0
0
0
78
Dee
Dee@ViriBack·
unknown #apk C2 panel ? #malware 122.128.107.]243/cc/Panel/ MD5: a4a94ff3823d2300fb0295625f185273 any ideas ?
Dee tweet mediaDee tweet media
English
5
11
38
8.4K
J.A.
J.A.@Jalbrec4·
@PJ47596176 Bad look for a company founded with forced labor.
English
0
0
0
11
🇨🇦PJ⌨🏋🏻‍♂️🥃🗺🌻🔭🔬🇨🇦🇦🇺🇬🇧🇳🇿🇺🇲👀
VW operates a factory in Xinjiang – where China brutally oppresses the Uyghur minority. The group states that it has no evidence of human rights violations in the factory environment. Many fund companies doubt. 🇨🇦 just signed a large deal with VW!
Sense Hofstede@sehof

Unterdrückung in China: Investoren fordern Untersuchung von Volkswagen-Geschäften in Uiguren-Region – Der Spiegel spiegel.de/wirtschaft/unt…

English
1
0
3
963
J.A.
J.A.@Jalbrec4·
We released our public findings on #bouldspy last week @LookoutThreats. This malware was reported on in the news as ransomware called Daam, however we've confirmed that it's actually spyware used by FARAJA to target Iranians after they're arrested. lookout.com/blog/iranian-s…
English
0
0
0
182
J.A.
J.A.@Jalbrec4·
@CyfirmaR I believe you've incorrectly tied Bahamut to Iran in your investigation. Bahamut is a merc group, and though they've reused Iranian APT resources, there's research from Lookout, TrendMicro, PaloAlto, etc. that they're more closely tied to other APTs like Patchwork & Confucius.
English
0
0
0
77
J.A.
J.A.@Jalbrec4·
@virusbtn I'm not sure why they've defined Bahamut as an Iranian APT since they're widely considered to be hack-for-hire.
English
0
0
0
42
J.A.
J.A.@Jalbrec4·
#Stalkerware developers, such as the D3VL & ETECHD devs in England behind L3MON, should stop and think about where their #spyware ends up. Congratulations for being on the wrong side of history. #MahsaAmini
English
0
0
0
0