L², PhD

1.8K posts

L², PhD banner
L², PhD

L², PhD

@L_Lgde

DFIR, CTI & Malware Researcher | Head of CSIRT — ex-ANSSI Focus: Chinese APTs, Russia-linked actors, cybercrime | PhD (International Law)

EIP Katılım Haziran 2021
3.2K Takip Edilen842 Takipçiler
Sabitlenmiş Tweet
L², PhD
L², PhD@L_Lgde·
New write-up: OPSEC on a budget — what BADAUDIO reveals about APT24. Quick-win evasion: stack-strings, API name hiding, workers.]dev infrastructure, and encrypted+Base64 host/config data tucked into HTTP headers. (Report link in reply)
L², PhD tweet media
English
1
3
11
1.6K
L², PhD retweetledi
CrowdStrike
CrowdStrike@CrowdStrike·
🚨 Breaking: On March 31, 2026, a threat actor used stolen maintainer credentials to compromise the widely used HTTP client library Axios Node Package Manager (npm) package and deploy platform-specific ZshBucket variants. CrowdStrike Counter Adversary Operations attributes this activity to STARDUST CHOLLIMA with moderate confidence based on the adversary’s deployment of updated variants of ZshBucket and overlaps with known STARDUST CHOLLIMA infrastructure. Read the full analysis on our blog: crwdstr.ke/6011B6oOwB
CrowdStrike tweet media
English
3
40
104
12K
L², PhD retweetledi
DefSecSentinel
DefSecSentinel@DefSecSentinel·
🧵 The axios @npmjs compromise dropped a @macOS backdoor that closely mirrors North Korea's (@DPRK) recent WAVESHAPER backdoor. Let's take a quick look the full intrusion:
English
13
117
435
76.6K
L², PhD retweetledi
Curtis
Curtis@cybershtuff·
Infrastructure pivots have identified a high-confidence link to DPRK-nexus activity (#TA444). The #Axios C2 shares a unique ETag with 23.254.167[.]216 also hosted on Hostwinds AS54290. This specific IP is a documented artifact of the "JustJoin" campaigns from @Huntio.
English
3
16
47
5.4K
L², PhD retweetledi
John Hultquist
John Hultquist@JohnHultquist·
We are still looking at the axios supply chain compromise, but we’ve attributed it to UNC1069, a suspected DPRK actor, who we covered in a blog this February. They are financially-motivated and historically DPRK uses these incidents to target crypto. cloud.google.com/blog/topics/th…
English
9
123
336
35.5K
L², PhD retweetledi
Alex. Turing
Alex. Turing@TuringAlex·
🚨#APT41 Just spotted a fresh #Winnti #ELF backdoor f1403192ad7a762c235d670e13b703c3— 0 detections on VT and packed with VMProtect. 📸One of the #C2 "ai.qianxing[.]co" is clearly impersonating our company’s domain. They’re getting bold.🤣#IOC Happy hunting 🍷@Xlab_qax
Alex. Turing tweet mediaAlex. Turing tweet mediaAlex. Turing tweet media
English
1
30
124
15.8K
L², PhD retweetledi
Abdullah
Abdullah@0x3oBAD·
I have analyzed a Mustang Panda #PlugX variant (2026-03-17). The analysis revealing : • Thread pool injection via RtlRegisterWait • Multi-stage in-memory loader • C2 extraction & setup Full technical write-up below, enjoy reading😉 0x3obad.github.io/posts/plugx-wr… #MustangPanda #APT
Abdullah tweet mediaAbdullah tweet media
English
3
23
99
5.9K
L², PhD retweetledi
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
🤓 Recently, I created MoltThreats the first open source threat feed for AI agents. Through the MoltThreats Skill, your AI agent can connect to the feed and poll it daily or weekly. Once connected, your agent can automatically report any threats it detects. Every reported threat is reviewed and approved by a human. All connected agents receive real time updates from the feed and can act immediately. Check it out! Threats targeting AI agents are reported daily! 👉 promptintel.novahunting.ai/molt
Thomas Roccia 🤘 tweet media
English
7
14
58
5.1K
L², PhD retweetledi
Aaron Jornet
Aaron Jornet@RexorVc0·
🚨 Big news: New TH Book 🏹 After years in Threat Hunting, I wrote the book I always wanted when I started. The Art of Threat Hunting, practical, technical, no fluff. ⚡Hypothesis generation, queries & adaptation stuff, CTI-driven programs, documentation, team alignment. The full lifecycle. 🦖Full breakdown on the blog: rexorvc0.com 🔗Available on Amazon: amazon.com/Art-Threat-Hun… #ThreatHunting #BlueTeam #Cybersecurity #Research #CTI #Malware #threat
Aaron Jornet tweet media
English
11
70
318
16.6K
L², PhD retweetledi
ESET Research
ESET Research@ESETresearch·
#ESETresearch detected a recent intrusion at a 🇵🇱University of Warsaw consistent with #Interlock ransomware gang. Thanks to early warning from our experts and the university's swift cooperation, the attack was disrupted before encryptors could be deployed. eset.com/pl/about/newsr… 1/7
English
1
24
86
8.1K
L², PhD retweetledi
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿@_EthicalChaos_·
For all the malware analysts out there, how often do you see more advanced tradecraft out there utilizing memory execution techniques like reflective loading, BOF execution, etc... used outside of simulated attack scenarios?
English
11
12
85
10.6K
L², PhD retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🛑 ALERT - Trivy, a popular open-source vulnerability scanner, was compromised after attackers hijacked 75 version tags in #GitHub Actions to deliver an infostealer. It ran in CI pipelines, stealing creds and tokens, then exfiltrating data or staging it via stolen GitHub PATs. 🔗 Attack flow, impacted versions, fixes → thehackernews.com/2026/03/trivy-…
The Hacker News tweet media
English
11
161
505
122.6K
L², PhD retweetledi
Shanholo
Shanholo@ShanHolo·
Another day, another actor turning “credential collection” into a full-time personality 😅 Just uncovered a #Stealer in the wild. More than 10k websites spreading ⤵️ 1⃣Initial url: hxxps://cn-mxtq-whatsapp.hl.cn/ 2⃣Drops➡️ 06235783b0bccc9498eabff14450cc66 only 5 hits on VT 🤔
Shanholo tweet media
English
3
6
22
1.8K
L², PhD retweetledi
Kostas
Kostas@Kostastsale·
I love when people say “LLMs don’t write good code”. Do you think you write better, more maintainable, bug-free code than your AI? Even though I still write a lot of the code, I can promise you I could never consistently write code as clean as what my AI can produce… but I can review the hell out of it a lot faster 😂
English
17
2
60
10.4K
L², PhD
L², PhD@L_Lgde·
@notChojin Hey @notChojin, thanks a lot, that's very interesting :). I'll keep diging on recent samples to get a better understanding of the victimology associated with this campaign !
English
0
0
1
41
RamenMan
RamenMan@notChojin·
@L_Lgde Thanks for sharing the new IoCs! The decoy stands out — unlike the usual APT conference invites or docs, they're using a Nepal-specific CIAA document, which is quite unique. It also seems very likely to be a genuine stolen one.
English
1
0
1
78
L², PhD
L², PhD@L_Lgde·
🚨 PlugX / Korplug MSI sample abusing a legitimate signed G DATA Avk.exe for DLL sideloading. Malicious Avk.dll decrypts XOR-encoded AVKTray.dat and reflectively loads PlugX in memory. The lure suggests Nepal targeting, and the sample aligns with the Lab52-reported activity through the same drop, sideload, and payload decryption chain. Confirmed C2: carhirechicago[.]com:443 SHA256: 9e7bb2f6b5a7e79b14b4e0e10a97518592071ebbe196452cfc75addca0496381 #CTI #ThreatIntel #PlugX #DFIR
L², PhD tweet media
English
2
6
42
2.3K