Lawrence_Sec

441 posts

Lawrence_Sec banner
Lawrence_Sec

Lawrence_Sec

@Lawrence_Sec

🇬🇧 Threat Research @RecordedFuture https://t.co/yrwObzj7tS

United Kingdom Katılım Eylül 2018
544 Takip Edilen215 Takipçiler
Lawrence_Sec retweetledi
Binding Hook
Binding Hook@bindinghook·
In their latest for Binding Hook, Joyce Hakmeh & Harriet Moynihan investigate what it actually takes to close the #CyberProxy accountability gap & laid out strategies for holding users of cyber proxies accountable. Read the full article: bindinghook.com/strategic-cohe…
English
0
2
3
153
Lawrence_Sec retweetledi
Spamhaus
Spamhaus@spamhaus·
Another day, another 🇬🇧 UK-based shell corporation utilized for nefarious purposes: UFO TECHNOLOGIES LIMITED, registered to the pictured address in Ipswich (which houses a co-working space) in February. Its director, 🇷🇺 Russian national Lenar I. Davletshin, is no stranger to cybercrime investigators; related internet infrastructure and corporate entities have repeatedly been linked to bulletproof hosting. Particularly noteworthy is "Bearhost", a related, long-standing service offering, which shut down on May 9, 2025. ⤵️
Spamhaus tweet media
English
1
13
41
6.7K
Lawrence_Sec retweetledi
Squiblydoo
Squiblydoo@SquiblydooBlog·
We didn't know how an actor was using EV Certificates issued to Lenovo and others. We now do. From DigiCert's incident report: "the threat actor used a compromised analyst endpoint to access DigiCert's internal support portal. The threat actor used a limited function within the customer-support portal which allows authenticated DigiCert support analysts to access customer accounts from the customer's perspective to facilitate support tasks. The threat actor was able to use this function to access initialization codes for orders that were approved but pending delivery for EV Code Signing certificate orders across a finite set of customer accounts." "Possession of the initialization code, combined with an approved order, is functionally sufficient to generate and retrieve the corresponding certificate." The full report can be found here and explains the incident in great detail: bugzilla.mozilla.org/show_bug.cgi?i… The report mentions "Where we got lucky: A community member involved in security research reported the evolving pattern of misused certificates and engaged in dialogue with our support team. Without that report, the undetected compromise of ENDPOINT2 and the associated mis-issuance might have remained undiscovered for a longer period." Special thanks goes to the regular contributors to the Cert Graveyard; @g0njxa , @malwrhunterteam , and others. Also special thanks to DigiCert: this report has a high level of transparency, which is warranted, and also well executed.
Squiblydoo@SquiblydooBlog

What do Lenovo, Kingston, Shuttle Inc, and Palit Microsystems have in common? EV Certificates from these companies were issued and used by a Chinese crime group, #GoldenEyeDog (#APT-Q-27)! Thanks @malwrhunterteam and @g0njxa for your contributions 1/7

English
4
105
473
91K
Lawrence_Sec
Lawrence_Sec@Lawrence_Sec·
Typically, "Daniel" has LIR status in @ripencc, allowing continuous cycles of abuse.
English
0
0
0
122
Lawrence_Sec
Lawrence_Sec@Lawrence_Sec·
Both the sponsoring organization and the maintainers reference Daniel Mishayev, the individual known for setting up numerous PFCloud fronts, including RAILNET LLC, which was linked to the prolific threat activity enabler Virtualine Technologies.
Lawrence_Sec tweet media
English
2
0
2
121
Lawrence_Sec
Lawrence_Sec@Lawrence_Sec·
@RecordedFuture are also seeing high levels of abuse from this AS. AS214472 updated in March to STORMSHIELD, a supposed “infrastructure holding company” with hosting services at stormcloud[.]pw
Lawrence_Sec tweet mediaLawrence_Sec tweet media
Fox_threatintel@banthisguy9349

On my phone right now but everyone should start blocking this abusive ASN. AS Number 214472 Tons of abuse reported and staying online. Thank you security researchers for sending abuse towards @abuse_ch making this visible. Oh and of course it is a downstream from pfcloud.

English
1
1
4
307
Lawrence_Sec retweetledi
Spamhaus
Spamhaus@spamhaus·
Earlier this week @orange announced new routes taking precedence over its hijacked path, forcing the bad actors to withdraw the route: 90.98.0.0/15 AS41128 AS22541 AS29802 Bad actors (WITHDRAWN) 90.98.0.0/16 AS3215 AS5511 Orange 🇫🇷 90.99.0.0/16 AS3215 AS5511 Orange 🇫🇷 (see post from @DougMadory x.com/DougMadory/sta…) Meanwhile, the @VerizonBusiness hijacks out of AS29802 remain active. And, we’ve observed an additional suspicious route ⤵️⤵️
Spamhaus@spamhaus

Over the past 48 hours there have been some very interesting developments... The "@chartercomms" announcements for 47.1.0.0/16 and 47.2.0.0/16 have disappeared, implicitly confirming that they were hijacked. The "@Orange" announcement for AS41128 has changed - the path is now: 90.98.0.0/15 AS41128 AS22541 AS29802 AS41128: @orange 🇫🇷 AS22541: MEGALINK S.R.L.🇧🇴 AS29802: @HIVELOCITY 🇺🇸 The entire network has relocated from Chicago to Dallas (likely to the Prime Dallas Campus DFW01 datacenter). Once more the inclusion of a South-American ISP appears completely unrealistic, with the traffic between the AS29802 router (de-cix[.]dfw[.]hivelocity[.]net) and the final destination seemingly within the Dallas datacenter. But there's more....⬇️

English
2
7
15
6.3K
Lawrence_Sec retweetledi
Max Bernhard | @mxbernhard.bsky.social
New: We looked into the large-scale phishing campaign that's targeting Signal users and found digital evidence pointing to Russian involvement – and a connection to previous attacks in Ukraine and Moldova.
Max Bernhard | @mxbernhard.bsky.social tweet media
English
6
81
183
20K
Lawrence_Sec retweetledi
Calwarez
Calwarez@calwarez·
🧵 ICYMI: We just dropped our 2025 Malicious Infrastructure Review! Some of the highlights below👇 #Infosec #CyberThreats 1/6
Calwarez tweet media
English
1
2
4
194
Lawrence_Sec
Lawrence_Sec@Lawrence_Sec·
7/ Bottom line: focusing on TAE networks whose sole purpose is hosting malicious infrastructure gives clear, actionable insights, allowing defenders to more effectively mitigate cyber threats.
English
1
1
2
147
Lawrence_Sec
Lawrence_Sec@Lawrence_Sec·
1/ @RecordedFuture 's annual malicious infrastructure report has finally dropped! This year, we took a different approach to how we analyze malicious infrastructure👇
English
1
5
11
543
Lawrence_Sec
Lawrence_Sec@Lawrence_Sec·
6/ Approximately 70% of the highest-risk TAEs observed by Insikt Group relied on German ISP #aurologic GmbH for upstream transit, most notably of which was the internationally sanctioned #Aeza
English
0
0
0
82
Lawrence_Sec
Lawrence_Sec@Lawrence_Sec·
5/ Virtualine enabled a plethora of threats throughout 2025, most notably malware families such as #Latrodectus #AsyncRAT #DcRAT and many, many more!
Lawrence_Sec tweet media
English
2
3
5
415