
Lawrence_Sec
441 posts

Lawrence_Sec
@Lawrence_Sec
🇬🇧 Threat Research @RecordedFuture https://t.co/yrwObzj7tS







What do Lenovo, Kingston, Shuttle Inc, and Palit Microsystems have in common? EV Certificates from these companies were issued and used by a Chinese crime group, #GoldenEyeDog (#APT-Q-27)! Thanks @malwrhunterteam and @g0njxa for your contributions 1/7




On my phone right now but everyone should start blocking this abusive ASN. AS Number 214472 Tons of abuse reported and staying online. Thank you security researchers for sending abuse towards @abuse_ch making this visible. Oh and of course it is a downstream from pfcloud.


Over the past 48 hours there have been some very interesting developments... The "@chartercomms" announcements for 47.1.0.0/16 and 47.2.0.0/16 have disappeared, implicitly confirming that they were hijacked. The "@Orange" announcement for AS41128 has changed - the path is now: 90.98.0.0/15 AS41128 AS22541 AS29802 AS41128: @orange 🇫🇷 AS22541: MEGALINK S.R.L.🇧🇴 AS29802: @HIVELOCITY 🇺🇸 The entire network has relocated from Chicago to Dallas (likely to the Prime Dallas Campus DFW01 datacenter). Once more the inclusion of a South-American ISP appears completely unrealistic, with the traffic between the AS29802 router (de-cix[.]dfw[.]hivelocity[.]net) and the final destination seemingly within the Dallas datacenter. But there's more....⬇️


NEW: Block one ASN, disrupt sixteen malware families. OMEGATECH (AS202412) — a three-month-old bulletproof hosting network with 18 /24 prefixes (4,608 IPs). One subnet alone hosts 67 C2 servers: Remcos (6,562 sightings), AsyncRAT (4,379), Amadey, Latrodectus, XWorm, Stealc, DCRat, LOBSHOT, Eye Pyramid, Mirai, Bashlite, Quasar, ClearFake, SectopRAT, SuperShell, SheetRAT. Seychelles .sc abuse contact. Pfcloud UG transit. Zero legitimate traffic. We recovered an Amadey credential stealer plugin (cred64.dll) targeting Chrome, Firefox, Outlook, Thunderbird, FileZilla, WinSCP, and Monero wallets. 3 YARA + 10 Suricata on GitHub. Full writeup: intel.breakglass.tech/post/omegatech… h/t @Fact_Finder03



Noticed Microsoft Defender tagging #TheVoidStealer as #WallStealer thanks to some recent @abuse_ch uploads. Here’s the threat actor nikoniko (aka “TheVoidStl”) discussing the removal of multiple detections, including WallStealer.









