MalasadaTech

368 posts

MalasadaTech banner
MalasadaTech

MalasadaTech

@MalasadaTech

ALOJAHZ WORLD! HOBBYIST THRUNTELLISEARCHER. VIEWS ARE MY OWN! 808 https://t.co/5AFyJj7uay

ON-ISLAND Katılım Ağustos 2025
271 Takip Edilen111 Takipçiler
MalasadaTech
MalasadaTech@MalasadaTech·
This was the lead. I tried to find the activity Malwarebytes was talking about. I couldn't find that one, but ended up with this one. Here's the link to the Malwarebytes article. malwarebytes.com/blog/threat-in…
English
0
0
0
52
MalasadaTech
MalasadaTech@MalasadaTech·
Google Meet-themed lure delivering Datto RMM googgle[.]click >> hxxps://store-na-phx-3.gofile[.]io/download/direct/e5dcdce3-d78a-46d0-8c02-a0fbd2a21bcd/GoogleMeet.exe Pulse link: otx.alienvault.com/pulse/69ad01b3…
MalasadaTech tweet mediaMalasadaTech tweet mediaMalasadaTech tweet mediaMalasadaTech tweet media
English
1
0
3
439
MalasadaTech retweetledi
Malwarebytes
Malwarebytes@Malwarebytes·
A fake Zoom meeting site mimics a video call, then uses an “Update Available” countdown to automatically download a malicious installer onto Windows machines—no permission required. bit.ly/4qXyLp7
English
10
41
92
8.7K
MalasadaTech retweetledi
MalasadaTech
MalasadaTech@MalasadaTech·
They sent my mom a smish, so I'm sharing their infra. Not sure if they're all on 47.245.93[.]160, but there's a lot of Hawaii subdomains on it. 1,007 domains created this month. You can use the pattern in the snip w/Silent Push. AlienVault Pulse here: otx.alienvault.com/pulse/69a3a0ad…
MalasadaTech tweet mediaMalasadaTech tweet mediaMalasadaTech tweet mediaMalasadaTech tweet media
English
0
3
22
2.6K
Gootloader
Gootloader@Gootloader·
Anyone have a good way to monitor new @GoogleAds for a specific domain?
English
2
1
2
511
MalasadaTech retweetledi
KB4ThreatLabs
KB4ThreatLabs@Kb4Threatlabs·
🚨Tax Season is Phishing Season: How IRS Lures are Dropping RMM Backdoors In our last report blog.knowbe4.com/the-skeleton-k… we highlighted how threat actors weaponized Social Security notifications to deploy RMM tools. Now, they’ve pivoted to the next seasonal hook: IRS and Tax Document Verification. It’s a classic example of how social engineering adapts to the calendar. When the lure matches the season, the "Human Risk" sky-rockets. The "Skeleton Key" Tactic Attackers are shifting from custom malware to legitimate Remote Monitoring and Management (RMM) tools. By exploiting the urgency of tax season, they trick users into "verifying" documents, which instead installs a persistent backdoor using signed, trusted software. What we’re seeing: The Hook: Emails masquerading as IRS tax refund alerts or document verification requests. The Payload: Deployment of RMM tools like ScreenConnect, Simplehelp remote access. The Goal: Establishing "low-friction" remote access that blends into normal IT traffic. 🛡️ IOCs TO MONITOR AND BLOCK: hxxps://zippyokwidth[.]mypi[.]co/ woodcareexpert[.]com hxxps://clickme.thryv[.]com/ hxxps://www[.]zikomarket[.]com/bootstrapp/54321[.]html lrs.gov-information959439494242us[.]com lrs.gov-information[.]app Digitalseosociety[.]com coxomail[.]com Email Subject Pattern: Your tax document is ready-Doc ID: xxxx New Mandatory Policy: Immediate Upload of Employee W-2 Forms xxx #CyberSecurity #Phishing #ThreatIntelligence #KnowBe4 #HumanRisk #TaxScams #IRS #RMM
KB4ThreatLabs tweet mediaKB4ThreatLabs tweet mediaKB4ThreatLabs tweet media
English
0
7
9
384
MalasadaTech retweetledi
Luke Acha
Luke Acha@luke92881·
@MalasadaTech kingsearchresults..... hmmmmm
Luke Acha tweet media
English
0
2
2
201
MalasadaTech retweetledi
Luke Acha
Luke Acha@luke92881·
@MalasadaTech also has same URI structures and talks to pdfappup[.]com and starrtlightspirit[.]com
English
0
2
3
161
MalasadaTech retweetledi
Luke Acha
Luke Acha@luke92881·
@MalasadaTech Rust based, the embedded PE file is pdfium.dll. app.any.run/tasks/b71ca08e… HTTP comms to hopinpoint[.]com. Some custom encoded traffic here that I have not played with yet.
Luke Acha tweet media
English
1
3
5
261
MalasadaTech retweetledi
Squiblydoo
Squiblydoo@SquiblydooBlog·
@rifteyy @skocherhan Thanks! Certificate has been reported. In regards to funny certificates, my favorite signer has been "Just Add Water Italian Pizza Bread Pasta Mix Ltd." ea18b965ab43d927a1d690f395f4e2b55a15db9744f68454a86b5508b302c404 The payload was a fake Adobe installer.
English
1
2
7
331
MalasadaTech retweetledi
Gi7w0rm
Gi7w0rm@Gi7w0rm·
Popular Text Editor Notepad++ was compromised by a nation state attacker presumably from June through December 2, 2025. The state actor used the access to reroute software update traffic to attacker controlled servers making this a supply chain attack. notepad-plus-plus.org/news/hijacked-…
English
15
71
431
167K
MalasadaTech retweetledi
Luke Acha
Luke Acha@luke92881·
@MalasadaTech this relation in virustotal (b7e3b66d28429c07714bb0b8e9487bc9) suggests another browser search hijacker
English
0
1
2
120
MalasadaTech
MalasadaTech@MalasadaTech·
@luke92881 Nice! Looks like YAPA. Thanks for the tag! Unfortunately I will not be able to look into it =[ I'm studying for the CCNP Security cert...
English
0
0
3
83
MalasadaTech retweetledi
Luke Acha
Luke Acha@luke92881·
@MalasadaTech YAPA... Galacticpdf (97e814385de850e7dbc934e2c8cdce46).
Español
5
2
7
284
MalasadaTech retweetledi
Squiblydoo
Squiblydoo@SquiblydooBlog·
Thorough analysis of AnyPDF malware by @rifteyy The code-signing certificate has been reported for revocation; was signed by "Lupus Tech Limited" and added to TheCertGraveyard.
Squiblydoo tweet media
rifteyy@rifteyy

This is anyPDF - a popular application that over 5000 people downloaded on MajorGeeks, available at Softpedia and their own website hxxps://anypdf.com anyPDF is a highly evasive and fully undetected AdClicker Trojan with ability to connect to C2 server. rifteyy.org/report/anypdf-…

English
2
13
28
3.7K
MalasadaTech retweetledi
KB4ThreatLabs
KB4ThreatLabs@Kb4Threatlabs·
🚨 PHISH ALERT: When Legitimate Software Becomes First-Stage Payload: The RMM Problem" KnowBe4 ThreatLabs tracking sophisticated campaign weaponizing Social Security notifications to deploy RMM tools (SimpleHelp Remote Access Client) as persistent backdoors. No traditional malware. Just trusted IT software. 🧵👇 🎯 ATTACK CHAIN: Fake SSA email ("Statement Ready") → Social_Security_eStatement__Pdf.exe → Legitimate RMM agent install → Pre-configured attacker access → Bypass AV/EDR entirely 🔴 CRITICAL SHIFT: RMM exploitation is now a "first-stage" payload standard across threat actors—from scammers to APTs. Why? Because: ✓ Digitally signed = trusted ✓ Legitimate software = no AV flags ✓ "ClickFix" social engineering = user executes willingly 🚩 DETECTION INDICATORS: 📧 Subject Pattern: "Social Security Statement" + urgency 📎 Filename: Social_Security_eStatement_*_Pdf.exe ⚠️ Executable masquerading as PDF 🔧 Unexpected RMM tool installation 🛡️ IOCs TO MONITOR AND BLOCK: Sender Email: “info@nsgrafica[.]ao” “safetraining@infinity47[.]ro” URLs: h_ps://microninfo[.]com/wp-admin/red-6578423[.]php/?[email] h_ps://api[.]ssstik[.]net/red-6256923[.]php/?[email] h_ps://tradebazaarenterprise[.]com/wp-content/red-6552123[.]php/?[email] h_ps://nbfoodcentre[.]com/wp-content/red-52489625[.]php/?[email] h_ps://www[.]misbookrights[.]com/wp-includes/sitemaps/FHB3yr6tg[.]php/?[email] h_ps://adronestates[.]com/mzxlkoe/Ugmj4t8t432[.]php/?[email] h_ps://armaheat[.]com/wp-includes/HFB73gfa[.]php/?[email] h_ps://capitalguidex[.]com/clzresw/HFB73gfa[.]php/?[email] h_ps://dars360[.]com/wp-content/red-6226923[.]php/?[email] h_ps://greeninovation[.]com/sin1fpk/HFB73gfa[.]php/?[email] h_ps://kim88game[.]com/wp-includes/red-525684625[.]php/?[email] h_ps://login[.]suffrenalawnservice[.]com/red-6294423[.]php/?[email] h_ps://moonageajans[.]com/lckifvz/HFB73gfa[.]php/?[email] h_ps://preprod[.]conversionprollp[.]com/wp-content/Ugmj4t8t432[.]php/?[email] h_ps://test1[.]thanglon[.]com/wp-includes/sitemaps/Ugmj4t8t432[.]php/?[email] h_ps://thetoysharing[.]com/wp-includes/FHB3yr6tg[.]php/?[email] h_ps://wordpress[.]spepchurch[.]org/red-6289923[.]php/?[email] h_ps://social-security-update[.]codconnect[.]com #Phishing #RMM #ThreatIntel #SSAScam #CyberSecurity #InfoSec
KB4ThreatLabs tweet mediaKB4ThreatLabs tweet mediaKB4ThreatLabs tweet mediaKB4ThreatLabs tweet media
English
0
7
9
691