Arda Büyükkaya

3.9K posts

Arda Büyükkaya banner
Arda Büyükkaya

Arda Büyükkaya

@WhichbufferArda

Cyber Threat Intelligence Analyst at Rabobank | Threat Hunter | Malware Analyst |. (All opinions expressed here are mine only). 🇳🇱

The Netherlands Katılım Nisan 2022
1.5K Takip Edilen4.9K Takipçiler
Arda Büyükkaya retweetledi
Austin Larsen
Austin Larsen@AustinLarsen_·
🚨 New from our team at Google Threat Intelligence Group: "Welcome to BlackFile: Inside a Vishing Extortion Operation" #UNC6671 is one of the most prolific and underreported cybercrime actors of 2026, targeting dozens of orgs across the US, Canada, Australia, and the UK. 🧵
Austin Larsen tweet media
English
1
20
59
6.3K
Arda Büyükkaya retweetledi
s1r1us (mohan)
s1r1us (mohan)@S1r1u5_·
seems twitter missed the ExploitBench paper? few observations: we finally got good data on Mythos security capabilities and it's very impressive. Mythos got full exploit chain on 18/41 v8 n-days, while gpt 5.5 only got 1 and open source models are mostly useless.
s1r1us (mohan) tweet media
English
16
58
488
78.1K
Arda Büyükkaya retweetledi
Ragıp Soylu
Ragıp Soylu@ragipsoylu·
Here we go again. Last time it was the Saudis. I wonder who is that now? Guys i’m not that important believe me.
Ragıp Soylu tweet media
English
17
39
499
46.4K
Arda Büyükkaya retweetledi
Renzon
Renzon@r3nzsec·
I worked with @RussianPanda9xx and @TheDFIRReport to investigate and publish this flash alert. The trojanized payloads (disguised as legitimate tools like Greenshot, SyncTrayzor, DocFX, and Cake) established primary C2 channels through ClickHouse and Supabase, with secondary backup channels capable of dynamically falling back to Ably, Dropbox, direct HTTP, or even GitHub Issues. This campaign ultimately delivered The Gentleman Ransomware, with aggressive data exfiltration via Rclone and lateral movement using GoTo Resolve RMM. Read the flash report below ⬇️ #dfir #tuktukc2 #etherRAT
The DFIR Report@TheDFIRReport

Flash Alert: EtherRat and TukTuk C2 End in The Gentleman Ransomware In April, we observed an intrusion that began with a malicious MSI masquerading as Sysinternals RAMMap and ended in domain-wide deployment of The Gentlemen ransomware. The intrusion featured EtherRAT, Ethereum-based EtherHiding C2 configuration, TryCloudflare tunnels, GoTo Resolve, Rclone exfiltration to Wasabi, and a newer malware framework named TukTuk. TukTuk stood out for its resilient C2 design, using SaaS and cloud platforms such as ClickHouse and Supabase, with support for Ably, Dropbox, GitHub Issues, direct HTTP, Slack, and Arweave-based dead-drop configuration retrieval. Detection opportunities included! ➡️ Full report is linked in the replies. #ThreatIntel #ThreatHunting #DigitalForensics

English
0
26
116
21.1K
Arda Büyükkaya retweetledi
Arda Büyükkaya retweetledi
Joe Weisenthal
Joe Weisenthal@TheStalwart·
The FT says that Amazon employees are doing random unnecessary task automations to consume tokens and to show their bosses that they're using AI more ft.com/content/8ee0d3…
English
236
651
6.7K
2.6M
Arda Büyükkaya retweetledi
Zhenpeng (Leo) Lin
Zhenpeng (Leo) Lin@Markak_·
NGINX rift: We autonomously discovered this 18 yr old heap overflow (CVE-2026-42945) in @nginx impacting version 0.6.27 to 1.30.0. If you use rewrite and set directive, you maybe impacted! Please update your NGINX or change the config to mitigate it. Read more at depthfirst.com/nginx-rift
English
23
297
1.1K
195.9K
Arda Büyükkaya retweetledi
p3bt3b
p3bt3b@p3bt3b·
Device code phishing is on rise. #Kali365, #EvilTokens, and now #Tycoon2FA New TRU+ out: operators moved to Alibaba ASN(Apr 10) and started devicecode (Apr 17). Blocks 230 vendors😆after takedown that includes ChatGPT, Perplexity, VPNs, Proxy and more esentire.com/blog/tycoon-2f…
p3bt3b tweet media
English
0
18
55
5.1K
Arda Büyükkaya retweetledi
Moshe Siman Tov Bustan
During the Shai-Hulud malware analysis, we found that the Python version contains a check if the target machine is from Israel or Iran - if so, it plays Russian roulette - randomly picking a number from 1 to 6, and if 2 is chosen - it starts a horrible siren sound on max volume, and removes all files on the machine.
Moshe Siman Tov Bustan tweet media
English
6
37
256
23.7K
Arda Büyükkaya retweetledi
Virus Bulletin
Virus Bulletin@virusbtn·
📣 The VB2026 programme is live! Three days. Many voices. One Seville. 🇪🇸 Explore the sessions, speakers and ideas shaping this year’s event, and start planning your VB2026 experience. 📍 Seville, Spain 📅 14–16 October 2026 View the full programme 👉 virusbulletin.com/conference/vb2…
Virus Bulletin tweet media
English
0
7
13
1.4K
Arda Büyükkaya retweetledi
Rami McCarthy
Rami McCarthy@ramimacisabird·
We'll be right back with your regularly scheduled TeamPCP programming, but while you wait ... wiz.io/blog/fragnesia…
Rami McCarthy tweet media
English
3
10
43
4K
Arda Büyükkaya retweetledi
Ariel Jungheit
Ariel Jungheit@ArielJT·
New report revisiting Gamaredon, this time focusing on their phishing emails and first stage downloaders - GammaDrop and GammaLoad. Despite years of active campaigns, detailed public analysis of either has been lacking. So we fixed that. 1/5
English
2
9
27
4.3K
Arda Büyükkaya retweetledi
Sergey Nazarov
Sergey Nazarov@sergeynazarovx·
We used to go to a special website, ask strangers for help with programming, and get humiliated in return
Sergey Nazarov tweet media
English
303
3.5K
39.5K
855.7K
Arda Büyükkaya retweetledi
winterknife 🌻
winterknife 🌻@_winterknife_·
Is it just me, or does anyone else think that the BitLocker bypass dubbed "YellowKey" is mostly a nothingburger? I mean if you are really serious about data encryption at rest, why wouldn't you use BitLocker with a TPM + PIN to unlock, like Microsoft recommends you do?
English
3
2
8
2.2K
Arda Büyükkaya retweetledi
Artem Tamoian
Artem Tamoian@artemtam·
В марте хакеры ФСБ провели рассылку писем со ссылкой, переход по которой мог привести к полной компрометации устройства. Я был первый, кто обратил внимание на эти письма, проанализировал их, а также отобрал у ФСБ их домен. Тред с подробностями и советами:
Artem Tamoian tweet media
Русский
22
164
934
115K
Arda Büyükkaya retweetledi
vx-underground
vx-underground@vxunderground·
TanStack was hit by a supply chain attack. MistralAI was hit by a supply chain attack. The Mayor of Arcadia, California, was a Chinese spy. Forza Horizon 6 leaked. Canvas bamboozled. Shai-Hulud open-sourced. Nightmare-Eclipse teases two new Windows 0days. It is Tuesday. What will happen on Wednesday? Find out on the next action packed episode of Dragon Ball Z
vx-underground tweet media
English
42
213
2.1K
59.5K
Arda Büyükkaya retweetledi
Zack Korman
Zack Korman@ZackKorman·
Calling this a LOLLM (Living Off the LLM)
Zack Korman tweet media
English
15
38
262
21.3K
Arda Büyükkaya retweetledi
Nextron Research ⚡️
Nextron Research ⚡️@nextronresearch·
Following the initial report from @wiz_io on compromised MistralAI packages, our artifact‑scanning pipeline has identified additional Shai Hulud–infected NPM artifacts: mistralai/mistralai-gcp v1.7.3 mistraliai/mistralai-azure v1.7.3 These packages are used for direct cloud deployments, and should be considered compromised as part of the ongoing Mini Shai-Hulud supply-chain campaign. Until the situation is resolved, we recommend treating all recent mistralai releases with caution and reviewing any CI/CD systems where these versions may have been installed. THOR APT Scanner already provides coverage for the currently known Shai Hulud–infected Mistral AI NPM and PyPI artifacts. related: wiz.io/blog/mini-shai… github.com/mistralai/clie…
Nextron Research ⚡️ tweet mediaNextron Research ⚡️ tweet media
English
1
21
43
4.9K