Calwarez

144 posts

Calwarez banner
Calwarez

Calwarez

@calwarez

Director for Malicious Infrastructure Discovery @ Recorded Future | Views my own

Katılım Kasım 2022
375 Takip Edilen188 Takipçiler
Calwarez retweetledi
Calwarez
Calwarez@calwarez·
Threat actors are increasingly abusing Legitimate Internet Services (LIS) like Cloudflare, Google Drive, and Telegram to hide in plain sight. It’s a structural challenge for every network defender. 5/6
English
1
1
1
51
Calwarez
Calwarez@calwarez·
🧵 ICYMI: We just dropped our 2025 Malicious Infrastructure Review! Some of the highlights below👇 #Infosec #CyberThreats 1/6
Calwarez tweet media
English
1
2
4
194
Calwarez retweetledi
Calwarez retweetledi
Modat
Modat@modat_magnify·
CVE-2026-25253  ⚠️ OpenClaw (Moltbot / Clawdbot) – 1-Click RCE via Token Exfiltration  A high-severity vulnerability (CVSS 8.8) has been disclosed in OpenClaw allowing remote code execution with a single click.  The flaw is a logic issue where the Control UI blindly trusts a gatewayUrl supplied via query string and auto-connects over WebSocket, leaking the stored gateway token to attacker-controlled infrastructure.  By abusing cross-site WebSocket hijacking and privileged operator scopes, attackers can disable safety approvals, escape the container, and execute arbitrary commands directly on the host even when the gateway is bound to localhost only.   Modat previously identified exposed Clawdbot/Moltbot control panels, with numbers now even higher. You can read the full blog here modat.io/post/moltbot-u…   Fixed in: v2026.1.29 
Action: Patch immediately and rotate gateway tokens.  Modat Magnify Query: 
web.title~"Clawdbot Control" OR web.title~"OpenClaw Control" OR web.title~"Moltbot Control"  The platform: 
magnify.modat.io  #threatintel #vulnerability #CVE202625253 #OpenClaw #Moltbot #Clawdbot #RCE #AIsecurity #infosec #ModatMagnify
English
2
3
9
1.3K
Calwarez retweetledi
Modat
Modat@modat_magnify·
New Modat Magnify updates are live.  • Time-based filtering  • Unified IP detail view   • Certificate validity filtering (expired, not yet valid, abnormal lifetimes)  • CN wildcard & partial matching  • Issuer Alternative Name (IAN) search  • Empty field search with field=""  • TLS version filtering  • Banner hex search  • New Tags: VPN and PQC over SSH    Built for faster, more precise infrastructure investigations. 
  Explore the new features inside the platform:  magnify.modat.io
Modat tweet media
English
0
2
2
1.1K
Calwarez retweetledi
Squiblydoo
Squiblydoo@SquiblydooBlog·
Use YARA for threat hunting? .@theidr0p created a tool for automated YARA rule creation based on the Cert Graveyard. Automatically checks for updates to the database and generates rules. The art is theirs. Amazing. See link in thread for details
Squiblydoo tweet media
English
1
8
44
2.6K
Calwarez retweetledi
Squiblydoo
Squiblydoo@SquiblydooBlog·
From 2020-2024, I tracked the SolarMarker malware, and in 2024, monitored a self-infection for months to learn their actions-on-objectives: on-device fraud. I didn't publish the details of my months long investigation until now. Check the link the the attached comment.
Squiblydoo tweet media
English
2
15
64
8.4K
Calwarez retweetledi
FBI Los Angeles
FBI Los Angeles@FBILosAngeles·
A Ukrainian national has been federally charged with participating in dozens of cyberattacks and computer intrusions against critical infrastructure and other victims around the world, in support of Russia’s geopolitical interests, the Justice Department announced today. The two indictments against Victoria Eduardovna Dubranova, 33, a.k.a. “Vika,” a.k.a. “Tory,” a.k.a. “SovaSonya,” were unsealed today in United States District Court in Los Angeles. Dubranova was extradited to the United States earlier this year on an indictment charging her for her actions supporting CyberArmyofRussia_Reborn (CARR). Dubranova was arraigned today on a second indictment charging her for her actions supporting NoName057(16) (NoName). Dubranova has pleaded not guilty in both cases. Dubranova pleaded not guilty today at her arraignment and a February 3, 2026 trial date was scheduled in that case. As described in the indictments, the Russian government backed CARR and NoName by providing, among other things, financial support. CARR used this financial support to access various cybercriminal services, including subscriptions to distributed denial of service-for-hire services. NoName was a state-sanctioned project administered in part by an information technology organization established by order of the President of Russia in October 2018 that developed, along with other co-conspirators, NoName’s proprietary distributed denial of service (DDoS) program. Details: justice.gov/usao-cdca/pr/j…
FBI Los Angeles tweet media
English
23
117
238
10K
Calwarez retweetledi
Modat
Modat@modat_magnify·
Cyber Monday Deal 
Get 6 months of Modat Magnify Pro for just €5 total (save €355).  Use code: MODAT2025CYBERMONDAY   
Try the platform. Run advanced queries. Find what others miss. 
 magnify.modat.io#CyberMonday #Cybersecurity #OSINT
Modat tweet media
English
0
3
4
969
Calwarez retweetledi
Lawrence_Sec
Lawrence_Sec@Lawrence_Sec·
1/ United States, Australia, and United Kingdom sanction Russian threat activity enabler Media Land (Yalishanda) and follow up on recent designations targeting Aeza. ofac.treasury.gov/recent-actions…
English
1
8
14
970
Calwarez retweetledi
Lawrence_Sec
Lawrence_Sec@Lawrence_Sec·
1/ [UPDATE] As of November 10, 2025, metaspinner net GmbH has provided substantial evidence confirming Insikt Group’s original assessment that their identity was unlawfully and fraudulently used in the registration of #AS209800.
Lawrence_Sec@Lawrence_Sec

1/ New report from myself and @_whoisnt : “Malicious Infrastructure Finds Stability with aurologic GmbH.” We uncover how German ISP aurologic GmbH has become a central nexus for high-risk hosting networks, sustaining large concentrations of malicious infrastructure.

English
2
2
5
363