Chamindu Pushpika

101 posts

Chamindu Pushpika banner
Chamindu Pushpika

Chamindu Pushpika

@chamindu_x

Security Researcher | DFIR | CSEH

Katılım Aralık 2022
210 Takip Edilen50 Takipçiler
Namecheap.com
Namecheap.com@Namecheap·
@chamindu_x Hello! It seems the domain name reported is neither registered nor hosted with us.
English
1
0
0
122
inversecos
inversecos@inversecos·
NEW LAB: NavalTech Defense Contractor ⚓ We emulated a North Korean (DPRK) cyber espionage campaign targeting a submarine contractor’s vessel-tracking systems. Based on CISA’s reporting on DPRK operations to advance military and nuclear programs. Contributors @django88_ @svch0st @XintraOrg Solve it here 👇 xintra.org
inversecos tweet mediainversecos tweet media
English
5
27
166
14.2K
Chamindu Pushpika retweetledi
Hunt.io
Hunt.io@Huntio·
💡 𝗛𝗼𝘄 𝘁𝗼 𝗙𝗶𝗻𝗱 𝗢𝗽𝗲𝗻 𝗗𝗶𝗿𝗲𝗰𝘁𝗼𝗿𝗶𝗲𝘀: 𝗣𝗼𝗿𝘁𝗮𝗹𝘀 𝗳𝗼𝗿 𝗧𝗵𝗿𝗲𝗮𝘁 𝗜𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲 hunt.io/glossary/how-t… From a defensive standpoint, open directories represent both a risk and an opportunity. They are often overlooked yet incredibly informative sources of threat intelligence. Misconfigured directories can leak sensitive material that attackers can later exploit, but they also provide threat hunters with a rich source of real artifacts and infrastructure clues when searching for malicious activity. What makes open directories especially valuable is the variety of materials they expose: • DDoS scripts • PowerShell scripts • Custom malware and malicious browser extensions • Backdoors and exploits • .bash_history files • Banking trojans • And much more! For proactive defenders, open directories are an opportunity to understand adversary behavior and intercept attacks earlier than traditional detection would allow. Read more on how to find and approach open directories ⬇️ #CyberSecurity #ThreatHunting #OpenDirectories #ThreatIntel
English
0
1
12
915
P4nd3m1cb0y
P4nd3m1cb0y@P4nd3m1cb0y·
[1/3]🇨🇳#VoidLinkC2 The initial IP address published by @_CPResearch_ in their blog was crucial for #pivoting to a new C2 address. By using @censysio, we can spot those #C2 based on the HTTP headers Www-Authenticate: Basic realm="VoidLink C2", charset=UTF-8" 🔥 159.75.233\.200
P4nd3m1cb0y tweet mediaP4nd3m1cb0y tweet media
The Hacker News@TheHackersNews

Researchers disclosed VoidLink, a modular Linux malware built for long-term, stealthy cloud access. It detects AWS, Azure, GCP, Docker, and Kubernetes, adapts its behavior, steals credentials, and enables lateral movement using rootkit-style techniques 🧩 🔗 Read here → thehackernews.com/2026/01/new-ad…

English
3
16
61
10.7K
Chamindu Pushpika retweetledi
Group-IB Threat Intelligence
Group-IB Threat Intelligence@GroupIB_TI·
Our latest threat research report is live: UNC2891: ATM Threats Never Die. Since 2022, Group-IB specialists have been tracking this low-profile, financially motivated group targeting financial institutions, compromising infrastructure to execute coordinated ATM cash-outs. Key Highlights: 🔹Ongoing, Silent Threats: Maintained undetected access for years (earliest compromise traced to 2017) across dozens of hosts, including critical ATM switching servers and production servers. 🔹Persistence and Stealth through Advanced Malware: Deployed a bespoke malware arsenal including CAKETAP (a rootkit for HSM manipulation), SLAPSTICK (PAM backdoor with a "magical password"), and LOGBLEACH/MIGLOGCLEANER (log wipers) to evade detection. 🔹Long-Term Compromise & Innovative Infiltration: Physically planted a Raspberry Pi inside a bank's network connected to an ATM switch using a 4G modem for remote access to bypass defenses entirely. 🔹Undocumented Attack Vectors: Leveraged tools like iodine (DNS tunneling) and OpenVPN for covert command-and-control and stealthy lateral movement. 🔹Money Mule Operations: The group ran sophisticated money mule recruitment operations, often via Google ads or Telegram. Mules received cloned card equipment and instructions over TeamViewer. Attackers guided them step-by-step to insert cloned cards into ATMs, enabling large-scale cash-out operations while distancing themselves from direct exposure. This report provides the full kill chain, detailed TTPs, and malware analysis. ATM threats haven’t disappeared; they have evolved into a more sophisticated and stealthy danger. Download the full report to understand how to defend against them: link.group-ib.com/4pm0DmK #CyberSecurity #ThreatIntelligence #ATMThreats #MalwareAnalysis #FinancialSecurity #InfoSec
Group-IB Threat Intelligence tweet media
English
0
10
26
4.2K
Chamindu Pushpika retweetledi
blackorbird
blackorbird@blackorbird·
#ATM Hacking Group UNC2891 Technical Summary: Core Tools / Malware ArsenalCAKETAP → Solaris/Linux kernel rootkit, hooks ATM → HSM traffic, modifies ARQC/ARPC in real time SLAPSTICK → PAM backdoor + per-server unique "magic password" (SSH passwordless login even if keys changed) TINYSHELL → Tiny (~30 KB) asynchronous backdoor, multi-stage chaining STEELCORGI → Custom packer/encryptor (same keys reused across unrelated victims 2022–2024) SUN4ME (2024 new) → All-in-one post-exploitation tool (scanner, brute, SSH brute/private key stealer, proxy, log wiper, exploit modules) WINGHOOK / WINGCRACK → Unix keylogger + offline decoder MIGLOGCLEANER / LOGBLEACH → Professional log eraser (auth.log, wtmp, utmp, lastlog, shell history) iodine / OpenVPN → C2 tunneling github.com/blackorbird/AP…
blackorbird tweet mediablackorbird tweet mediablackorbird tweet mediablackorbird tweet media
English
0
55
203
21.6K
Smukx.E
Smukx.E@5mukx·
@chamindu_x I think it's not like that. When you have EDRs or XDRs installed. It takes a time gap between 1-2 sec. Telemetry in action... 🐁 Sometimes it doesn't even execute if you have a popular slcodes like Havoc shellcodes. Sometimes it will get caught in behaviour based detections.
English
1
0
2
336
Smukx.E
Smukx.E@5mukx·
ShellExec using msgbox.exe => in my C2 Facility. Bypassing EDR's. a cool new way = ) Actually tg is just an sample, you can use calendar, teams or whatever that can communicate with apis. to uplaod & exec your custom agents !
Smukx.E tweet media
English
7
41
279
18.3K
Chamindu Pushpika retweetledi
I am Jakoby
I am Jakoby@I_Am_Jakoby·
Added a new tool to: powershellforhackers.com/tools/revshell/ ⚠️Please Use Responsibly⚠️ You can use this to instantly generate an obfuscated reverse shell in powershell that i have personally used to beat EVERY single EDR out there right now. I've added some pretty cool stuff to my website but this is one of my favorite additions. 🛑 Disclaimer: This tool is for educational and authorized security testing only. Misuse could be illegal. Don’t be dumb. Shoutout to the only ones that were actually able to stop it, using something called "ring fencing" @ThreatLocker This is not a sponsored post, just a fan of them #Edr_Is_Not_Enough
I am Jakoby tweet media
English
65
392
2.1K
154.8K
Chamindu Pushpika retweetledi
andrew danis
andrew danis@andrewdanis·
@Unit42_Intel We observed exploitation as early as 07-17, from IP's 103.186.30[.]186 and 107.191.58[.]76. You can detect this behavior from the IIS process w3wp.exe spawning child processes, at least in our instance.
English
1
4
16
3K
Chamindu Pushpika retweetledi
Mandiant (part of Google Cloud)
UNC3944 (Scattered Spider) activity is reportedly rising across global industries, including retail. Act now to stay ahead ⚠️ Learn more: goo.gle/4esbM0Q
English
1
39
79
8.3K
XINTRA
XINTRA@XintraOrg·
New write-ups on our APT Labs 😍 Council of Tropical Affairs Mustang Panda Walkthrough by @chamindu_x cham1ndux.github.io/posts/Mustand-…… Abu Jibal Lab APT34/OilRig Walkthrough @QhtSec/xintra-abu-jibal-lab-walkthrough-10342ec55f78" target="_blank" rel="nofollow noopener">medium.com/@QhtSec/xintra…
XINTRA tweet mediaXINTRA tweet media
English
2
15
73
4.2K
Chamindu Pushpika retweetledi
Alberto Segura
Alberto Segura@alberto__segura·
🚨#Android #Malware Fake Chat app is sending SMSs, photos, contacts to a Telegram's chat using the bots API 🤖 Distribution: https://vanos.pages[.]dev/assets/Vanos-Messenger.apk Hash: 170abe43fb6f31f601f2493e40b64bb20171e0bc0cae6b88802d0c4faf1c5f3c Trying Matkap it looks like someone just got infected..
Alberto Segura tweet mediaAlberto Segura tweet mediaAlberto Segura tweet mediaAlberto Segura tweet media
English
0
22
134
9.3K