Cryptolaemus

23.5K posts

Cryptolaemus banner
Cryptolaemus

Cryptolaemus

@Cryptolaemus1

Where are mealybugs now!?! We is hungry and no one wants to play anymore. Where everyone at?

Katılım Kasım 2018
206 Takip Edilen19.9K Takipçiler
Sabitlenmiş Tweet
Cryptolaemus
Cryptolaemus@Cryptolaemus1·
Results of a wonderful partnership among LEA across the world to make it a better place! We have come far since this all started eating mealybugs(Emotet).🙂We are thankful for this partnership and to play a role in this to make a difference. We are a bit hungry though now... 🤔
English
0
9
29
7.8K
Cryptolaemus retweetledi
Yogesh Londhe
Yogesh Londhe@suyog41·
Odyssey Stealer c52291b86ac04d671c1c27c3afa70d17 C2 213.209.159.175 Interesting string related to ChatGPT , Junk / Webpage leftovers ? #OdysseyStealer #Stealer #MAC #IOC
Yogesh Londhe tweet media
English
2
10
28
4.4K
Cryptolaemus retweetledi
rekdt
rekdt@rekdt·
After getting fired from ungrateful AWS after outage where my job was to vibecode all the DNS entries to IPv6, happy to announce it's my 1st day at Azure Azure recognizes the value of vibecoding IPv6 DNS and I just force pushed my first 1m entries Now off to grab some coffee
English
130
443
6.6K
197.8K
Devman
Devman@Inifintyink·
Hear me out, a locker written in bash - that would be quite cool.
English
4
0
10
2.4K
Cryptolaemus retweetledi
The Shadowserver Foundation
The Shadowserver Foundation@Shadowserver·
We have shared a Special Report on IPs infected with Latrodectus malware during 2025-04-26 to 2025-05-20. This is one of the results of the continued international Law Enforcement action called Operation Endgame Season 2.0 Over 44K infected IPs seen: dashboard.shadowserver.org/statistics/com…
The Shadowserver Foundation tweet media
English
1
17
46
11.5K
Cryptolaemus retweetledi
Yogesh Londhe
Yogesh Londhe@suyog41·
Octalyn Stealer 31a11e53ebee97b9add3d6a7567f7d16 Telegram: https://t[.]me/ZeroTraceD3V YouTube: https://www[.]youtube[.]com/watch?v=TN9yas3uqr0 GitHub: https://github[.]com/luis22d/Octalyn-Stealer-C-Telegram #Octalyn #Stealer #IOC
Yogesh Londhe tweet mediaYogesh Londhe tweet mediaYogesh Londhe tweet media
English
0
6
26
8.2K
Cryptolaemus retweetledi
Germán Fernández
Germán Fernández@1ZRR4H·
#Bumblebee from nir-soft[.]org (x.com/1ZRR4H/status/…). Botnet: grp0005 C2: 188.40.187.152 (although not flagged by any AV, the IP has been linked to Bumblebee campaigns since approximately April 2024). Bumblebee has been used in ransomware attacks. @malwrhunterteam
Germán Fernández tweet mediaGermán Fernández tweet mediaGermán Fernández tweet media
Squiblydoo@SquiblydooBlog

New Bumblebee 🐝 Signed "LLC Vector" not to be confused with the other certificate signer with the exact name signing malware out of St. Petersburg Uploaded to malwareBazzar by @1ZRR4H Trojanized Network Watcher installer bazaar.abuse.ch/sample/bd4a1d1… tria.ge/250529-nkcp2s1…

English
2
23
59
14K
Cryptolaemus retweetledi
Squiblydoo
Squiblydoo@SquiblydooBlog·
Probably the best #ZhongStealer decoy yet. 59af8a487068c555ea22393b0233cb65 Sent to user disguised as an image. "2020505268988jpg.pif" #Signed with EV Certificate "运城市盐湖区风颜商贸有限公司" 🔗🧵
Squiblydoo tweet media
中文
1
5
15
4.9K
Cryptolaemus retweetledi
ܛܔܔܔܛܔܛܔܛ
ܛܔܔܔܛܔܛܔܛ@skocherhan·
77[.]83[.]207[.]89 AS216341 OPTIMA LLC 🇭🇰 godblessyou[.]world blessyoumother[.]world wheremylifestreet[.]cloud clientforbigbug[.]cloud sunriseopen[.]com #NetSupportRAT @anyrun_app @abuse_ch
ܛܔܔܔܛܔܛܔܛ tweet media
English
4
3
10
3.6K
Cryptolaemus retweetledi
vxdb
vxdb@vxdb·
AvCheck[.]net has been seized by law enforcement. AVCheck was used by criminals to test whether their malware is detected by commercial antivirus software before its ready to be used in the wild. Similar to something like VirusTotal. This takedown is apart of Operation Endgame.
vxdb tweet media
English
30
120
819
67.1K
Cryptolaemus retweetledi
GangExposed
GangExposed@GangExposed·
1/ First comes Stern. Then Tramp (aka Trump). And then the rest. These are the people behind Conti, Trickbot, Black Basta. Their anonymity ends now. 🧵👇
English
1
2
8
10.6K
Cryptolaemus retweetledi
GangExposed
GangExposed@GangExposed·
💥EXPOSED: We uncovered the Professor behind Conti Ransomware! Dossier, flights, docs, leaks. 🔗Full evidence here: justpaste.it/ilpg5 💰 $10M bounty on the line — and we're burning another $10M to take them down. Share now! #Conti #Trickbot #Cybersecurity
GangExposed tweet mediaGangExposed tweet mediaGangExposed tweet media
English
3
4
17
7.6K
Cryptolaemus retweetledi
GangExposed
GangExposed@GangExposed·
💥 The Reveal: Stern’s New Face Remember when I promised to reveal the new face of the Conti leader after his plastic surgery? The time has come. 📄 Updated Dossier: justpaste.it/ilesl Stern thought changing his appearance would keep him safe. Turns out, it wasn’t enough. The exposure continues. Stay tuned for more updates. #Ransomware #Conti #Trickbot
GangExposed tweet mediaGangExposed tweet mediaGangExposed tweet mediaGangExposed tweet media
GangExposed@GangExposed

3/ 🚨 Here’s his face. For years, he operated from the shadows — leading extortion campaigns, moving crypto, funding new fronts. No more shadows.

English
3
5
25
11K