Cyber Analyzer

581 posts

Cyber Analyzer

Cyber Analyzer

@cyberanalyzer

Malware Analyst #CyberSecurity #Malware #ThreatIntel #Ransomware #OSINT #Phishing #Maldoc #DFIR #InfoSec

London, England Katılım Eylül 2017
3.5K Takip Edilen1.8K Takipçiler
Cyber Analyzer retweetledi
ZoomEye
ZoomEye@zoomeye_team·
🚨🚨CVE-2025-53772(CVSS 8.8): Critical RCE in Microsoft IIS WebDeploy! Authenticated attackers can exploit untrusted data deserialization via HTTP headers to execute code remotely. 🔥PoC: gist.github.com/hawktrace/6783… Search by vul.cve Filter👉vul.cve="CVE-2025-53772" ZoomEye Dork👉app="Microsoft Web Deploy" Over 20.8k vulnerable instances found. ZoomEye Link: zoomeye.ai/searchResult?q… In-depth analysis from @hawktrace: hawktrace.com/blog/cve-2025-… Refer: hub.zoomeye.ai/detail/68b7dbb… #RCE #ZoomEye #cybersecurity #infosec #OSINT
ZoomEye tweet media
HawkTrace@hawktrace

Details on the critical RCE vulnerability we discovered in Microsoft Web Deploy CVE-2025-53772. hawktrace.com/blog/cve-2025-… #iiswebdeploy #infosec #webdeploy #iis #cve-2025-53772

English
0
94
252
24.6K
Cyber Analyzer retweetledi
ANY.RUN
ANY.RUN@anyrun_app·
🚨 WinRAR CVE-2025-8088: The invisible persistence SOCs can’t afford to miss Attackers are abusing Alternate Data Streams (ADS) to perform path traversal during archive extraction. By appending colon symbol (:) in file names, they sneak hidden objects into system folders without showing anything in the #WinRAR UI. This vulnerability is dangerous for organizations as the malicious files remain invisible in WinRAR’s interface and many security tools. Employees believe the archive is safe, while persistence is silently installed and activated on reboot. 📂 In one observed case inside ANY.RUN Sandbox: Genotyping_Results_B57_Positive.pdf:.\..\..\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Display Settings.lnk ➡️ Places a .lnk in Startup that executes %LOCALAPPDATA%\ApbxHelper.exe after reboot. ➡️ Result: remote code execution and long-term persistence. 🔗 See full analysis of this CVE, download actionable report, and collect ready-to-use IOCs to speed up investigations and cut response time: app.any.run/tasks/34dcc9a8… 🎯 Who should pay attention Any organization using WinRAR in daily workflows. The threat is especially dangerous for teams exchanging archives via email or shared folders. ❌ Key risks for organizations: 🔹Attacks go unnoticed → hidden files don’t appear in WinRAR or many tools 🔹Analysts lose time → archives look clean but require extra checks 🔹Persistence survives reboot → malware runs automatically once restarted #ANYRUN exposes hidden ADS-based persistence techniques that traditional tools miss, enabling faster decision-making, more effective threat hunting, and reduced investigation costs. 💡 Next steps for orgs: 1️⃣ Patch WinRAR → 7.13 2️⃣ Detonate suspect archives in #ANYRUN → reveal hidden NTFS ADS files + export IOCs 3️⃣ Use TI Lookup to track campaigns and enrich IOCs with live attack data from 15k orgs 🔎 Query 1 – Startup file creation via WinRAR: intelligence.any.run/analysis/looku… 🔎 Query 2 – All CVE-2025-8088 samples: intelligence.any.run/analysis/looku… #IOCs: SHA256: a99903938bf242ea6465865117561ba950bd12a82f41b8eeae108f4f3d74b5d1 Genotyping_Results_B57_Positive.pdf a25d011e2d8e9288de74d78aba4c9412a0ad8b321253ef1122451d2a3d176efa Display Settings.lnk 8082956ace8b016ae8ce16e4a777fe347c7f80f8a576a6f935f9d636a30204e7 ApbxHelper.exe Code Signing Certificate: SN: FE9A606686B3A19941B37A0FC2788644 Thumb: 1EE92AC61F78AAB49AECDDB42D678B521A64EA01 Issuer: Simon Gork 🚀 Detonate malicious archives, uncover hidden ADS files, and export IOCs with #ANYRUN, giving your #SOC full visibility, stronger coverage, and faster response against hidden threats. #ExploreWithANYRUN
ANY.RUN tweet mediaANY.RUN tweet media
English
0
69
205
18.8K
Cyber Analyzer retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 A fake npm package just hijacked crypto wallets. “nodejs-smtp” disguised itself as the legit nodemailer library—while secretly injecting code into Atomic & Exodus apps to steal BTC, ETH, USDT, XRP, and SOL. Full story → thehackernews.com/2025/09/malici…
English
4
61
210
82.1K
Cyber Analyzer retweetledi
APIVoid
APIVoid@apivoid·
🚀 The new Tools page is LIVE! 🎉 With 100+ free online security tools, we've got everything about IP/domain analysis, data extraction, image EXIF, URL tools—your security needs, all in one place! ➡️ bit.ly/3HStZJi #infosec #cybersecurity #saas
APIVoid tweet media
English
0
2
3
211
Cyber Analyzer retweetledi
WitherOrNot
WitherOrNot@witherornot1337·
Improved bypass for Windows 11 OOBE: 1. Shift-F10 2. start ms-cxh:localonly Only required on Home and Pro editions.
English
111
1.5K
8.7K
726.6K
Cyber Analyzer retweetledi
Shanholo
Shanholo@ShanHolo·
🚨#Opendir #Malware🚨 hxxp://172.245.123.24/530/ hxxp://172.245.123.24/380/ ⚠️#FormBook #Stealer ☣️cosses.exe➡️c338c9cdccb21a6f023987865b4a6269 📦#AutoIt 📡hxxp://www.temecula.deals/📸⤵️ 📡hxxp://www.agistaking.xyz
Shanholo tweet mediaShanholo tweet mediaShanholo tweet media
Shanholo@ShanHolo

🧵2 🪂 @censysio possible pivot point 🔥🔥 (not services.tls.certificates.leaf_data.issuer.common_name:"DESKTOP-E4F55FE") and "DESKTOP-E4F55FE"

HT
1
4
11
1.8K
Cyber Analyzer retweetledi
YungBinary
YungBinary@YungBinary·
We have entered into a new era that renders MFA useless thanks to phishing kits like #Sneaky2FA which are designed to bypass MFA and provide threat actors with access to victim Office 365 accounts via session cookies. Check out the blog post here for more information and additional safeguards to protect your O365 users: esentire.com/blog/your-mfa-… The figure below shows how the phishing kit exfils the 2FA code from the victim 🐟
YungBinary tweet media
English
0
21
92
6.9K
Cyber Analyzer
Cyber Analyzer@cyberanalyzer·
Active #phishing URL used to receive <form> data from pages hosted at ebsau4[.]s3[.]amazonaws[.]com: hxxps://aeriscargo[.]com/wp-admin/js/widgets/widgets/widgets/widgets/push/validate[.]php | HTTP/1.1 200 OK #cybersecurity #infosec #spam
English
0
0
0
62
Cyber Analyzer retweetledi
Yogesh Londhe
Yogesh Londhe@suyog41·
Sidewinder list of 25 officers.docx 8a4ee0e5267e1393f576aa3732c33d15 C2 pubad-gov-lk[.]net-src[.]info #Sidewinder #APT #IOC
Yogesh Londhe tweet media
English
0
6
18
4.2K
Cyber Analyzer retweetledi
ESET Research
ESET Research@ESETresearch·
#ESETresearch reveals the first Linux UEFI bootkit, Bootkitty. It disables kernel signature verification and preloads two ELFs unknown during our analysis. Also discovered, a possibly related unsigned LKM – both were uploaded to VT early this month. welivesecurity.com/en/eset-resear… 1/5
English
2
164
309
35.1K
Cyber Analyzer retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 Cybercriminals are ramping up attacks this season, hiding malware in emails and QR codes. It’s a perfect storm for multi-stage attacks—don’t let your guard down. Learn how to spot these hidden threats: thehackernews.com/2024/11/latest… #cybersecurity
English
4
48
109
46.6K
Cyber Analyzer retweetledi
Yogesh Londhe
Yogesh Londhe@suyog41·
Ducktail C2 ceipvirgendeloreto[.]one Advertising Specialist - Job Description (730).rar f35ddad58eb8da489f60cb4ec65183b6f4f8dbb0ed91a3d87b6db29c2feaa5d8 #Ducktail #IOC
Yogesh Londhe tweet media
English
0
4
10
1.3K