James Northey

11 posts

James Northey banner
James Northey

James Northey

@darkrym11

SOC Analyst @HuntressLabs | Malware junkie | AI Glazer - Always curious, always learning!

Australia Katılım Haziran 2025
98 Takip Edilen220 Takipçiler
Sabitlenmiş Tweet
James Northey
James Northey@darkrym11·
For those who want to go step-by-step and actually learn the reversing process, I’ve written a walkthrough that starts beginner-friendly and ramps up into advanced malware RE: 👉 links.darkrym.com/pxa
English
0
2
8
1.1K
James Northey
James Northey@darkrym11·
Got to work on this with the legend @_JohnHammond. A user asked Codex to fix suspicious behaviour on their machine. Codex "solved" it, but the cryptominer kept running. Plus: How Gen-AI noise is complicating investigations and how SOCs need to evolve. huntress.com/blog/codex-par…
English
1
9
35
31.9K
James Northey
James Northey@darkrym11·
Found some very common adware quietly killing antivirus products. Then we found an unregistered update domain, and anyone with $10 could have pushed any payload to 25,000+ endpoints, AV already disabled. So we registered it first. huntress.com/blog/pups-grow… Big thanks to @_rdowd
English
3
56
236
55.9K
James Northey
James Northey@darkrym11·
Investigated a very interesting attack at @HuntressLabs . Where the threat actors weaponised a slew of legitimate tools (Velociraptor, VS Code, and Cloudflared) to establish persistent access, culminating in Warlock ransomware. Check out the full technical breakdown!
Lindsey O’Donnell Welch@LindseyOD123

Second part of a two-part @HuntressLabs blog series is here, which looks at several incidents where the threat actor used the Velociraptor DFIR tool - featuring ToolShell, Warlock ransomware, and a series of attacker fumbles. @darkrym11 huntress.com/blog/velocirap…

English
0
1
4
778
James Northey retweetledi
Ben
Ben@polygonben·
My first @HuntressLabs blog is live: we break down some funky ClickFix lures that lead to a loader which uses steganography to extract shellcode and ultimately deliver LummaC2/Rhadamanyths stealers. Big thanks to @RussianPanda9xx for the help! 😇 huntress.com/blog/clickfix-…
Ben tweet media
English
7
60
231
29.6K
James Northey
James Northey@darkrym11·
@netresec I actually found my sample back in may - a few days before it showed up on VT, just took me a while to figure out the PureRAT stage, actually your blog help me identify it so thanks! virustotal.com/gui/file/a3963…
English
1
0
2
52
𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲
@darkrym11 The sample analyzed by plainbit might actually be slightly older than the one you looked at. Their blog post was published back in August and their analysis starts off with an email received on June 13 (see screenshot).
𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲 tweet media
English
1
0
0
34
James Northey
James Northey@darkrym11·
@netresec @netresec yeah thats the same C2 server and final stage I found, interestingly I didn't observe Clipbanker, although my sample was from earlier in the year. Appears these guys are evolving fast!
English
1
0
1
187
James Northey
James Northey@darkrym11·
In a recent investigation @HuntressLabs we uncovered how attackers used LFI for log-poisoning with an AntSword Shell to drop Nezha and then Ghost RAT. Big shoutout to @CyberRaiju and @birchb0y learnt heaps from them while working this one.
Max Rogers@MaxRogers5

1⃣ The @Huntress team uncovered a campaign by a likely China-nexus threat actor. The most novel finding is use of a publicly available tool called Nezha as a post-exploitation C2 agent. This is the first public reporting of the tool I've seen. huntress.com/blog/nezha-chi…

English
0
3
16
1.7K
James Northey
James Northey@darkrym11·
@polygonben Thanks, Ben! I thought this was gonna be a quick write-up on some Python malware, but then I hit the .NET stages and took a whole lot longer.
English
0
0
1
69
James Northey
James Northey@darkrym11·
For those who want to go step-by-step and actually learn the reversing process, I’ve written a walkthrough that starts beginner-friendly and ramps up into advanced malware RE: 👉 links.darkrym.com/pxa
English
0
2
8
1.1K
James Northey
James Northey@darkrym11·
I found a sample of PXA Stealer @HuntressLabs, which wasn’t quite right. After a lot of analysis, I discovered it was loading PureRAT, a commercially available, modular backdoor focused on surveillance of the Victim. huntress.com/blog/purerat-t…
English
1
7
20
1.4K