f0wL retweetledi
f0wL
854 posts

f0wL retweetledi


@jamieantisocial @_mattata I agree with Remy. One additional nuance: Removing traces of Exfil makes it harder for IR folks to determine ad-hoc which and how much data was taken. Most orgs don’t have Zeek or Sysmon data to refer to. This may influence the victim orgs decision whether to pay (👎) or not.
English

@NexusFuzzy Cool trick, thanks for sharing 🙂
chloe 🐇@SapphoSys
going to the .DS_Store anyone want anything
English

I found a what I think novel approach which allowed me to list some of the content of #Lumma #Infostealer Command & Control servers with the help of left behind .DS_Store files. Blog, tool and Lumma files can be found here nexusfuzzy.medium.com/lumma-stealer-…



English

@evstykas Dang, that sucks :( With your track record and this title, I would find it hard to pass up.
Might be a good fit for the @CYBERWARCON CFP? 👀
English

@d4rksystem @vxunderground Unfortunately no :( Would have loved to go, but it didn’t work out this year.
English
f0wL retweetledi

☑️#ClickFix / Fake Captchas posing as Cloudflare Verification pages
We stumbled upon a web page that closely resembles Cloudfare's Anti-DoS Verification pages. Upon clicking the verification button, the familiar ClickFix verification dialogue is presented.
1/7🧵
GIF
English


@aejleslie @RecordedFuture Nicely done, additional coverage on these ops is urgently needed
English

🇷🇺 🇩🇪 - New @RecordedFuture report! This report examines malign influence operations linked to Russia and Russia-based actors (e.g. Doppelgänger, Operation Overload, CopyCop, Operation Undercut) ahead of the upcoming German elections.
Blog: recordedfuture.com/research/stimm…

English
f0wL retweetledi

🚨Malware distributed via Steam
Fancy a bit of after work gaming? Beware of infostealer malware distributed via the Steam store!
Using @steamdb we managed to visually identify a very suspicious file in the game files. Luckily, we managed to retrieve a sample for analysis, which will follow in this thread.

SteamDB@SteamDB
A game called PirateFi released on Steam last week and it contained malware. Valve have removed the game two days ago. Users that played the game have received the following email:
English

During the initial meeting with a customer on an IR case, if they mention they don’t know the threat actor’s entry vector, ask if they own an Ivanti device. If they ask why, simply tell them they’ll find out soon. While it’s not guaranteed that this is the actual entry vector, they’ll be impressed if your guess turns out to be correct.
CISA Cyber@CISACyber
#Ivanti released security updates to address CVE-2025-0282—being actively exploited—and CVE-2025-0283, affecting Connect Secure, Policy Secure, and ZTA Gateways. See our Alert for mitigation guidance to help reduce your exposure: bit.ly/4fYrMqQ
English
f0wL retweetledi















