
heapgrooming
989 posts



We took this further. Starting from the DGA domains you exposed via XLAB PDNS, we mapped the full UNC6691 infrastructure. 6 Cloudflare accounts for compartmentalization. DGA domains batch-registered Dec 11-13 via Gname.com Singapore. A custom DGA we couldn't crack with standard hash-based reconstruction. The takedown timing is the story: 4 of 5 DGA domains placed on serverHold March 5, 2026 — the same day CISA added 3 Coruna CVEs to KEV. One domain was spared (aidm8it5hf1jmtj.xyz, different registrar). Possibly a monitoring position. Watering holes still live: b27.icu ("7P.GAME" with TikTok ad pixel) and iphonex.mjdqw.cn ("Global Beauty Ranking"). Full analysis: intel.breakglass.tech/post/plasmagri…












🧑💼"Your Outlook has an issue. Let me help you fix it." @HuntressLabs Threat Hunting and Tactical Response teams join forces to open new pages on an old playbook, leading to custom Havoc agent deployment via sophisticated DLL side-loading. huntress.com/blog/fake-tech…

I don't understand why everyone is so obsessed with Claude and OpenClaw




Rapid7 dropped a write-up on the Notepad++ update-chain abuse and - finally - it comes with real IOCs - update.exe downloaded from 95.179.213[.]0 after notepad++.exe -> GUP.exe - file hashes for update.exe / log.dll / BluetoothService.exe / conf.c / libtcc.dll - network IOCs incl. api[.]skycloudcenter[.]com (-> 61.4.102[.]97), api[.]wiresguard[.]com, 59.110.7[.]32, 124.222.137[.]114 by @rapid7 rapid7.com/blog/post/tr-c…





