Marcus Holloway

616 posts

Marcus Holloway

Marcus Holloway

@malwaremarcus

Katılım Mart 2018
168 Takip Edilen20 Takipçiler
Marcus Holloway retweetledi
S.🎧
S.🎧@1ssve·
I fucking DESPISE annual corporate self-review and goal setting. My goal is to get a paycheck every couple weeks
English
148
3K
34K
857.7K
Squiblydoo
Squiblydoo@SquiblydooBlog·
@malwaremarcus Ultimate goal is ransomware deployment, primarily against businesses. The malware is primarily a loader that will download a second stage with more remote access capability.
English
1
0
1
41
Squiblydoo
Squiblydoo@SquiblydooBlog·
Fake Microsoft Teams, "MTSetup_v15.3.7191.msi" signed by "Tryphena Lewis" 18c5b7a39be2f4a4b2fd45f0f273874f5efcc8751d4e592e5f2bcf6dbf781277 FUD-lite Uploaded to MalwareBazaar here https://bazaar.abuse[.]ch/sample/18c5b7a39be2f4a4b2fd45f0f273874f5efcc8751d4e592e5f2bcf6dbf781277
Squiblydoo tweet media
English
3
10
31
9.6K
Marcus Holloway
Marcus Holloway@malwaremarcus·
@SquiblydooBlog Thank you! By chance do you know the ultimate goal of the malware? Ex: was it just doing recon on the infected system?
English
1
0
0
20
Squiblydoo
Squiblydoo@SquiblydooBlog·
It is a malware I'm tracking as "LoremIpsumLoader", I've needed to write more but haven't. It seems the actor "Vanilla Tempest" (think Rhysida ransomware) moved from using OysterLoader to this new malware. It loads shellcode containing LoremIpsum text which is used to decode a deaddrop on the site letsdiskuss[.]com to get the C2 addresses it needs.
English
1
0
1
76
Marcus Holloway retweetledi
⚚Sage
⚚Sage@belikesagee·
Life between accepted new offer letter & joining date
English
199
4.9K
56.8K
2.4M
Marcus Holloway retweetledi
Squiblydoo
Squiblydoo@SquiblydooBlog·
AhnLabs reports seeing evidence of the campaign going back as far as October 2025. Thanks to folk who upload such files to MalwareBazaar, VT, and help report the certificates. Thanks @AhnLab_SecuInfo for publishing the analysis: asec.ahnlab.com/en/91995/ 2/2
English
0
3
3
1.1K
Matthew Hatfield
Matthew Hatfield@hatfieldsports·
Final in VHSL Region 6D Football Championship - Madison 26, Westfield 0 Justin Counts directs the Warhawks to a 6th straight regional title. His Madison squad becomes the first team to shut out Westfield in the playoffs in 15 years (Chantilly 7-0 in 2010).
English
1
4
7
2.8K
Marcus Holloway
Marcus Holloway@malwaremarcus·
@luke92881 I see! I’ll be on the lookout for it if you do! Seeing a lot more of it these days
English
0
0
0
109
Luke Acha
Luke Acha@luke92881·
@malwaremarcus Not sure yet, I see now that crystalpdf, convertmate, and maybe some others like powerdoc and easy2convert might be related as well.. a lot of infrastructure seems to be down now as well from what I can tell.
English
2
0
2
401
Squiblydoo
Squiblydoo@SquiblydooBlog·
@malwaremarcus I think they are trying to get people to use the password manager which stores passwords with a key known to the attacker, but I could be missing something else.
English
1
0
0
85
Squiblydoo
Squiblydoo@SquiblydooBlog·
Oh look who it is, "ZipThis" that everyone keeps pinging me about because of the code-signing signature. They recommend the same password extension as PDFSkills. (Visible in the anyrun analysis) app.any.run/tasks/af2ea981…
Squiblydoo tweet media
Squiblydoo@SquiblydooBlog

Fake PDF software recommended KeyGuard password manager, Per SecurityAnnex (@tuckner ), the password manager encrypts with the key "secret key 123". SecurityAnnex made this really easy to investigate. Please don't use free PDF software. 🧵

English
4
4
10
1.8K
Squiblydoo
Squiblydoo@SquiblydooBlog·
Amazing reflection on trojans from @struppigel . JustAskJacky was using a code-signing certificate we reported last week "App Interplace LLC", they were running a few other campaigns too: AskBettyHow, DailyChefly, GoCookMate, etc. JustAskJacky C2: api[.]vtqgo0729ilnmyxs9q[.]com
Squiblydoo tweet mediaSquiblydoo tweet media
Karsten Hahn@struppigel

🔍New Blog: JustAskJacky -- AI brings back classical trojan horse malware 🔗gdatasoftware.com/blog/2025/08/3… #GDATA @GDATA #GDATATechblog

English
1
9
34
6.9K
Phish Stix
Phish Stix@StixPhish·
@SquiblydooBlog @struppigel @InvokeReversing Similar activity from PDF themed apps turbofixpdf, effortlesspdf, and Manual Reader themed apps usermanualsonline, allmanualsreader, manualreaderpro, getmanualviewer, openmymanual. Node.exe launches malicious js files Many using same api.(RandomNumCharString).com format C2 URLs
English
3
1
3
805
Marcus Holloway retweetledi
whitehats
whitehats@wh1t3h4ts·
70 cybersecurity projects from beginners to experts
whitehats tweet media
English
22
310
1.9K
133.1K
Marcus Holloway retweetledi
Priyank Ahuja
Priyank Ahuja@ahuja_priyank·
The 30 most creative and iconic ads you've ever seen: 1. Mastercard
Priyank Ahuja tweet media
English
184
10.8K
109.2K
14.2M
Marcus Holloway retweetledi
Tom Dörr
Tom Dörr@tom_doerr·
"Virtual Machine for the Web"
Tom Dörr tweet media
English
44
545
6.6K
566.3K
Marcus Holloway retweetledi
CyberXTron Technologies
CyberXTron Technologies@CyberxtronTech·
🚨 Threat Campaign Alert - Fake Browser Updates Deliver BitRAT and Lumma Stealer🚨 Summary: Researcher identified fake browser updates distributing BitRAT and Lumma Stealer malware via malicious JavaScript on compromised webpages. Users were redirected to download a malicious ZIP archive containing PowerShell scripts and payloads, leading to device compromise, data theft, and cryptocurrency theft. The campaign utilized Discord’s CDN for hosting the malicious files and targeted victims with a combination of remote access tools and information-stealing malware. Threat Actor/Threat Group: Not mentioned. Malware: BitRAT, Lumma Stealer Targeted Countries: Not mentioned. Targeted Industries: Not mentioned. Targeted Applications/CVEs: Not Mentioned Impact: Data Breach, Device Compromise, Information Stealing IOC Ipaddr 77[.]221[.]151[.]31 Domain demonstationfukewko[.]shop tolerateilusidjukl[.]shop accountasifkwosov[.]shop liabilitynighstjsko[.]shop shortsvelventysjo[.]shop productivelookewr[.]shop alcojoldwograpciw[.]shop incredibleextedwj[.]shop shatterbreathepsw[.]shop MD5 Hash D2E9DE8671FD61605FF5F8B8F3249D6B,          6C7918C0440BE6BFAF9B83E365E00668, 147983884C533C294BF08CAEB2195EA7,                       0D3C23D986D7B1A1C54F2F5A34F79758 MITRE TTPs: T1071.001:Application Layer Protocol, T1105:Ingress Tool Transfer, T1113:Screen Capture, T1059.001: PowerShell, T1053.005:Visual Basic, T1547.001:Registry Run Keys / Startup Folder, T1562.001:Impair Defenses::Disable or Modify Tools, T1036.005:Masquerading::Match Legitimate Name or Location, T1218.010:System Binary Proxy Execution::cmstp, T1027:Obfuscated Files or Information Reference: This writing is based on Research Advisory Report published by ‘Esentire' Team. --------------------------------------------------------------------------------------- 🚀Join us on our mission to secure the digital world and make cyber defense affordable to everyone! 🌐 Follow "CyberXTron Technologies" for the timely, relevant and actionable cyber threat insights. #FakeBrowserUpdate #MalwareCampaign #BitRAT #LummaStealer #infosec #cyberXTron #uncovertheunknown🛡️🔒
CyberXTron Technologies tweet media
English
0
1
0
134
Marcus Holloway retweetledi
Mandiant (part of Google Cloud)
🚀 The Flare-On Challenge is officially wrapped up! This year, we had 5,324 participants, but only 275 made it to the finish line! Check out our blog post for the solutions, winner stats, and a shoutout to our challenge authors! bit.ly/4fvzfh8
Mandiant (part of Google Cloud) tweet media
English
0
74
210
19.4K