
Michael Sudduth
6.5K posts

Michael Sudduth
@michael_sudduth
Christian | Soldier for Christ | Patriot | Security Awareness Leader | Insider Threats | OSINT | Memphis Tiger Basketball | Locksport | #2A




🚨 𝗨𝗽𝗱𝗮𝘁𝗲 𝗬𝗼𝘂𝗿 𝗗𝗲𝘁𝗲𝗰𝘁𝗶𝗼𝗻 𝗥𝘂𝗹𝗲𝘀: 𝗡𝗲𝘄 𝗥𝗲𝗺𝗼𝘁𝗲 𝗔𝗰𝗰𝗲𝘀𝘀 𝗧𝗿𝗼𝗷𝗮𝗻 We caught a Go-based RAT and named it #Moonrise. At the time of the analysis, the sample had not yet been submitted to VirusTotal ❗️ The level of access enables credential harvesting, sensitive data collection, and preparation for further compromise without triggering static detections, leaving SOCs with no clear signals to act on. ⚠️ Observed capabilities include: 🔹 Privilege-related functions and persistence mechanisms 🔹 Data theft and credential harvesting 🔹 Process control and command execution 🔹 File upload and execution 🔹 User activity monitoring: screen capture and streaming, webcam and microphone access, keystroke logging, clipboard monitoring One compromised endpoint can disrupt operations and lead to financial and reputational damage. 👾 See sample execution in a live analysis session: app.any.run/tasks/d3e5e733… ✅ Behavior-first triage in #ANYRUN Sandbox lets security teams confirm attacker actions, like remote command execution, UAC bypass attempts, and persistence-related activity, within minutes. Security teams reduce Tier-1 overload and unnecessary escalations, while containing incidents earlier. 👨💻 Equip your SOC with faster decisions and lower workload. See how #ANYRUN fits your workflows: any.run/enterprise/?ut… #ExploreWithANYRUN IOCs: 193[.]23[.]199[.]88 c7fd265b23b2255729eed688a211f8c3bd2192834c00e4959d1f17a0b697cd5e 8a422b8c4c6f9a183848f8d3d95ace69abb870549b593c080946eaed9e5457ad 7609c7ab10f9ecc08824db6e3c3fa5cbdd0dff2555276e216abe9eebfb80f59b Ed5471d42bef6b32253e9c1aba49b01b8282fd096ad0957abcf1a1e27e8f7551 082fdd964976afa6f9c5d8239f74990b24df3dfa0c95329c6e9f75d33681b9f4 8d7c1bbdb6a8bf074db7fc1185ffd59af0faffb08e0eb46a373c948147787268





Vinícius Perallis, CEO of Hacker Rangers, explains why gamification is a powerful tool for changing human behavior, and why so many initiatives fail. Using real-world cybersecurity programs, behavioral science, and comparative studies, he demonstrates gamification that actually works. Get your tickets today: hubs.la/Q0426wMt0























