Oste

10.2K posts

Oste banner
Oste

Oste

@oste_ke

ᴄʏʙᴇʀꜱᴇᴄᴜʀɪᴛʏ | ᴅꜰɪʀ 🛡️. ᴄᴛꜰ ᴘʟᴀʏᴇʀ @fr334aksmini | ꜰᴏᴜɴᴅɪɴɢ ʙᴏᴀʀᴅ ᴍᴇᴍʙᴇʀ @hih_community | #OpenSource ᴛɪɴᴋᴇʀᴇʀ | 𝕏 |

127.0.0.1 Katılım Mart 2020
5.9K Takip Edilen6.6K Takipçiler
Sabitlenmiş Tweet
Oste
Oste@oste_ke·
Comparison is the thief of joy. Practice Gratitude, Set Personal Goals, Celebrate Small Wins 😎💪
English
0
0
1
180
Oste retweetledi
Oste retweetledi
Giuseppe `N3mes1s`
Giuseppe `N3mes1s`@N3mes1s·
Thread: Deep analysis of the axios npm supply chain compromise All 5 payloads downloaded from VT, reversed in an isolated VM. Full report + detection rules: gist.github.com/N3mes1s/0c0fc7… What's in the gist (8 files): 1. Verified Threat Intel Report (all hashes VT-confirmed) 2. Full RE of every payload (source code recovered for all 3 RATs) 3. C2 protocol specification (complete JSON schema, state machine) 4. 8 YARA rules (tested, 100% detection) 5. 8 Sigma rules (Win/Mac/Linux) 6. 11 Suricata/Snort IDS rules (including Base64 beacon patterns) 7. Machine-readable IOC bundle (JSON, 14 SHA256 + network + MITRE) 8. Extension.SubRoutine research (see below) Novel findings not in any vendor report: - Extension.SubRoutine.Run2() — the .NET process injection DLL is completely undocumented. Zero results across all public sources. Custom-built injector, not from any known tool. - Linux RAT (ld.py, 0/76 detection) has a bug — peinject command references undefined variable b64_string. Binary injection crashes on Linux. - macOS RAT has zero hardcoded IPs/domains. C2 is runtime-only via argv[1]. Compiled with SDK 26.2.0 (latest Xcode). Build UUID: c848257813983360905d7ad0f7e5e3f5. - C2 server confirmed as Express.js via URLScan X-Powered-By header. - packages.npm.org in the POST body is not an npm URL — it's the National Association of Pastoral Musicians. Designed to look legit in network logs. - Hostwinds AS54290 has confirmed Lazarus infrastructure in the same /18 subnet (Hunt.io research). - macOS RAT classified as NukeSped by 4 AV engines. JA3 fingerprint 773906b0... mimics Safari 15.5 — nation-state TLS tradecraft. - All 3 RATs share identical 4-command protocol: kill, peinject, runscript, rundir with status codes "Wow"/"Zzz". - Zenbox memory dump (47MB) downloaded and analyzed — 12 PE files extracted. Extension.SubRoutine DLL not recoverable (C2 was offline during sandbox run). Setup.js fully deobfuscated — all 18 XOR-encoded strings decoded including full VBScript and AppleScript payloads. macOS binary reversed with radare2 — main(), Report(), DoWork(), DoActionIjt(), DoActionScpt(), RunProcess() all reconstructed. Uses fork+execv (not system()), CurlGuard RAII pattern, nlohmann/json v3.11.3.
English
4
47
152
30.1K
Oste retweetledi
The DFIR Report
The DFIR Report@TheDFIRReport·
RDP bitmap cache artifacts revealed the threat actor opening the Veeam Backup & Replication console, reviewing backup jobs, tape & storage infrastructure — and removing backups from the configuration database. Full report 👇 thedfirreport.com/2025/12/17/cat…
The DFIR Report tweet media
English
1
18
75
6.2K
Oste retweetledi
7h3h4ckv157
7h3h4ckv157@7h3h4ckv157·
How to Hack AI Agents & Application by @NahamSec, inspired by @rez0__ (Follow Them for more) 📍 🧵 👇🏻
7h3h4ckv157 tweet media
English
10
254
1.2K
46.7K
Oste retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨‼️ MAJOR SUPPLY CHAIN ATTACK: npm package axios is compromised after the maintainer's npm account was hijacked. Malicious versions contain a Remote Access Trojan. axios has 100M+ weekly downloads — it's in practically everything. If you have installed axios@1.14.1 or axios@0.30.4, assume compromise.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
34
144
674
58.6K
v1n
v1n@0xv1nx0·
I know no one cares these days but I'm happy to have passed OSCP this weekend. That's all, thanks.
English
102
25
1K
27.5K
Oste retweetledi
pwn.ai
pwn.ai@pwn_ai·
🚨 ZERODAY: ImageMagick 🚨 Our autonomous pentester pwn.ai just dropped multiple zeroday chains in ImageMagick that achieve RCE and File Leak from a single .jpg or .pdf file, bypassing EVERY security policy (Default, Limited, AND Secure). 🤯 💥 Affects Ubuntu, Debian, WordPress & millions of servers globally. Happy Monday and Happy Hunting! 🥰 pwn.ai/blog/imagemagi…
pwn.ai tweet media
English
7
122
461
41.5K
Oste retweetledi
Aaron Jornet
Aaron Jornet@RexorVc0·
🚨 Big news: New TH Book 🏹 After years in Threat Hunting, I wrote the book I always wanted when I started. The Art of Threat Hunting, practical, technical, no fluff. ⚡Hypothesis generation, queries & adaptation stuff, CTI-driven programs, documentation, team alignment. The full lifecycle. 🦖Full breakdown on the blog: rexorvc0.com 🔗Available on Amazon: amazon.com/Art-Threat-Hun… #ThreatHunting #BlueTeam #Cybersecurity #Research #CTI #Malware #threat
Aaron Jornet tweet media
English
11
69
317
16.9K
Oste retweetledi
Anonymous
Anonymous@YourAnonOne·
BREAKING: Claude code source code has been leaked via a map file in their npm registry.
Anonymous tweet media
English
135
455
3.2K
540.1K
Oste retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨‼️ BREAKING: Adobe has been breached by threat actor Mr. Raccoon, leaking 13 million support tickets with personal data, 15,000 employee records, all HackerOne submissions, internal documents and more. Mr. Raccoon gained access through an Indian BPO, first deploying a remote access tool on an employee, then phishing their manager. Mr. Raccoon told us: "They allowed you to export all tickets in one request from an agent."
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
136
914
3.9K
489.5K
Oste retweetledi
Big Baby🌚❤️
Big Baby🌚❤️@AdesolaBlessin9·
My dad is always searching for Google Chrome on his PC, so I did this 😂
Big Baby🌚❤️ tweet media
English
54
195
307
9.6K
Oste retweetledi
Paul Mit
Paul Mit@pmitu·
AI killed LinkedIn.
English
1.4K
255
4.4K
421.8K