Ben

705 posts

Ben banner
Ben

Ben

@polygonben

Threat Research

in ur c2 😬 Katılım Kasım 2022
1.1K Takip Edilen1.6K Takipçiler
Sabitlenmiş Tweet
Ben
Ben@polygonben·
🚨Recent MuddyWater APT campaign, linked to Iranian intelligence, exposed by Ctrl-Alt-Intel 😬 - 10+ CVEs used - Custom-developed C2s - EtherHiding malware - Sensitive data stolen ctrlaltintel.com/threat%20resea… Super fun collab-ing with @ice_wzl_cyber to get this published 🔥
English
7
68
208
44.2K
Ben retweetledi
IntelOps
IntelOps@IntelOpsV3·
How Threat Actors Abuse Legal Processes 🔥 A deep dive look at fraudulent subpoenas, warrants, EDR and the shinyhunters domain seizure intelops.st/how-threat-act…
English
4
13
41
2.5K
Ben retweetledi
Ctrl-Alt-Intel
Ctrl-Alt-Intel@ctrlaltintel·
A Ctrl-Alt-Intel researcher, based out of HK 🇭🇰, tried to download @signalapp via Chrome.... but noticed something odd The top 2 sponsored results were advertising likely malicious "Chinese versions" of Signal....
Ctrl-Alt-Intel tweet media
English
2
9
21
1.8K
Ben
Ben@polygonben·
im real i promise 🥲
Ben tweet media
English
0
0
2
153
Ben retweetledi
Ctrl-Alt-Intel
Ctrl-Alt-Intel@ctrlaltintel·
On January 15th, after discussing PC specs, the conversation turns personal - giving us insight into "quant" and his life "zeta88" brings Devman back into the conversation. We also look forward to speaking about him in the future too ;)
Ctrl-Alt-Intel tweet media
English
1
1
8
505
Ben retweetledi
Ctrl-Alt-Intel
Ctrl-Alt-Intel@ctrlaltintel·
A little thread exposing screenshots + comms from the Gentlemen Leaks. These provide super interesting insight into the inside operations of successful RaaS groups. Everything from aspects of operators personal lives, their TTPs, and victims. All images shared are from the Rocket[.Chat leak We even discovered in March they attempted to send flowers to a UK-based victim.... On 28th Feb, they recognise they're "top 2" on ransomware.live + Devman has gone ;)🚓 Translation of zeta88's first message: "In short, Devman was either taken in, for health reasons, or because of a rebranding—it all disappeared. And we're top 2 on RansomLive based on statistics, but not based on profit, I think." We can see a @GangExposed tweet shared by The Gentlemen, alongside the ransomware.live stats
Ctrl-Alt-Intel tweet mediaCtrl-Alt-Intel tweet media
English
1
13
59
4.8K
Ben retweetledi
Andrew Thompson
Andrew Thompson@ImposeCost·
There's enough money involved that if people would stop being soft, the right talent would go largely solve the ransomware problem.
English
17
6
99
27.1K
Ben retweetledi
Merav
Merav@merav_br·
My new research on the Jenkins threat landscape 🔍☁️ Exposed instances, deprecated plugins, CI/CD attack paths… and based on TeamPCP’s recent activity, I think they read it too 👀 wiz.io/blog/jenkins-t…
English
0
20
81
11K
Ben retweetledi
Ctrl-Alt-Intel
Ctrl-Alt-Intel@ctrlaltintel·
🧵 CATCHING THREAT ACTORS IN PROD: The "Mihók-Dev" Files A Hungarian cryptomining operator left their entire working directory publicly accessible on a Python HTTP server. One zip file. Full toolkit, bash history, compiled binary, scan logs all of it. Here is the technical breakdown of NOVA SYMBIO NETWORK v1.0 Actor: Mihók-Dev / "Mihók Dániel" Contact hardcoded across every file: Mihokdaniel84[@]gmail.com Selling price: €1,000 BTC/XMR/ETH Active since: First artifact timestamps to 2022-04-22 19:48 UTC This is not a ground breaking or complex toolkit by any means. We were unable to find this advertised publicly anywhere yet; based on the code, it had strong signs it was made using an LLM, which is increasingly becoming more common. When hunting on @Huntio, you can catch these threat actors early by leveraging Hunt.io data
Ctrl-Alt-Intel tweet media
English
1
13
36
2.2K
Ben retweetledi
Ctrl-Alt-Intel
Ctrl-Alt-Intel@ctrlaltintel·
Someone deployed a phishing platform + remote access trojan across 14 servers then left every single one wide open. Same image. Same live credentials. Same RAT binaries. All publicly readable across the entire subnet. Found on @Huntio Here's what was running 🧵
Ctrl-Alt-Intel tweet media
English
1
9
40
2.6K
Ben retweetledi
Ctrl-Alt-Intel
Ctrl-Alt-Intel@ctrlaltintel·
@Fortinet Please stop flagging our domain as malicious 🥹
Ctrl-Alt-Intel tweet media
English
1
2
13
311
Ben retweetledi
Ctrl-Alt-Intel
Ctrl-Alt-Intel@ctrlaltintel·
We’re not malicious @virginmedia 🥺 ctrlaltintel[.]com is for sharing intel, we’re only a threat to cybercriminals 🙏
Ctrl-Alt-Intel tweet media
English
2
3
32
2.5K
Ben retweetledi
Ctrl-Alt-Intel
Ctrl-Alt-Intel@ctrlaltintel·
Recent find by our team using @Huntio🕵️‍♂️ Akia: Exploiting CVE-2025-55182/66478, this French Claude-coded pipeline is a massive secret harvester: 🔹13 Git/8 SMTP APIs 🔹3k+ AWS Keys 🔹250M JS URLs 🔹EVM/BTC/SOL 🔹250+ ENV types 🔹1k+ Cloud paths 🔹300+ Configs 🔹20+ Code exts
Ctrl-Alt-Intel tweet mediaCtrl-Alt-Intel tweet media
English
0
11
52
6.7K
Ben retweetledi
Ctrl-Alt-Intel
Ctrl-Alt-Intel@ctrlaltintel·
In April, our team found a vibe-coded dashboard guessing FedEx tracking numbers. With 4M+ records and 498 proxies, the scale was impressive, though the adversary's goal remains unknown. Any idea what the adversary was trying to accomplish?
Ctrl-Alt-Intel tweet media
English
5
10
35
3.3K
Ben retweetledi
Ctrl-Alt-Intel
Ctrl-Alt-Intel@ctrlaltintel·
Links to our blogs are getting blocked :(
Ctrl-Alt-Intel tweet media
English
1
6
28
1.8K