Erwan Chevalier

156 posts

Erwan Chevalier

Erwan Chevalier

@r1chev

Geek working in #security / Mastodon: @[email protected]

Katılım Kasım 2010
379 Takip Edilen127 Takipçiler
Erwan Chevalier retweetledi
KSE
KSE@KSeznec·
Possible #Bluenoroff #TA444 #APT38 activity 142.11.209[.]144 dma.linkpc[.]net association.linkpc[.]net world.linkpc[.]net 23.254.204[.]173 docsend.com-proapple[.]cloud.line[.]pm docsend-cloud.espcap[.]fun 23.254.129[.]6 c-money.linkpc[.]net 23.254.167[.]226 decentryk[.]online
English
1
16
55
9.1K
Erwan Chevalier retweetledi
Sekoia.io
Sekoia.io@sekoia_io·
🔴 Yesterday, the 🇷🇺 Russian-affiliated hacktivist group #NoName057 leveraged its #DDoS tool #DDoSia to target #PMCWagner websites wagner2022[.]ru / wagnercentr[.]ru💣
Sekoia.io tweet media
English
1
20
34
22K
Erwan Chevalier retweetledi
Sekoia.io
Sekoia.io@sekoia_io·
During daily threat monitoring, our Threat & Detection Research (TDR) team identified new #NoName057's #DDoSia 🇫🇷 targets ⤵️ www[.]assemblee-nationale[.]fr www[.]gendarmerie[.]interieur[.]gouv[.]fr cnes[.]fr dares[.]travail-emploi[.]gouv[.]fr
Sekoia.io tweet media
English
2
19
17
6.4K
Erwan Chevalier retweetledi
crep1x
crep1x@crep1x·
The indicator of compromise mentioned in the Google TAG report that corresponds to a C2 server of #Rhadamanthys is 104.156.149[.]126, active at least from January 16, 2023 to end of March according to our @sekoia_io C2 trackers. It was also publicly shared by @0xrb on ThreatFox!
crep1x tweet media
Sekoia.io@sekoia_io

The #infostealers are not only used by #cybercriminals but also by 🇷🇺 APT groups like #Sandworm. Google TAG reports this for the first time in its Q1 cyber threat landscape from the war in Ukraine. blog.google/threat-analysi… #AttributionFog #Rhadamanthys

English
0
12
32
4.7K
Erwan Chevalier retweetledi
Sekoia.io
Sekoia.io@sekoia_io·
💣 Among others, @sekoia_io discovered yesterday 55 #PyPI malicious packages pushed by the same Threat actor. It's not the first time that we are seeing this actor pushing this kind of malicious packages. PyPI contacted and packages removed 👌 Related packages and IoCs below ↘️
Sekoia.io tweet media
English
1
29
70
14.8K
Erwan Chevalier retweetledi
Sekoia.io
Sekoia.io@sekoia_io·
As the ongoing 🇷🇺 Russo-Ukrainian 🇺🇦 conflict is about to mark its first year anniversary, our analysts share through our latest blogpost their analysis pertaining to the #cyber picture. blog.sekoia.io/one-year-after…
English
2
37
60
16.3K
Erwan Chevalier retweetledi
Sekoia.io
Sekoia.io@sekoia_io·
Our new blog post aims at presenting a typical infection chain distributing #Raccoon and #Vidar stealers by leveraging SEO poisoned websites. SEKOIA.IO illuminated a large and resilient infrastructure of 250+ domains. blog.sekoia.io/unveiling-of-a…
English
2
43
96
22.9K
Erwan Chevalier retweetledi
Sekoia.io
Sekoia.io@sekoia_io·
Our new blog post aims at contextualising and analysing trends pertaining to cyber malicious activities associated to the 🇰🇵 Democratic People’s Republic of Korea-nexus Intrusion Sets reported in open sources in 2022 ⤵️ blog.sekoia.io/the-dprk-delic… #CTI #DPRK
English
3
30
53
8.4K
Erwan Chevalier retweetledi
Sekoia.io
Sekoia.io@sekoia_io·
#IcedID is distributed on sites impersonating popular enterprise software applications, such as Zoom or Slack. Such infection chains are usually used by threat actors distributing infostealers (Raccoon, Vidar, Redline, Aurora, etc.) ⬇️
Sekoia.io tweet media
English
1
12
32
0
Erwan Chevalier retweetledi
crep1x
crep1x@crep1x·
#Vidar stealer (botnet 1821) distributed using a fake website that mimics MSI Afterburner software and uses Google Ads mslaftrebunrer.]us (ping @Namecheap) tria.ge/221208-p35zzsd…
crep1x tweet mediacrep1x tweet media
English
3
19
43
0