reecDeep

2.9K posts

reecDeep banner
reecDeep

reecDeep

@reecdeep

malware analyst, reverse engineer.

Katılım Mayıs 2019
335 Takip Edilen10.7K Takipçiler
reecDeep retweetledi
reecDeep retweetledi
Group-IB Global
Group-IB Global@GroupIB·
🚨 Uncovering a Multi-Stage Phishing Kit Targeting Italy’s Infrastructure Phishing has evolved, becoming industrialized, automated, and powered by underground ecosystems that mirror legitimate SaaS businesses. Our latest investigation exposes a professional phishing framework impersonating Aruba S.p.A., Italy’s major IT and web services provider. The key findings: 🔹 Multi-stage kit automating every phase of the attack from CAPTCHA evasion to OTP interception 🔹 Pre-filled login URLs designed to increase credibility and lower suspicion 🔹 Fake payment pages harvesting full credit card and 3D Secure/OTP data 🔹 Telegram bots used for real-time exfiltration and backup data logging 🔹 Evidence of Phishing-as-a-Service (PhaaS) scaling fraud through automation and community support Phishing may be one of the oldest cyber threats, but today, it operates like a fully industrialized ecosystem. 🧩 Read the full technical analysis here: link.group-ib.com/3K0HgjZ #ThreatIntelligence #CyberSecurity #Phishing #CyberCrime #Infosec #CyberThreats #DigitalFraud #ThreatHunting #FightAgainstCybercrime
Group-IB Global tweet media
English
0
7
13
4.4K
reecDeep retweetledi
reecDeep retweetledi
Group-IB Threat Intelligence
Group-IB Threat Intelligence@GroupIB_TI·
Group-IB Threat Intelligence uncovered a global espionage operation by #MuddyWater (TA450). MuddyWater targeted international organizations and more than 100 governments worldwide to gather foreign intelligence using the Phoenix v4 malware #phishingawareness
Group-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet media
English
5
25
84
9.3K
reecDeep retweetledi
Group-IB Threat Intelligence
Group-IB Threat Intelligence@GroupIB_TI·
Group-IB uncovered a sophisticated Singapore-targeted scam campaign abusing verified Google Ads, 52 redirect domains, and 119 fake news sites to drive victims toward a Mauritius-registered trading platform. The operation blended malvertising, #deepfakes, and localized deception to mimic legitimate media and regulators. #ThreatIntel
Group-IB Threat Intelligence tweet media
English
1
8
15
4.1K
reecDeep retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 AI-powered ‘MalTerminal’ Malware Uses OpenAI GPT-4 to Generate Ransomware Code Read more: cybersecuritynews.com/first-ever-ai-… AI-powered malware, known as 'MalTerminal', uses OpenAI’s GPT-4 model to dynamically generate malicious code, including ransomware and reverse shells, marking a significant shift in how threats are developed and deployed. MalTerminal functions as a malware generator. Upon execution, the tool prompts its operator to choose between creating ‘Ransomware’ or a ‘Reverse Shell’. It then sends a request to the GPT-4 API to generate the corresponding malicious Python code at runtime. #cybersecuritynews #malware
Cyber Security News tweet media
English
0
31
133
10.8K
reecDeep retweetledi
Malfors
Malfors@MalforsHQ·
The Russian intelligence service has launched a phishing campaign targeting MI6 (Secret Intelligence Service) informants. A fake “Contact MI6” form went live earlier today. It was immediately detected by Malfors. mi6govukbfxe5pzxqw3otzd2t4nhi7v6x4dljwba3jmsczozcolx2vqd[.]top
Malfors tweet media
English
5
40
196
35.3K
reecDeep retweetledi
Who said what?
Who said what?@g0njxa·
After almost a year after the announcement, Vidar Stealer releases a major update to Vidar 2.0 - "The revival of the legend!" (as of Vidar version 16) ALL previous Update Logs of Vidar Stealer can be found in this Github repo I created for public access: github.com/g0njxa/VidarSt… Full original statement below 👇 English Original 🔥 VIDAR STEALER v2.0 — The Revival of a Legend! 🔥 Friends, we are finally ready to tell you what we’ve been working on for the past few months. Read the details! After a long and difficult period, we’ve completely overhauled the product. Not just an update — this is a new era. 💡 What changed under the hood: *️⃣ We rewrote the entire software from C++ to C — this delivered a colossal increase in stability and speed. *️⃣ Implemented unique appBound methods that aren’t found in the public domain. *️⃣ Added an automatic morpher, so every build is now unique. *️⃣ Built-in hidden error reporting system — we can debug in real time without user intervention. 🚀 What this gives users: *️⃣ A completely new product, undetectable by antiviruses. *️⃣ Multithreaded operation and upload capabilities. *️⃣ High processing speed and anti-bot protections. *️⃣ Stable data collection without crashes or errors. *️⃣ Ability to switch between two different in-memory injection systems online without a rebuild — one can replace the other when needed. ❗️ The unique multithreading system allows extremely efficient use of multi-core processors. It performs data-collection tasks in parallel threads, greatly speeding up the process. Most importantly — we implemented multithreaded file uploads, which accelerates not only log collection and processing but also their transfer. Price remains the same — $300 since 2018. We strive to keep it unchanged for as long as possible while maintaining the highest level of product and service quality. 🧠 What’s in development right now: A new modern project design that will be available to everyone soon. Migration to a new server — powerful, fast, and reliable: -> AMD EPYC 9654 (3.7GHz, 96 Cores) ×2 -> DDR5 4800MHz 64GB SAMSUNG ECC RDIMM ×24 -> Kingston SEDC3000ME 15.36TB ×6 -> Samsung 980 PRO M.2 500GB ×2 🔥 A bit about us and our journey: We’ve been with you since 2018. We’ve always prioritized quality and stability. Yes, there was a difficult period — complex development, reworks… But we didn’t give up. We found the strength to rewrite, improve, and relaunch under new market conditions. Now VIDAR v2.0 is a new breath, new power, and a new level of technology. The project literally rose like a phoenix. All previous updates were just warm-ups compared to what we’ve done now. 💬 We thank everyone who stayed with us and supported us along the way. You’ll soon see how big a step forward this is. VIDAR v2.0 is here. And this is only the beginning. ⚡️ ❗️ Technology stack ✅ Pure C (C99) — no C++ runtime, STL, or exceptions ✅ Custom minimalist CRT — complete independence from system libraries ✅ NT API — direct access to Windows kernel, bypassing antivirus hooks 🖥 Performance: ⚡️ +30–50% performance thanks to NT API 📦 −60% binary size (no runtime dependencies) 🎯 Adaptive algorithms for fast and slow PCs Compatibility: 🌐 Windows XP → Windows 11 (32/64 bit) ❌ No runtime DLL dependencies ✅ Works on any system “out of the box” Architecture: 🧩 Modular structure — easy to extend and maintain 🔒 Runtime obfuscation OLLVM — protection against reverse engineering 🛡 Minimal attack surface — fewer interceptions by antiviruses
Who said what?@g0njxa

#Vidar Stealer is preparing for a major update near their 6th anniversary (November 2024) Read about Vidar Stealer if you still didn't 😉

English
1
9
33
9.8K
reecDeep retweetledi
BobPony.com
BobPony.com@TheBobPony·
start ms-cxh:localonly has been recently removed in the recent Windows 11 Beta Update, BypassNRO still works! 🎉 ⚠️ DISCONNECT from the internet first! ⚠️ Shift + F10 reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\OOBE /v BypassNRO /t REG_DWORD /d 1 /f shutdown /r /t 0
English
59
498
3.1K
162.7K
reecDeep retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 Red Hat breached: Crimson Collective stole 28k private repositories, including credentials, CI/CD secrets, pipeline configs, VPN profiles, and infrastructure blueprints. Our analysis of obtained data: 👇
International Cyber Digest tweet media
English
23
222
810
216.9K
reecDeep retweetledi
Hunt.io
Hunt.io@Huntio·
🚩 Google Project Zero Details ASLR Bypass on Apple Devices cybersecuritynews.com/aslr-bypass-on… A researcher from Project Zero has unveiled a clever serialization attack that leaks memory addresses on macOS and iOS, undermining Apple’s ASLR. The exploit leverages how NSDictionary serialization and re-serialization handles the NSNull singleton and uses hash table bucket placement to infer address bits. No memory corruption or timing side channels are needed. Apple patched this issue via updates released on March 31, 2025. #AppleSecurity #ASLR #iOS #macOS #ProjectZero #CyberSecurity
English
0
46
202
17.7K
reecDeep retweetledi
Merl
Merl@Merlax_·
#Malware #Grandoreiro 🇧🇷 Activos modificando diseños 1er stage Sites 1er stage p://173.249.]58.7/ p://213.199.]36.218/ p://164.68.]106.78/ 343 Links @MediaFire pastebin.com/raw/icLFVkhd Imagens - Loader + contador "HLsystem" - Site descarga "pdf" (.iso > .vbs) - "Captcha" pdf
Merl tweet mediaMerl tweet mediaMerl tweet mediaMerl tweet media
Português
1
7
23
3.2K
reecDeep retweetledi
Group-IB Threat Intelligence
Group-IB Threat Intelligence@GroupIB_TI·
Since early 2025, #MuddyWater (aka TA450/Seedworm) has shifted tactics. Once known for widespread RMM-based intrusions, the Iranian state-backed #APT has scaled down mass campaigns in favor of more targeted spearphishing and custom backdoors such as #Phoenix, and StealthCache.
Group-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet media
English
2
14
65
7.7K
reecDeep retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
Scattered Lapsus$ Hunters has provided the following message on breachforums[.]hn. They have essentially retired.
Dark Web Informer tweet mediaDark Web Informer tweet media
English
9
49
273
68.4K
reecDeep retweetledi
Ivan Kwiatkowski
Ivan Kwiatkowski@JusticeRage·
Reverser friends, Gepetto has made huge leaps in the last weeks. I now consider it to be a decent IDA Pro agent. With zero interaction (gpt-5), it solved a crackme all on its own. I opened IDA, typed in the prompt, and it did everything.
Ivan Kwiatkowski tweet mediaIvan Kwiatkowski tweet media
English
10
62
351
35.8K