CYBCRIME

339 posts

CYBCRIME banner
CYBCRIME

CYBCRIME

@stdal_

nothing new under the sun, that's why we have to rise above

Katılım Ocak 2022
128 Takip Edilen33 Takipçiler
CYBCRIME retweetledi
tanuki42
tanuki42@tanuki42_·
1/8 A North Korean recruiter just tried to pay me $300/month to launder his Upwork identity. Here is how the pitch works: 🧵
tanuki42 tweet media
English
14
29
143
22.9K
CYBCRIME retweetledi
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft is investigating mistralai PyPI package v2.4.6 compromise. Attackers injected code in mistralai/client/__init__.py that executes on import, downloads hxxps://83[.]142[.]209[.]194/transformers.pyz to /tmp/transformers.pyz, and launches a second-stage payload on Linux. The file name transformers.pyz appears deliberately chosen to mimic the widely used Hugging Face Transformers library and blend into ML/dev environments. The main payload is a credential stealer, but it also includes country-aware logic; it avoids Russian-language environments and contains a geo fenced destructive branch that has 1-in-6 chance of executing rm -rf / when the system appears to be in Israel or Iran. To mitigate this threat: isolate affected Linux hosts, block 83[.]142[.]209[.]194, hunt for /tmp/transformers.pyz, pgmonitor[.]py, and pgsql-monitor.service, and rotate exposed credentials.
Microsoft Threat Intelligence tweet media
English
118
700
4.9K
4.1M
CYBCRIME retweetledi
Emmy Byrne
Emmy Byrne@byrne_emmy12099·
Update_251001 ACM Sakesan Kantha.pdf.lnk 22180919f562fb9f6e50d7f20b2eb3f94eb009c212b74b45cf77659fe8274d5b #APT #Kimsuky
Emmy Byrne tweet mediaEmmy Byrne tweet media
Indonesia
0
8
13
2.3K
CYBCRIME retweetledi
Baptiste Robert
Baptiste Robert@fs0c131y·
New research reveals detailed analysis of DPRK VPN infrastructure used by North Korean operatives abroad. According to technical analysis published by NK Internet Watch, "Hangro" appears to be a specialized VPN client that enables North Koreans overseas to establish secure connectivity back to domestic networks, potentially including the Kwangmyong intranet. 📍 Infrastructure spans multiple countries with servers in Russia (188.43.136.115/116) and North Korea (175.45.176.21/22) 📍 Requires mutual TLS authentication with certificates signed by internal CA "hrra2024" 📍 Uses embedded GOST cipher references suggesting Russian cryptographic influence The research traces connections through Jo Myong Chol, a sanctioned DPRK national who registered supporting domains using the email support@silibank.com. This same email was used for other regime-affiliated sites including ournation-school.com and uriminzogkiri.com. 1️⃣ Radio Free Asia reported North Korean trading companies pay $350 to the Shenyang consulate for Hangro access 2️⃣ Technical analysis reveals the client is derived from SoftEther VPN with custom authentication mechanisms 3️⃣ The service recently appeared on DPRK-affiliated websites as "service for visitors away from home" before disappearing in July 2025 This infrastructure represents a sophisticated method for maintaining regime connectivity with overseas operatives and commercial entities. Source: nkinternet.wordpress.com/2025/01/06/han…
Baptiste Robert tweet media
English
11
164
673
58.9K
CYBCRIME
CYBCRIME@stdal_·
@dystopiangf I think it's because we switched to a management era. Instead of leading to build and create new things inspired by a great vision, the "elite" now just manage stuff so that everything doesn't fall apart
English
0
0
1
18
ℜ𝔞𝔢
ℜ𝔞𝔢@dystopiangf·
Civilizations used to dream. Even communists wanted to go to the stars. At some point, the future died; we all silently decided that the purpose of a civilization is not to dream, but to just scrape by, to cut corners, to be as close to bare minimum functionality as possible
ℜ𝔞𝔢 tweet media
English
172
316
2.8K
144.4K
CYBCRIME retweetledi
vx-underground
vx-underground@vxunderground·
How tf did the FBI / NSA get a picture of North Korean IT workers working
vx-underground tweet media
English
91
210
4.5K
433.1K
CYBCRIME retweetledi
Cyber_OSINT
Cyber_OSINT@Cyber_O51NT·
A recent report reveals that Pakistani freelancers are creating cracking websites linked to stealer malware, using a pay-per-install model, while exploiting SEO tactics to promote these sites amidst low prosecution risks. #cybersecurity #malware ift.tt/bOGhQW7
English
1
15
25
1.8K
CYBCRIME retweetledi
Oleg
Oleg@Cyber_0leg·
💸 From dirty crypto to clean money: how Russophone cybercriminals launder illicit crypto profits? Fake inheritances, shady casinos, fake businesses, and shell companies. The real bottleneck? Legalization. 🔗 Link in comments #CTI #CryptoLaundering #DarkWeb
Oleg tweet media
English
5
32
105
49.8K
CYBCRIME retweetledi
Intrinsec
Intrinsec@Intrinsec·
🔎 [THREAD] – Doppelgänger: A New Disinformation Campaign Spreading on Social Media 📢 📄 A newly released report sheds light on the tactics used by this Russian-linked network to target multiple Western countries. ⬇️
English
1
7
13
1.8K
CYBCRIME retweetledi
Intrinsec
Intrinsec@Intrinsec·
🚨 [New Report Alert!] Our CTI team just published: "Premium Panel: phishing tool used in longstanding campaigns worldwide." 👉 This report reveals insights into a phishing kit used in campaigns for over two years! 📅Read the full report here: intrinsec.com/premium-panel-…
English
1
13
22
3.1K
CYBCRIME retweetledi
404 Media
404 Media@404mediaco·
Researcher turns insecure license plate cameras into open source surveillance tool Privacy advocate draws attention to the fact that hundreds of police surveillance cameras are streaming directly to the open internet. 🔗 404media.co/researcher-tur…
404 Media tweet media404 Media tweet media
English
2
24
57
4.1K
CYBCRIME retweetledi
TrendAI™ Research
TrendAI™ Research@trendai_RSRCH·
Earth Koshchei’s rogue Remote Desktop Protocol campaign targets government, military, and academia via spear-phishing, with alleged ties to Russia’s intelligence. Learn more about this new threat actor’s tactic:⬇️ research.trendmicro.com/3DhR710
English
0
2
5
624
CYBCRIME retweetledi
Baptiste Robert
Baptiste Robert@fs0c131y·
Hackers claim to have breached Gravy Analytics, a US location data broker selling to government agencies. They shared 3 samples on a Russian forum, exposing millions of location points across the US, Russia, and Europe. It's OSINT time! 👇
Baptiste Robert tweet media
English
179
2.4K
12.8K
1.9M
CYBCRIME retweetledi
Intrinsec
Intrinsec@Intrinsec·
🎉 Happy New Year! Our CTI team has just published a new report: "CryptBot: Hunting for Initial Access Vectors." Here’s what we’ve uncovered about the malware’s spreading methods, originally shared privately with our clients in September. 🧵
English
2
6
19
1.6K
CYBCRIME retweetledi
Intrinsec
Intrinsec@Intrinsec·
🚨 New Report Alert! 🚨 Our CTI team has just released a new report: "Prospero & Proton66: Uncovering the links between bulletproof networks." Here's what we've uncovered about these two Russian Autonomous Systems and their malicious connections. 🧵
English
1
18
57
6.3K
CYBCRIME retweetledi
Mandiant (part of Google Cloud)
🚨 Mandiant observed #LummaC2 stealers leveraging a new obfuscation technique to thwart analysis tools and stifle reverse engineering efforts. Read about this tactic, and how we developed an automated method for removing this protection layer → bit.ly/47IImbK
Mandiant (part of Google Cloud) tweet media
English
1
60
183
16.6K