abuse.ch

3.4K posts

abuse.ch banner
abuse.ch

abuse.ch

@abuse_ch

Fighting malware and botnets

Zurich Присоединился Mayıs 2009
299 Подписки36.9K Подписчики
abuse.ch
abuse.ch@abuse_ch·
Proofpoint recently identified a fake RMM (Remote Monitoring and Management Tool) called #TrustConnect and #DocConnect🔎💻 Pivoting the threat in our collection reveals that the threat actors spread the same malware under additional names, including: ➡️SoftConnect ➡️HardConnect ➡️AxisControl It also seems that the threat actor was previously playing around with the legitimate RMM #ScreenConnect (aka ConnectWise) before switching to their own fake RMM 🛠️ What also stands out: the majority of the botnet C2s were hosted at Contabo GmbH 🇩🇪 We track the threat on our platforms as #FakeRMM ⤵️ IOCs on ThreatFox: 🦊 threatfox.abuse.ch/browse/tag/Fak… Malware samples: 📄 bazaar.abuse.ch/browse/tag/Fak…
abuse.ch tweet media
Threat Insight@threatinsight

Proofpoint threat researchers identified a new malware-as-a-service named #TrustConnect. Notably, it masquerades as a legitimate remote monitoring and management tool, marking an evolution in how attackers weaponize trust around enterprise tooling. brnw.ch/21x05Vh

English
0
13
40
4.8K
abuse.ch
abuse.ch@abuse_ch·
@byrne_emmy12099 Any chance to share that file? e.g. on MalwareBazaar? 🙏
English
1
0
2
1.2K
Emmy Byrne
Emmy Byrne@byrne_emmy12099·
Настроечных работ.pdf.lnk f59754843a12e298eaaf2b889817fdffee55f92109aa181c00ac0b3ed2fe1148 #APT #Suspicious
Emmy Byrne tweet media
1
4
17
2K
abuse.ch
abuse.ch@abuse_ch·
@RacWatchin8872 Thank you so much for your efforts in figthing cybercrime! 💪💪💪💪
English
0
0
1
1.1K
WatchingRac
WatchingRac@RacWatchin8872·
If you’re not doing it for the goodies, you’re doing it wrong 😄 Jokes aside, thanks to @abuse_ch for the goodies and for supporting the community with your platform. It’s an honor to be a top reporter.
WatchingRac tweet media
English
2
3
18
3.8K
abuse.ch
abuse.ch@abuse_ch·
@JustWantToQ1 I would say so, as it allows you to connect to the victim's machine via a VNC-alike channel and via CLI. But open for other opinions 🙂
English
0
0
1
415
abuse.ch
abuse.ch@abuse_ch·
Yet another RAT in town: RemoteX🖥️🖱️ 🪲 Dropped by Amadey 📃 Written in Golang 💻 Uses HKCU\...\CurrentVersion\Run\RemoteX for persitence (lame 🚽) 🌐 Uses WebSocket for C2 communication 🕵️‍♂️ Unauthenticated RAT admin panel 🤡 Botnet C2: 📡 109.107.168.147:80 (Partner Hosting LTD 🇬🇧) Malware sample ⤵️ bazaar.abuse.ch/sample/d631655…
abuse.ch tweet media
English
3
24
145
14.8K
Tor Åge Takvam
Tor Åge Takvam@ttakvam·
Very excited and honestly a bit humbled to be recognized as a Top Contributor by @spamhaus and @abuse_ch Community-driven intel makes the internet safer. Glad to contribute, and I’ll keep at it. Big respect to everyone submitting, reviewing, and maintaining these datasets. 🙂
Tor Åge Takvam tweet media
English
3
1
17
2.9K
abuse.ch ретвитнул
Spamhaus
Spamhaus@spamhaus·
📢 Botnet Spotlight July - December 2025 | The second half of 2025 brought progress against botnet infrastructure: stronger anti-abuse action by major network operators, increased law enforcement pressure on RATs and bulletproof hosting, and major takedowns like CrazyRDP. 🚨 1/3
Spamhaus tweet media
English
1
4
7
3.6K
abuse.ch ретвитнул
Spamhaus
Spamhaus@spamhaus·
🤖 Jul-Dec 2025 Botnet Threat Update out now! ⬆️ 21,425 #botnet C&Cs observed, up by +24%. ⏫ Botnet C&C domains soar +9,608% for 🇷🇺 Russia-based REGRU ⬆️ Remote Access Trojans represent 42% of Top 20 malware associated with botnet C&Cs. But it isn’t all bad news – several large cloud network operators have taken action to tackle active botnet C&Cs - find out which ones in the latest FREE report here👇 spamhaus.org/resource-hub/b… #Botnet #ThreatIntel
Spamhaus tweet media
English
0
5
14
4.8K
abuse.ch
abuse.ch@abuse_ch·
Malspam sent from Microsoft Outlook that is spreading @LogMeIn GoToResolve RMM, enabling threat actors to access the victim's machine from remote 💻🔍🕵️ IOCs: 📡adwestmailcenter .com ➡️ Landing page 📡insightme .im ➡️ fake PDF download Payload hosted on Cloudflare R2 bucket, but already got nuked due to an abuse report from URLhaus 🙌 🌐 urlhaus.abuse.ch/url/3751500/ LogMeIn #GoToResolve payload 📄 bazaar.abuse.ch/sample/77e22f4…
abuse.ch tweet mediaabuse.ch tweet media
English
2
13
48
7.6K
abuse.ch
abuse.ch@abuse_ch·
CHICXULUB IMPACT 💥 Botnet C2 URLs: 📡 https://turbokent .name/api/initialize 📡 https://turbokent .name/api/status Sponsoring domain registrar: NICENIC 🇭🇰 Malware sample 📄: bazaar.abuse.ch/sample/c32e1db…
abuse.ch tweet media
Română
0
8
27
11.4K
abuse.ch
abuse.ch@abuse_ch·
New Stealer in town: SantaStealer 🎅🎄 Botnet C2s ➡️all hosted at AS399486 VIRTUO 🇨🇦: 📡31.57.38.119:6767 📡31.57.38.244:6767 📡80.76.49.114:6767 Stealer admin panel (via @DarkWebInformer 💪): 🕵️ stealer. su Artifacts 💻: C:\tempLog\Clipboard.txt %LocalAppData%\Temp\passwordslog.txt Malware samples 🤖: bazaar.abuse.ch/browse/tag/San… IOCs available on ThreatFox 🦊: threatfox.abuse.ch/browse/tag/San…
Rapid7@rapid7

'Tis the season for a new infostealer: #SantaStealer. Promotion on Telegram and underground forums says the malware-as-a-service will release before year-end. Rapid7 Labs analyzed unstripped samples to detail how it operates & what defenders should know: r-7.co/4q5pk75

English
1
11
77
11.1K