Kse Proso

260 posts

Kse Proso banner
Kse Proso

Kse Proso

@KseProso

#APT groups analyst #ThreatIntel researcher @GroupIB @GroupIB_TI Opinions are my own.

เข้าร่วม Nisan 2015
94 กำลังติดตาม1.4K ผู้ติดตาม
Kse Proso รีทวีตแล้ว
Group-IB Global
Group-IB Global@GroupIB·
🎉 Our High-Tech Crime Trends 2026 Report is here! Supply chain attacks have become the dominant force reshaping the global cyber threat landscape. Group-IB's High-Tech Crime Trends Report 2026 reveals a decisive shift in cybercrime away from isolated intrusions toward ecosystem-wide compromise. Attackers are now exploiting trusted vendors, open-source software, SaaS platforms, and managed service providers to gain inherited access to hundreds of downstream organizations. Key findings: 🔹 Open-source ecosystems under siege npm and PyPI targeted with stolen credentials and automated malware worms 🔹 Malicious browser extensions weaponized to harvest credentials and hijack sessions 🔹 AI-powered phishing campaigns bypassing MFA through OAuth workflows 🔹 Data breaches triggering multi-tenant, cascading downstream impact 🔹 Industrialized ransomware supply chains coordinating upstream access "Cybercrime is no longer defined by single breaches. It is defined by cascading failures of trust," said Dmitry Volkov, CEO of Group-IB. Powered by intelligence from our Digital Crime Resistance Centers across 11 countries and adversary-centric telemetry, this report provides actionable insights for enterprises, governments, and law enforcement. 📥 Download the High-Tech Crime Trends Report 2026 to understand how supply chain compromises unfold and how to disrupt attack chains before damage occurs: link.group-ib.com/3Zxl8lr 🔗 Read the full press release: link.group-ib.com/4kt2Kno #CyberSecurity #SupplyChainAttack #InfoSec #ThreatIntelligence #Ransomware #Phishing #HTCT2026
Group-IB Global tweet media
English
1
6
5
690
Kse Proso
Kse Proso@KseProso·
I with my colleagues from @GroupIB_TI and @GroupIB_DFIR uncover how #UNC2891 is blending stealthy malware, physical infiltration, and money #mule ops to pull off high-impact bank attacks in Southeast Asia. 📌 Key findings: • Undetected access since 2017 • Rootkits, log wipers, and "magical password" backdoors • Raspberry Pi planted inside a bank’s ATM switch • DNS tunneling + OpenVPN for lateral movement • Money mules recruited via Google ads & guided via TeamViewer 🔖Full report: group-ib.com/landing/unc289… #ThreatIntel #CyberCrime #ATM #GroupIB #FinancialThreats
Kse Proso tweet mediaKse Proso tweet media
English
0
6
18
2.5K
Kse Proso รีทวีตแล้ว
Group-IB Global
Group-IB Global@GroupIB·
Can one email put billions of weekly downloads at risk? Yes, it can. That’s how one of the most significant NPM #supplychain incidents to date began. A single #Phishing message disguised as an #NPM security update gave attackers access to a trusted developer account and spread malicious code through 20 popular packages. In the first post of our new email protection series, Group-IB experts explain how #BusinessEmailProtection could have detected and stopped the message before it ever reached the inbox. Read the full story: link.group-ib.com/4hAb6s1
Group-IB Global tweet media
English
0
7
13
835
Kse Proso
Kse Proso@KseProso·
@RedDrip7 Hey, Thanks for sharing! Is there any chance to hear full speech/blog/presentation? Thanks!
English
0
0
6
1K
RedDrip Team
RedDrip Team@RedDrip7·
At the recently held CYDES 2025, we disclosed #APT group #NightEagle (APT-Q-95). This threat group has been targeting high-tech industries for a long time, including chip semiconductors, AI/GPT and other fields. Actors used an unknown Exchange exploit chain. PPT: #IOCs #APT
RedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet mediaRedDrip Team tweet media
English
7
24
71
29K
Kse Proso
Kse Proso@KseProso·
#Lynx #RaaS: A Ruthless Cybercrime Machine 💀 All-in-One Panel – Manage victims, #ransomware builds & leaks 🖥️ Cross-Platform – Windows, Linux, ESXi 💰 Double Extortion – 80% payout + leak site for max pressure 🔐 Custom Encryption – Speed vs. depth, affiliates choose ...more👇
Group-IB Threat Intelligence@GroupIB_TI

Group-IB’s Threat Intelligence team has investigated the work of the #Lynx #Ransomware group, unveiling multi-architecture builds (Windows, Linux, ESXi). Their affiliate panel centralizes attack orchestration and data-leak scheduling. #RaaS #CyberSecurity

English
0
0
1
454
Kse Proso
Kse Proso@KseProso·
@cyb3rops Thanks to him for this work. But I'm afraid there is not a full list of addresses, only those who had the "set email-to" parameter, there are also admin emails that are not in this list😶
English
0
0
2
1.6K
Kse Proso
Kse Proso@KseProso·
#Lazarus is using "FCCCall," to mimic legit video conferencing as part of attack chains. A new Python script suite, and expanded outreach beyond LinkedIn and Telegram have been identified. Tools #BeaverTail and #InvisibleFerret are in active dev with updates from July-Aug 2024.
Group-IB Threat Intelligence@GroupIB_TI

The #Lazarus Group shows no signs of easing with their campaign targeting #jobseekers extending to the present day. Group-IB researchers found new updates to their tools and tactic - new suite of Python scripts - #CivetQ, a #Windows and #Python version of #BeaverTail

English
0
10
47
4.6K
Cyber Team
Cyber Team@Cyberteam008·
#APT36 Phishing Campaign Amended Copy.rar MD5: c375c9ddee439e9ecb40875affbf7d12 #Crimson #RAT Payloads Activity Analyzer.exe 18f206d146f2bb1fa51363a547d5a3ee C2: 154.216.18[.]90:909 782404d138bf92399e852c3a6ab2840e C2: 154.216.18[.]90:909 & 67 juichangchi[.]online #Malware
English
3
10
28
14K
StrikeReady Labs
StrikeReady Labs@StrikeReadyLabs·
FCCCall.dmg, bit of Mac malware, beaconing to 185.235.241[.]208:1224. Color us shocked to see the "STARK INDUSTRIES" ASName. b8e69d6a766b9088d650e850a638d7ab7c9f59f4e24e2bc8eac41c380876b0d8 24b89c77eaeebd4b02c8e8ab6ad3bd7abaa18893ecd469a6a04eda5e374dd305
English
4
6
22
6.6K
Kse Proso
Kse Proso@KseProso·
We continue to see the activity of the Gigabud, which, without slowing down, already has 70+ commands. The #Gigabud mimics legitimate apps, including government and financial institution apps, and abuses screen capturing and #keylogger techniques to #access credentials and more.
Group-IB Threat Intelligence@GroupIB_TI

Thanks to #ESET for an in-depth overview of activity in the first half of 2024. In our research, we found that impersonations of Ethiopian, South African, Peruvian and Mexican applications are related to #Gigabud. Check out ESET’s post for more details: x.com/ESETresearch/s…

English
0
0
0
474
Kse Proso
Kse Proso@KseProso·
Group-IB TI uncovered a landing page used for distribution of BMANAGER modular #trojan, created by threat actor #Boolka. This page was a test run for a malware delivery platform based on the #BeEF framework. The analysis reveals the complexity of the #malware ecosystem.👇
Group-IB Global@GroupIB

Discover the latest on #Boolka, a #cyberthreat actor responsible for spreading #malware and stealing data through #webattacks. Learn about Boolka's methods and how we're fighting back. #InfoSec #CyberSecurity Read More : bit.ly/3RDYB2H

English
0
2
4
563
Kse Proso
Kse Proso@KseProso·
@ValidinLLC @500mk500 Yeah, I see additionally that this certificate with the CN email.instant-patch[.]online has 3 hosts - 104.168.203[.]161, 104.168.157[.]45 and 104.168.203[.]159. Interesting that there is another certificate, but different ports
Kse Proso tweet mediaKse Proso tweet mediaKse Proso tweet mediaKse Proso tweet media
English
2
0
1
164
Validin
Validin@ValidinLLC·
@500mk500 @KseProso Also: general-meeting[.]team private-meet[.]team Linked by 104.168.203[.]159, which returned a certificate with the CN email.instant-patch[.]online on 2024-04-25
Validin tweet media
English
2
0
1
182
Kse Proso
Kse Proso@KseProso·
The #Lazarus group is still active and creates #fake profiles on LinkedIn and Telegram to attract developers to make calls through malicious sites. Today @MichalKoczwara highlighted the fake NGC Ventures LinkedIn profile. But let's jump deeper to 104.168.157[.]45.
Kse Proso tweet media
English
3
34
73
10.5K
Kse Proso
Kse Proso@KseProso·
#APT group uses famous names: Fenbushi Capital, HashKey Capital, Waterdrip Capital. /fenbushi.regular-meeting.team /fenbushi.private-meet.online /liwoeson.online-meet.team /hashkey.online-meet.team /hashkey.online-meet.xyz /waterdrip.group-meeting.pro /signum.group-meeting.pro
English
2
0
9
978
Kse Proso
Kse Proso@KseProso·
Rising #Trojan Activity in #APAC: Keep an eye out for #GoldFactory and #Gigabud! These mobile Trojans are increasingly active in the region, posing a significant threat to mobile security.
Group-IB Threat Intelligence@GroupIB_TI

Following Group-IB's #GoldFactory report, it is clear that situation of mobile threats in #APAC persists. Though the report shared mainly on the "Gold-prefixed" trojans, the prevalence of #Gigabud in the region is not to be overlooked. There are increased sightings of Gigabud, especially in #Vietnam since late 2023 till present.

English
0
0
2
486
Kse Proso
Kse Proso@KseProso·
Often high-profile news about new leaks doesn't bring any reinforcement. You need to approach it with some criticality and check what they have written. Unfortunately, news agencies often don't check data, but that's what we are there for - to filter out and leave only important.
Group-IB Threat Intelligence@GroupIB_TI

🕵️‍♀️ Exposing the #DarkWeb deception. Since October 2022, the #ThreatActor known as "resetmyname" has been falsely advertising "unique customer databases" from numerous #banks on various Dark Web platforms. Regularly announcing "new bank customer databases" from many countries around the world, this activity has garnered significant media attention over time. @GroupIB's thorough analysis of all data samples that "resetmyname" has ever published or provided reveals that, in fact, TA has been selling data all this time from the publicly available database of the #BidenCash cardshop, which the cardshop itself published for promotional purposes back in June 2022. Detailed reports about "resetmyname" and "BidenCash" are available for Group-IB customers.

English
0
0
1
464
Kse Proso
Kse Proso@KseProso·
Group-IB flags #ResumeLooters hacking spree in APAC since early '23, using #SQL injections & #XSS to pilfer data from 65 sites, affecting users across India, Taiwan, Thailand, and Vietnam. Attacker accounts & data sale ads spotted in Chinese #hacking groups on Telegram.
Group-IB Threat Intelligence@GroupIB_TI

🚨 As promised, here's the full disclosure — Group-IB's TI unit uncovers #ResumeLooters, a malicious group targeting primarily #APAC's employment agencies & #retail firms. Read our blog for their tactics, #IoCs, and how to shield against #SQL injection and #XSS attacks: bit.ly/3SvCefp #Cybersecurity

English
0
0
3
348