lostpacket

40 posts

lostpacket

lostpacket

@_lostpacket_

Threat Researcher at @_CPResearch_

Sumali Nisan 2019
415 Sinusundan153 Mga Tagasunod
lostpacket nag-retweet
Check Point Research
Check Point Research@_CPResearch_·
🚨ALERT🚨 Gulf countries, Cyprus & Israel - A massive wave of IP camera scanning and exploitation from Iran-linked infrastructure. ✅ Patch to the latest version 🔐 Enforce strong, unique passwords and restrict external access Read More : research.checkpoint.com/2026/interplay…
Check Point Research tweet media
English
3
29
79
11K
lostpacket nag-retweet
Is Now on VT!
Is Now on VT!@Now_on_VT·
Is Now on VT! tweet media
ZXX
3
8
29
14.3K
lostpacket
lostpacket@_lostpacket_·
@_JohnHammond We reported this issue to Microsoft back in June, also talked about it at @labscon_io and @virusbtn — and, well, you already know how that turned out :)
English
0
0
2
575
John Hammond
John Hammond@_JohnHammond·
Previously there was a report of threat actors using .URL files pointed at a WebDAV server, which made for, air quotes, "remote code execution", and was tracked as CVE-2025-33053. Turns out, you can do the same thing with a regular Windows Shortcut. Video: youtu.be/1Ymnvd1uyzQ
YouTube video
YouTube
John Hammond tweet media
English
10
40
257
41.4K
lostpacket nag-retweet
Check Point Research
Check Point Research@_CPResearch_·
Unmasking the China-nexus #Storm2603 toolset that pre-dated the ToolShell wave. 📅Active since at least Apr 2025. 🔑Multiple ransomware deployed together: LockBit + Warlock. 💥Custom backdoors: ak47dns & ak47http. Read more --> research.checkpoint.com/2025/before-to…
English
1
33
49
8.1K
lostpacket nag-retweet
Check Point Research
Check Point Research@_CPResearch_·
🇮🇷🇮🇱 In their latest phishing campaigns, Iranian APT Educated Manticore poses as cybersecurity researchers and executives to target top tech academics in Israel: 🔗 Fake Google Meet meetings 🌐 Phishing kits as Single Page App with React 👉 Details: research.checkpoint.com/2025/iranian-e…
English
8
18
51
7.5K
lostpacket nag-retweet
Check Point Research
Check Point Research@_CPResearch_·
Zero-Day used by Stealth Falcon APT group in a spear-phishing campaign: 💥 .URL file exploitation (assigned CVE-2025-33053) 🧰 Custom Mythic implants, LOLBins, and custom payloads 🌍 High-profile targets across the Middle East and Africa research.checkpoint.com/2025/stealth-f…
English
0
106
262
43.5K
lostpacket nag-retweet
Check Point Research
Check Point Research@_CPResearch_·
Following the advisory, CPR shares an in-depth analysis of the malware attributed to Emennet Pasargad: 🐁 WezRat: a custom infostealer 🧀 Uses DLL modules for screenshots, keylogging, file theft, etc. 🐈 Over a year of activity and evolution Read more: 👉 research.checkpoint.com/2024/wezrat-ma…
FBI@FBI

The #FBI, @USTreasury, and @Israel_Cyber have released a joint #CybersecurityAdvisory on the Iranian cyber group Aria Sepehr Ayandehsazan aka Emennet Pasargad. Click for new tradecraft details, indicators, and mitigations: ic3.gov/CSA/2024/24103…

English
1
30
64
13K
lostpacket nag-retweet
Bernardo Quintero
Bernardo Quintero@bquintero·
20 years of VirusTotal: 2004-2024
Bernardo Quintero tweet mediaBernardo Quintero tweet mediaBernardo Quintero tweet mediaBernardo Quintero tweet media
English
25
92
531
30.6K
lostpacket
lostpacket@_lostpacket_·
@thepacketrat Duolingo always prepares you for the best case scenario. In others, Maria pours kefir into this salad and calls it a soup.
English
0
0
0
15
lostpacket
lostpacket@_lostpacket_·
While most associate this report with the Israel-Hamas conflict, the actor managed to infiltrate numerous high-profile targets throughout the Middle East in recent years. Given their track record of sharing access with disruptive malware operators, this is a region-wide concern.
Check Point Research@_CPResearch_

[4\5] ScarredManticore has been consistently targeting high-profile organizations in Saudi Arabia, UAE, Kuwait, Oman, Jordan, and Israel. The most commonly targeted sectors are Government and Telecommunications.

English
0
2
5
717
Daniel Lunghi
Daniel Lunghi@thehellu·
The blogpost is live again with an update to reflect the possibility that the MSI installer could have been modified and then redistributed. However, as it was not publicly available, that would imply that the threat actor retrieved it from a PK gov entity before weaponizing it
Daniel Lunghi tweet media
English
1
3
9
933
Daniel Lunghi
Daniel Lunghi@thehellu·
We found a probable supply chain attack on eOffice application developed by Pakistan government. It delivers #Shadowpad with an updated obfuscation and encryption scheme. The threat actor carefully chose the C&C to blend in legitimate network traffic trendmicro.com/en_us/research… #APT
Daniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet mediaDaniel Lunghi tweet media
English
3
49
100
46.6K
lostpacket nag-retweet
Greg Brooks
Greg Brooks@GregBrooksOH·
This coup could have been an email
English
33
954
6K
419.5K
lostpacket nag-retweet
Check Point Research
Check Point Research@_CPResearch_·
Amid the crisis in Azerbaijan’s breakaway region of Nagorno-Karabakh, our new report reveals Azerbaijani political surveillance using #OxtaRAT malware: 🕵️AutoIT/JPEG polyglot file 🎯Targets activists in Azerbaijan🇦🇿 and entities in Armenia🇦🇲 Read more >> research.checkpoint.com/2023/operation…
Check Point Research tweet media
English
3
46
101
15.4K
lostpacket
lostpacket@_lostpacket_·
Since the end of March, all the files submitted to VirusTotal from Donetsk and Luhansk regions are shown in their telemetry as ZZ country. @virustotal Any chance you can assist with geography to your geolocation services provider?
Check Point Research@_CPResearch_

#CloudAtlas continues its operations and during the last year narrows its targeting : 🎯Focus on Russia, Belarus and conflicted areas in Ukraine and Moldova 👾New DLL to proxy connections through the victims’ machines. 👉research.checkpoint.com/2022/cloud-atl…

English
0
13
17
0
lostpacket nag-retweet
Check Point Research
Check Point Research@_CPResearch_·
We Reveal 7 Years of #ScarletMimic Mobile Surveillance Campaign Targeting Uyghurs: 📱 More than 20 different Android samples 📄 Uyghur-related lures 👁️ Full surveillance capabilities 🤙 Conduct calls and SMS from victim's device Read More: research.checkpoint.com/2022/never-tru…
Check Point Research tweet media
English
0
16
37
0
Jiří Vinopal
Jiří Vinopal@vinopaljiri·
As today is my birthday and I already got the best gift from my new employer its time for a little announcement.I finished my career in military CERT and in next week I am joining #CheckPoint as Threat Researcher @_CPResearch_ @CheckPointSW. Living dream-looking forward to it😊🤗
Jiří Vinopal tweet media
English
52
10
294
0
lostpacket
lostpacket@_lostpacket_·
Thank you everyone who made #HagueTIX2022 happen. It was insightful, it was fun, and it had trains!
English
0
0
4
0