Naoki Takayama

142 posts

Naoki Takayama

Naoki Takayama

@mopisec

A malware analyst, digital forensic investigator, and threat researcher. Conference speaker at BSides Tokyo, JSAC, and Virus Bulletin.

Japan Sumali Eylül 2016
167 Sinusundan1.2K Mga Tagasunod
Naoki Takayama
Naoki Takayama@mopisec·
@kienbigmummy I haven't developed formal configuration extractor yet, but I shared analysis result of config's structure & C2 address's decryption routine in my company's blog post (unfortunately not available in English, so please machine translate it). sect.iij.ad.jp/blog/2026/02/p…
English
1
0
0
229
m4n0w4r
m4n0w4r@kienbigmummy·
@mopisec Yes!!! 🔥Did you write a configuration extractor? I'm thinking about it but haven't had time to delve deeper yet.
English
1
0
0
404
Naoki Takayama
Naoki Takayama@mopisec·
@58_158_177_102 すみません、公開作業時のミスでアクセスできない状態になっていました。 修正したので、開けるようになったと思います。
日本語
1
0
3
315
moto_sato
moto_sato@58_158_177_102·
Dropbox APIを使用する~ 見に行ったらなかった。。。
moto_sato tweet media
日本語
1
0
2
1.4K
Naoki Takayama
Naoki Takayama@mopisec·
@byrne_emmy12099 Great finding. Another (possible) related sample: a762d65c0d6f6345541485aeef35a3b331b1f69bace8452cf55026b301e963bd
Naoki Takayama tweet media
English
0
0
0
109
Emmy Byrne
Emmy Byrne@byrne_emmy12099·
Screenshot 2026-02-24 085012.scr c089457d5f4b22313b927bb36a320f8d7a1ddb6d5b82293dc2374dcfd4b1b8b2 *https://load.serverpit[.]com/fwrite.php 한국동서발전(ewp.co.kr) #APT #Suspicious
Emmy Byrne tweet mediaEmmy Byrne tweet mediaEmmy Byrne tweet media
한국어
2
10
24
2.7K
Naoki Takayama nag-retweet
Michael R
Michael R@nahamike01·
UNC6384, Mustang Panda, and RedDelta have a lot in common: overlaps in tooling, targeting, and C2 procurement. This research identifies an active PlugX C2 cluster staged on a single ASN for a short window before being obscured by a proxy. Full analysis cyberandramen.net/2026/03/02/bef…
English
3
28
98
8.4K
Naoki Takayama nag-retweet
LAB52
LAB52@LAB52io·
Check out our new post!!! PlugX Meeting Invitation via MSBuild and GDATA lab52.io/blog/plugx-mee…
English
0
13
29
5.3K
Naoki Takayama
Naoki Takayama@mopisec·
悪意のあるブラウザ拡張機能等を取得するダウンローダ型のマルウェアを観測しています。ご注意ください。 950ee5f83cf6f34544d448f03f75e7f2ba88fb45161b1b7458c5a81eafa00778 IoCs: - hxxps://lwebcontrol[.]com/nfront.php - hxxps://jtbelectronics[.]com/8h7qxBD/Lao10Azi1.bin
Naoki Takayama tweet mediaNaoki Takayama tweet mediaNaoki Takayama tweet media
日本語
1
44
218
25.1K
Naoki Takayama
Naoki Takayama@mopisec·
APTグループ Tianwu のマルウェアPangolin8RATおよびカスタムCobalt Strike Beaconに関するリサーチを採択いただきました。 参加予定の皆さま、よろしくお願いいたします。
Analysis Center@jpcert_ac

#JSAC2026 の全てのプログラムを公開しました。詳しくはタイムテーブルをご覧ください。 ^AS jsac.jpcert.or.jp/timetable.html

日本語
0
0
17
3.4K
Naoki Takayama
Naoki Takayama@mopisec·
Slide deck and recording of my presentation "Inside Pandora's Box: dissecting the latest arsenal and tactics of APT27" at #vb2025 is now available. Thank you to @virusbtn for organizing such an amazing conference!! youtu.be/TUATnkPEsnc virusbulletin.com/conference/vb2…
YouTube video
YouTube
Naoki Takayama@mopisec

Excited to announce that my talk "Inside Pandora's Box: Dissecting the latest arsenal and tactics of APT27" has been accepted at Virus Bulletin 2025 ( #vb2025 ) . I am looking forward to share my research everyone there! 🔗virusbulletin.com/conference/vb2…

English
0
15
39
11.3K