Tony Lambert

3.9K posts

Tony Lambert banner
Tony Lambert

Tony Lambert

@ForensicITGuy

Recovering sysadmin that now chases adversaries instead of uptime. Sr Malware Analyst @redcanary

Tennessee شامل ہوئے Kasım 2011
1.2K فالونگ6.1K فالوورز
Tony Lambert ری ٹویٹ کیا
Ferdous Saljooki
Ferdous Saljooki@malwarezoo·
In macOS Tahoe 26.4 Apple added a new security feature to Terminal that warns users of potentially malicious pastes with a "Possible malware, Paste blocked" prompt. Here how it actually works 🧵
Ferdous Saljooki tweet media
English
14
95
753
111.2K
Tony Lambert
Tony Lambert@ForensicITGuy·
Sometimes adversaries bring in their own tools, and if they leave behind a VM disk, analysis is fair game. In this post we look at some tools an adversary brought during a social engineering campaign. sprou.tt/1tw5BYzWIb1
English
1
2
10
1.1K
Tony Lambert ری ٹویٹ کیا
Threat Insight
Threat Insight@threatinsight·
In a revealing blog, we detail the #digitaltransformation of cargo theft: a criminal enterprise that leads to $34 billion in annual losses. Threat actors are combining #socialengineering w/ transportation industry knowledge to steal real physical goods. brnw.ch/21wX9UA
English
1
3
3
566
Tony Lambert ری ٹویٹ کیا
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
In early October 2025, Microsoft disrupted a Vanilla Tempest campaign by revoking over 200 certificates that the threat actor had fraudulently signed and used in fake Teams setup files to deliver the Oyster backdoor and ultimately deploy Rhysida ransomware. We identified this Vanilla Tempest campaign in late September 2025, following several months of the threat actor using fraudulently signed binaries in attacks. In addition to revoking certificates, Microsoft Defender Antivirus detects the fake setup files, Oyster backdoor, and Rhysida ransomware, and Microsoft Defender for Endpoint detects Vanilla Tempest TTPs. Vanilla Tempest, tracked by other security vendors as VICE SPIDER and Vice Society, is a financially motivated actor that focuses on deploying ransomware and exfiltrating data for extortion. The threat actor has used various ransomware payloads, including BlackCat, Quantum Locker, and Zeppelin, but more recently has been primarily deploying Rhysida ransomware. In this campaign, Vanilla Tempest used fake MSTeamsSetup.exe files hosted on malicious domains mimicking Microsoft Teams, for example, teams-download[.]buzz, teams-install[.]run, or teams-download[.]top. Users are likely directed to malicious download sites using search engine optimization (SEO) poisoning. Running the fake Microsoft Teams setups delivered a loader, which in turn delivered a fraudulently signed Oyster backdoor. Vanilla Tempest has incorporated Oyster into their attacks as early as June 2025, but they started fraudulently signing these backdoors in early September 2025. To fraudulently sign the fake installers and post-compromise tools, Vanilla Tempest was observed using Trusted Signing, as well as SSL[.]com, DigiCert, and GlobalSign code signing services. Fully enabled Microsoft Defender Antivirus blocks this threat. In addition to detections, Microsoft Defender for Endpoint has additional guidance for mitigating and investigating this attack. While these protections help secure our customers, we’re sharing this intelligence broadly to help strengthen defenses and improve resilience across the entire cybersecurity community.
Microsoft Threat Intelligence tweet media
English
5
51
143
38.7K
Tony Lambert
Tony Lambert@ForensicITGuy·
It's not just you, most of the macOS stealers look the same nowadays, but there are subtle differences between stealer families to tell them apart. If you're a stickler for detail like us, you might enjoy this post showing differences between the malware. sprou.tt/1cb631gju8p
English
0
12
51
5.3K
Tony Lambert ری ٹویٹ کیا
Squiblydoo
Squiblydoo@SquiblydooBlog·
"FUD" from VirusTotal. Signed, 112 MB file. Lets analyze. File is SingleFile .NET; I see this with Malcat: Debug and Exports indicate it is SingleFile (green arrows in image) Also, Malcat carved 270 PE out of the overlay (blue arrow), indicative of SingleFile .NET 1/8
Squiblydoo tweet mediaSquiblydoo tweet media
MalwareHunterTeam@malwrhunterteam

"Armstrong Systems & Consulting Inc." (Microsoft given cert) signed "OrderConfirmation_[PROTECTED].exe" sample: a0e687868361593a50b09f28cb8be4c61d00aa6335d321188399adf38b4e1b28

English
1
19
48
9.8K
Tony Lambert ری ٹویٹ کیا
Squiblydoo
Squiblydoo@SquiblydooBlog·
"FUD" Hijackloader signed "MRDUFORT VENTES/SERVICE INC." 38c60fd0e51b21b580552430f1ef55b7a41a1c6894ee61edc0707644d6c0b977 Binary is inflated to 600MB (image 2, malcat shows 630MB overlay.) Clicking into it shows repeated bytes (image 3), which Debloat can process (image 4) 1/2
Squiblydoo tweet mediaSquiblydoo tweet mediaSquiblydoo tweet mediaSquiblydoo tweet media
English
2
8
41
2.9K
Tony Lambert ری ٹویٹ کیا
Applied Network Defense
Applied Network Defense@NetworkDefense·
In our latest Analyst Skills Vault Lesson, Michael Fischler steps through analysis of the LummaC2 MaaS Infostealer. He'll demonstrate several tools and strategies for breaking down the malware's intent.
Applied Network Defense tweet media
English
1
3
15
1.2K
Tony Lambert ری ٹویٹ کیا
Red Canary, a Zscaler company
Just 2 days until the next session in our Detection Series! This time, we’re covering all things initial access — and how to better defend against these evolving tactics. 🎯 This session is a must-attend for blue teams and threat analysts. ➡️ Register now before the last-minute spots fill up: bit.ly/4df8VYx
Red Canary, a Zscaler company tweet media
English
0
1
14
1.4K
Tony Lambert ری ٹویٹ کیا
Red Canary, a Zscaler company
✨ Red Canary ➕ @zscaler Today we are announcing Zscaler’s agreement to acquire Red Canary. It’s a major milestone in our journey. This is a significant step forward in our mission to improve security operations, not just for our customers, but for the entire cybersecurity community. 🧵⬇️
Red Canary, a Zscaler company tweet media
English
4
44
178
26.2K
Tony Lambert ری ٹویٹ کیا
Applied Network Defense
Applied Network Defense@NetworkDefense·
In our latest Analyst Skills Vault lesson, @ForensicITGuy walks through a dynamic analysis of the Meduza Stealer Malware, focusing on host-based artifacts.
Applied Network Defense tweet media
English
1
6
11
1.4K
Tony Lambert ری ٹویٹ کیا
Red Canary, a Zscaler company
JUST IN: Red Canary Intel has observed activity exploiting a newly-documented unrestricted file upload vulnerability in SAP NetWeaver Visual Composer, software used to develop enterprise applications for business analysts. 🔗 Read our blog for detection opportunities and indicators of compromise: bit.ly/3RF2STl
English
0
13
44
2.5K
Tony Lambert ری ٹویٹ کیا
VMRay
VMRay@vmray·
Threat Detection Highlights Webinar series – April Edition: This month’s session is extra special. zoom.us/webinar/regist… We're excited to welcome Tony Lambert @ForensicITGuy , Senior Malware Analyst at @redcanary, known for his sharp research and impactful community contributions. Joining him is Patrick Staubmann from @vmray Labs, who will bring his researcher’s lens to the latest detection techniques and platform updates. On the agenda: 🧠 Detecting CPU property queries via registry (new VTI) 🕵️‍♂️ Anti-sandbox YARA rules: Latrodectus, Hijackloader & "Paste & Run" 💥 Ransomware-focused YARA detection 🐀 RAT config extraction + DNS tunneling ⚡ Quick sandbox demo 🎯 Save your seat now — you won’t want to miss this deep dive into the latest threat detection techniques: zoom.us/webinar/regist…
VMRay tweet media
English
0
5
10
1.1K
Tony Lambert ری ٹویٹ کیا
Chrome for Developers
Chrome for Developers@ChromiumDev·
Chrome 136 now has enhanced cookie security 🍪 → goo.gle/3DMf5SS Changes to remote debugging switches protect your data. Find out how the --remote-debugging-port and --remote-debugging-pipe switches are now being handled.
Chrome for Developers tweet media
English
2
7
29
4.5K
Tony Lambert ری ٹویٹ کیا
Tanner
Tanner@wbmmfq·
PSA: if you use an MDR/MSSP, name your servers, or at the very least your DCs, descriptively. Cutesy names aren't gonna be helpful when we're in the middle of a hands-on intrusion and we have to decide whether or not to lock down your whole network.
English
10
3
59
5.9K