somedieyoungZZ

162 posts

somedieyoungZZ banner
somedieyoungZZ

somedieyoungZZ

@IdaNotPro

butterfly effect

Subroutine شامل ہوئے Şubat 2024
391 فالونگ392 فالوورز
somedieyoungZZ ری ٹویٹ کیا
allisx86
allisx86@allisx86·
allisx86 tweet media
ZXX
10
180
3.1K
56.8K
somedieyoungZZ ری ٹویٹ کیا
J. A. Guerrero-Saade
J. A. Guerrero-Saade@juanandres_gs·
Sergey Mineev was the greatest APT hunter of all time. He sought no glory, he just loved the hunt. And his discoveries repeatedly redefined our collective knowledge of global cyberespionage.
Boris Larin@oct0xor

Heartbroken to hear about the passing of @Skvern0. He was one of the best threat hunters in the industry - even APTs were afraid of him. I’m grateful for the time we worked together and for everything I learned from him. Rest in peace.

English
0
22
201
29.7K
Boris Larin
Boris Larin@oct0xor·
Heartbroken to hear about the passing of @Skvern0. He was one of the best threat hunters in the industry - even APTs were afraid of him. I’m grateful for the time we worked together and for everything I learned from him. Rest in peace.
Boris Larin tweet media
English
27
50
556
77.1K
somedieyoungZZ ری ٹویٹ کیا
Ben
Ben@polygonben·
🚨Recent MuddyWater APT campaign, linked to Iranian intelligence, exposed by Ctrl-Alt-Intel 😬 - 10+ CVEs used - Custom-developed C2s - EtherHiding malware - Sensitive data stolen ctrlaltintel.com/threat%20resea… Super fun collab-ing with @ice_wzl_cyber to get this published 🔥
English
7
68
210
42.3K
somedieyoungZZ ری ٹویٹ کیا
Seongsu Park
Seongsu Park@unpacker·
Excited to share my latest research on APT37 (aka ScarCruft) and their evolving campaign targeting so-called "isolated" networks through a carefully orchestrated multi-stage infection chain. Key findings: ▶️Ruby-based loader: APT37 is deploying full Ruby runtimes with trojanized script to blend execution within legitimate environments. ▶️USB dead-drop technique: A refined removable media workflow bridges air-gapped segments, leveraging hidden directories to stage tasking and exfiltrate data. ▶️Cloud C2 evolution: The group has expanded its cloud abuse playbook, incorporating Zoho WorkDrive as an operational command-and-control channel. In this research, I detail the full intrusion lifecycle from the initial LNK lure to the deployment of the surveillance backdoors with technical breakdowns. Blog: zscaler.com/blogs/security…
Seongsu Park tweet mediaSeongsu Park tweet media
English
2
33
136
9.1K
somedieyoungZZ ری ٹویٹ کیا
NetAskari
NetAskari@NetAskari·
Chinese SEO's are apparently also scared of "Silver Fox", which is supposed to be a Chinese APT: 防止银狐等病毒群发诈骗领导和同事 ( "Prevent silver fox and other viruses from sending out mass fraud to defraud leaders and colleagues" ).
NetAskari tweet media
English
4
10
31
5.4K
R3BELF0X
R3BELF0X@goldenjackel12·
#Found Documents.vhdx (fdc778715530dbbe552828edb2571ce4) drops Protokol_KUAP_121_3.1_0915-2026.pdf.lnk (72b3c03d84ff2b0585f1866807396bf0), decoy pdf, etc.. probably targeting #Ukrainian @PrakkiSathwik @500mk500 @ElementalX2 @smica83 @polygonben @IdaNotPro
R3BELF0X tweet mediaR3BELF0X tweet media
R3BELF0X@goldenjackel12

1. #found Documents.vhdx (4bef3830a8e5252a7a3f1566970ccd9d) drop containing a malicious lnk(povidomlennia_kameralna_perevirka_DPSU.pdf.lnk)(4587075fd6a5d417278b368a92fee749) alongside a decoy pdf (povidomlennia_kameralna_perevirka_DPSU.pdf) probably targeting #Ukrainian

English
2
4
24
2.3K
somedieyoungZZ ری ٹویٹ کیا
Sh4dowExe
Sh4dowExe@Sh4dow3x3·
⚠️⚠️RAMP FORUM SEIZED !!!⚠️⚠️
Sh4dowExe tweet mediaSh4dowExe tweet media
English
7
26
188
28.4K
somedieyoungZZ ری ٹویٹ کیا
Abdulkadir | Cybersecurity
Abdulkadir | Cybersecurity@cyber_razz·
A cybersecurity beginner trying to choose a career path
Abdulkadir | Cybersecurity tweet media
English
46
118
1.1K
29.3K
somedieyoungZZ ری ٹویٹ کیا
IRIS C2
IRIS C2@C2IRIS·
The average “cyber threat intel” blogger
IRIS C2 tweet media
English
10
29
239
11.2K
somedieyoungZZ ری ٹویٹ کیا
BlueEye
BlueEye@BlueEye46572843·
[1/3] I retro hunted and identified more relevant samples on VT: - e7b2cc236af9edbe44307d293a7d7fcbb199a286f7eec864f363fcb725c7ef70 -4b795cf2352971f470db2e451ae62dc8c859ed7c4148be48c66a723062fed7a8 -4e1873f43c7c72625e627faa349e454ab81c15fc36d9c7dec1a422b4042b9407
ThreatBook@ThreatBookLabs

Threat Alert: #CharmingKitten — LNK-Based Loader Campaign with GitLab Payload Lure Filename: Bang_Tinh_Thue_2025.xlsx.lnk Payload Download: gitlab[.]com/zaahen/Zaahen/-/raw/main/i[.]zip ThreatBook Intelligence: na2.hubs.ly/H02-yBl0 [1/3]

HT
2
1
2
394
somedieyoungZZ ری ٹویٹ کیا
NtAlertThread
NtAlertThread@ElementalX2·
Suspected APT(?) targets Portuguese speaking individuals at Macao 🇲🇴 abuses DLL Sideloading but forgets to deliver loader DLL, ends up pasting the shellcode alone with decoy, idk? 😂🤷‍♂️
NtAlertThread tweet mediaNtAlertThread tweet mediaNtAlertThread tweet media
English
1
10
54
5.2K
somedieyoungZZ ری ٹویٹ کیا
blackorbird
blackorbird@blackorbird·
#Muddywater attempts to detect a wide range of antivirus and EDR tools by scanning for agent files, service names, and installation paths of more than 25 AV products. cloudsek.com/blog/reborn-in…
blackorbird tweet media
English
0
25
175
23.6K
somedieyoungZZ ری ٹویٹ کیا
The Hacker News
The Hacker News@TheHackersNews·
Iran-linked MuddyWater is running a new spear-phishing campaign using a Rust-based implant called RustyWater. The activity hits diplomatic, maritime, finance, and telecom targets in the Middle East, delivered via Word files that push victims to enable macros. 🔗 Details → thehackernews.com/2026/01/muddyw…
The Hacker News tweet media
English
6
27
125
14.1K