Bohan Zhang

4.5K posts

Bohan Zhang banner
Bohan Zhang

Bohan Zhang

@bohansec

Threat Intelligence Analyst @esthreat 🚀🚀| Blue Teamer

شامل ہوئے Ağustos 2014
3.9K فالونگ2.1K فالوورز
پن کیا گیا ٹویٹ
Bohan Zhang
Bohan Zhang@bohansec·
Today marks my first day to work as a SOC analyst. Perhaps one thing I have learned over the years is to be persistent, never stop grinding, and chasing down your dream. Here is my timeline for me to achieve my dream.
Bohan Zhang tweet media
English
12
12
163
0
Bohan Zhang ری ٹویٹ کیا
Group-IB Threat Intelligence
The Gentlemen is a newly emerged Ransomware-as-a-Service (RaaS) operation consisting of approximately 20 members. Originating from a #Qilin payment dispute, the operator "hastalamuerte" had already developed a locker while still an affiliate. Their primary initial access? A database of ~14,700 compromised FortiGate devices (CVE-2024-55591) and over 900 brute-forced VPN credentials ready for deployment. #Ransomware #DFIR
Group-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet mediaGroup-IB Threat Intelligence tweet media
English
3
32
172
11.5K
Bohan Zhang ری ٹویٹ کیا
Chi-en (Ashley) Shen (@ashl3y-shen.bsky.social)
A lot of malware analysts, myself included, are building something similar, so it’s amazing to see a Docker environment already bundled with the tools, MCP backend, and skills. Definitely gonna try this. Thanks for sharing!!
Tim Blazytko@mr_phrazer

New blog post: Building a Pipeline for Agentic Malware Analysis Agentic RE + malware analysis with custom skills, MCP tooling, and persistent case state to automate intial triage Link: synthesis.to/2026/03/18/age… Github: github.com/mrphrazer/agen…

English
2
25
176
24.4K
Bohan Zhang ری ٹویٹ کیا
Squiblydoo
Squiblydoo@SquiblydooBlog·
Nice update to @anyrun_app that seems easy to miss: HTTPS decryption. If you look at the network traffic, click Network Threats, you can click into the analysis to see the decrypted traffic You can also just download the entire decrypted PCAP. 1/3
Squiblydoo tweet mediaSquiblydoo tweet media
English
1
18
80
6.9K
Bohan Zhang ری ٹویٹ کیا
Virus Bulletin
Virus Bulletin@virusbtn·
eSentire's TRU team investigated an open-directory web server attributed to the Iranian state-sponsored MuddyWater group and identified a file that deploys the Tsundere botnet, a suspected malware-as-a-service (MaaS) offering of Russian origin. esentire.com/blog/muddywate…
Virus Bulletin tweet media
English
1
5
26
2.1K
Bohan Zhang ری ٹویٹ کیا
YungBinary
YungBinary@YungBinary·
New blog! We found an open directory attributed to #MuddyWater Iranian APT and found vulnerabilities/victims they've been targeting, red-team tools, and a loader that deploys a persistent variant of #Tsundere botnet - a MaaS sold by a Russian threat actor that is known for using #EtherHiding to store C2 addresses on the Ethereum blockchain. esentire.com/blog/muddywate…
YungBinary tweet mediaYungBinary tweet media
English
0
28
141
10.2K
Bohan Zhang ری ٹویٹ کیا
blackorbird
blackorbird@blackorbird·
A cybercriminal gang that launched large-scale targeted attacks against the AI application ecosystem including #OpenClaw and Claude. The gang’s attack model has been identified as a typical threat paradigm in the AI application ecosystem, which is highly likely to be emulated by more cybercriminal groups in the future. Counterfeit installation page phishing via Google Ads Technical tutorial-based phishing Exploiting large model conversation sharing mechanisms Malicious Skills upload for supply chain attacks mp.weixin.qq.com/s/0M1sZq1HqwAA…
blackorbird tweet media
English
1
10
35
3.5K
Bohan Zhang ری ٹویٹ کیا
Virus Bulletin
Virus Bulletin@virusbtn·
G DATA's John Dador looks inside the infrastructure of a new ACRStealer variant and highlights evasion techniques, C2 communication, and its stealing capabilities. blog.gdatasoftware.com/2026/03/38385-…
Virus Bulletin tweet media
English
0
4
23
1.8K
Bohan Zhang ری ٹویٹ کیا
vx-underground
vx-underground@vxunderground·
A really really big company was confirmed to have been compromised. They primarily handle work-force outsourcing and call-center stuff. The amount of data this company possessed was SICKENING and over ONE PETABYTE of data was stolen. I'll do a write-up on it later. It'll take me 45 minutes to discuss everything that was stolen and how many things it impacts. Dawg, we have GOT TO STOP giving random companies user data.
English
46
120
1.4K
37.6K
Bohan Zhang ری ٹویٹ کیا
ZoomEye
ZoomEye@zoomeye_team·
🚨 Don't let AI Skills become your "Insider Threat"! Recent monitoring by Knownsec has identified 1,200+ active malicious Skills, fueling 63% of data-layer attacks and 31% of execution-layer threats. As traditional defenses fail in the AI era, we are proud to launch TrustTools—the secure, trusted distribution platform for AI Skills. We’re here to guard your AI Agent supply chain with rigorous admission standards! 🔗Link: trusttools.seebug.ai 📖 Deep Dive: Read our full analysis on the AI Agent supply chain security: x.com/zoomeye_team/s… #Openclaw #Skills #CyberSecurity #TrustTools
ZoomEye tweet media
English
0
9
11
2.3K
Bohan Zhang ری ٹویٹ کیا
blackorbird
blackorbird@blackorbird·
Telegram Hacktivist Activity Timeline of Iran – Israel & US War What started as DDoS campaigns against Israeli government sites quickly expanded into a global coalition of pro-Iranian, pro-Palestinian, and Russian-aligned collectives hitting Gulf states, European targets, and US infrastructure. This blog post tracks that activity day by day, since the first coalitions forming on March 1. socradar.io/blog/telegram-…
blackorbird tweet media
blackorbird@blackorbird

MuddyWater APT has launched a new cyber offensive operation, dubbed Operation Olalampo, deploying new malware variants and leveraging Telegram bots for command-and-control. Analysis of the campaign provides a glimpse into the group’s post-exploitation tactics, which largely align with their historical operations. group-ib.com/blog/muddywate…

English
3
8
37
5.2K
Bohan Zhang ری ٹویٹ کیا
Karsten Hahn
Karsten Hahn@struppigel·
I have said this quite a few times, but there is this misconception that the scanning engines on VT tell you whether the AV product detects the malware. They do not.
English
6
13
111
34.3K
Bohan Zhang ری ٹویٹ کیا
VMRay
VMRay@vmray·
🚨Alert: New cryptocurrency stealer likely written in Zig 🔬Report: vmray.com/analyses/vidar… We found a multi-stage infection chain delivering what appears to be a new cryptocurrency clipper, likely written in Zig. The infection begins with Vidar, which drops a heavily obfuscated AutoIt script that injects and executes the Zig-based stealer. This stealer resolves its C2 address through a BSC smart contract, a technique known as EtherHiding. Its primary purpose appears to be replacing cryptocurrency addresses in the clipboard with an attacker-controlled wallet. 🔎 In a nutshell: -Vidar → SFX → AutoIt Loader → Zig Crypto Stealer -The AutoIt script is heavily obfuscated, the next-stage payload is RC4-decrypted then LZNT1-decompressed at runtime before injection -Script contains junk code and performs multiple anti-sandbox and anti-AV checks, timing-based evasion, and a DNS request to a non-existing domain -C2 address is resolved via a BSC smart contract (EtherHiding) -Constantly polls clipboard for multiple cryptocurrency address formats: BTC, ETH, etc. -When a match is found: exfiltrates the victim's original address to the C2 and replaces it with attacker wallet -Likely written in Zig as some strings are uniquely associated with that language -Querying the attackers smart contract transactions, one can identify many more C2 addresses -In recent days the sample seems to drop a different payload, no longer the Zig crypto stealer 🧬 IoCs: -Zig sample SHA256: a82d031d99b15f8eb5a1d8cc24e55fec6d393d549edde8da9507f3cf17503ce1 -C2: quartermaster-sec[.]cc -Smart contract address: 0x7CC3cFC1Ac007B8c6566fD2C7419b15a75473468 via API endpoint hxxps[:]//data-seed-prebsc-1-s1[.]binance[.]org:8545 -Vidar sample SHA256: 62338c7764f4e82105ea52fab868e1f04dc2f54bb44c5a47ddac685eacd6ed3c -C2: 65.21.165[.]15 -Steam profile: hxxps[:]//steamcommunity[.]com/profiles/76561198736378968 🧩 More C2's from other smart contracts by the same creator: -artisan-advertising[.]cc -brain-game[.]cc -celebration-internet[.]cc -cmicrosoft1[.]click -devops-offensive[.]cc -ed-security-buff[.]cc -en.hugo-lapp[.]co -evil-toy[.]cc -fast-node[.]com -firewall-sentinel[.]cc -flame-guard[.]cc -kr.hugo-lapp[.]co -lavande-rocket[.]cc -quartermaster-sec[.]cc ⭐ Credits: Likely related sample documented by @0xfluxsec via fluxsec.red/analysing-an-A… (but their AutoIt script does not seem to drop the Zig crypto clipper highlighted here)
VMRay tweet mediaVMRay tweet mediaVMRay tweet mediaVMRay tweet media
English
0
19
84
6.4K
Bohan Zhang ری ٹویٹ کیا
Who said what?
Who said what?@g0njxa·
⚠️Watch out for a SEO poisoning campaign impersonating VMware vSphere downloads leveraging MeshCentral RMM tool bundled into fake installers targeting enterprise environments. Sample: dbfe1f915f40122a336cd5d0de802a6f3ec0204ab75321934a06dafbc1964446 Detonation: app.any.run/tasks/e0937ead… From malicious search results -> vmware-vsphere[.]com (associates, vmwarevsphere[.]com, vmware-remote-console[.]com, remote-console-vmware[.]com, vsphere-client[.]com, vsphere-client[.]org ) leading to vmware-repository[.]com A malicious build with EV signature issued to malicious signer "Pacex Learning Private Limited" (Globalsign) is delivered from Dropbox. The build connects to 103.65.230.86 (MeshCentral RMM C2) and installs legit VMware product as decoy
Who said what? tweet mediaWho said what? tweet mediaWho said what? tweet media
English
3
22
71
10.6K
Bohan Zhang ری ٹویٹ کیا
Virus Bulletin
Virus Bulletin@virusbtn·
eSentire's TRU analyses DEV#POPPER RAT & introduces a specialized automation tool for the deobfuscation of intermediary stagers. The RAT is attributed with high confidence to a North Korean state-sponsored APT group due to shared TTPs in similar campaigns. esentire.com/blog/north-kor…
Virus Bulletin tweet media
English
0
11
31
2.1K
Bohan Zhang ری ٹویٹ کیا
Billy Ellis
Billy Ellis@bellis1000·
I infected my iPhone with the ‘Coruna’ spyware. Here’s what I found. youtu.be/XQvZ2mLnZVI
YouTube video
YouTube
English
11
138
787
196.1K
Bohan Zhang ری ٹویٹ کیا
Kostas
Kostas@Kostastsale·
If true, this is VERY interesting! Iranian APT using deno for second stage execution. We caught this intrusion and will be making the data available in our Threat Hunting Labs that will be released next week! - @ThruntingLabs
MalwareHunterTeam@malwrhunterteam

@1ZRR4H @Kostastsale @ffforward @vxunderground After that detection from Microsoft, now @threatintel also connects the same Deno using malware samples to MuddyWater APT... Also in the same article, they suggest that some "Donald Gay" signed samples we have seen in recent weeks are also related to MuddyWater... 🤷‍♂️

English
0
8
57
8.4K
Bohan Zhang ری ٹویٹ کیا
Jamie Levy🦉
Jamie Levy🦉@gleeda·
🧵 We recently had an incident that involved a MuddyWater hands-on attacker who couldn't spell "administrators" Full timeline breakdown below. 1/
Jamie Levy🦉 tweet media
English
14
74
362
54.3K
Bohan Zhang ری ٹویٹ کیا
Virus Bulletin
Virus Bulletin@virusbtn·
The Microsoft Defender Security Research Team warns that fake AI assistant browser extensions can quietly collect full URLs, chat histories and browsing data from tools like ChatGPT and DeepSeek. microsoft.com/en-us/security…
Virus Bulletin tweet media
English
1
9
20
1.2K