Naoki Takayama

142 posts

Naoki Takayama

Naoki Takayama

@mopisec

A malware analyst, digital forensic investigator, and threat researcher. Conference speaker at BSides Tokyo, JSAC, and Virus Bulletin.

Japan Tham gia Eylül 2016
167 Đang theo dõi1.2K Người theo dõi
Naoki Takayama
Naoki Takayama@mopisec·
@kienbigmummy I haven't developed formal configuration extractor yet, but I shared analysis result of config's structure & C2 address's decryption routine in my company's blog post (unfortunately not available in English, so please machine translate it). sect.iij.ad.jp/blog/2026/02/p…
English
1
0
0
229
m4n0w4r
m4n0w4r@kienbigmummy·
@mopisec Yes!!! 🔥Did you write a configuration extractor? I'm thinking about it but haven't had time to delve deeper yet.
English
1
0
0
404
Naoki Takayama
Naoki Takayama@mopisec·
@58_158_177_102 すみません、公開作業時のミスでアクセスできない状態になっていました。 修正したので、開けるようになったと思います。
日本語
1
0
3
315
moto_sato
moto_sato@58_158_177_102·
Dropbox APIを使用する~ 見に行ったらなかった。。。
moto_sato tweet media
日本語
1
0
2
1.4K
Naoki Takayama
Naoki Takayama@mopisec·
@byrne_emmy12099 Great finding. Another (possible) related sample: a762d65c0d6f6345541485aeef35a3b331b1f69bace8452cf55026b301e963bd
Naoki Takayama tweet media
English
0
0
0
109
Emmy Byrne
Emmy Byrne@byrne_emmy12099·
Screenshot 2026-02-24 085012.scr c089457d5f4b22313b927bb36a320f8d7a1ddb6d5b82293dc2374dcfd4b1b8b2 *https://load.serverpit[.]com/fwrite.php 한국동서발전(ewp.co.kr) #APT #Suspicious
Emmy Byrne tweet mediaEmmy Byrne tweet mediaEmmy Byrne tweet media
한국어
2
10
24
2.7K
Naoki Takayama đã retweet
Michael R
Michael R@nahamike01·
UNC6384, Mustang Panda, and RedDelta have a lot in common: overlaps in tooling, targeting, and C2 procurement. This research identifies an active PlugX C2 cluster staged on a single ASN for a short window before being obscured by a proxy. Full analysis cyberandramen.net/2026/03/02/bef…
English
3
28
98
8.4K
Naoki Takayama đã retweet
LAB52
LAB52@LAB52io·
Check out our new post!!! PlugX Meeting Invitation via MSBuild and GDATA lab52.io/blog/plugx-mee…
English
0
13
29
5.3K
Naoki Takayama
Naoki Takayama@mopisec·
悪意のあるブラウザ拡張機能等を取得するダウンローダ型のマルウェアを観測しています。ご注意ください。 950ee5f83cf6f34544d448f03f75e7f2ba88fb45161b1b7458c5a81eafa00778 IoCs: - hxxps://lwebcontrol[.]com/nfront.php - hxxps://jtbelectronics[.]com/8h7qxBD/Lao10Azi1.bin
Naoki Takayama tweet mediaNaoki Takayama tweet mediaNaoki Takayama tweet media
日本語
1
44
218
25.1K
Naoki Takayama
Naoki Takayama@mopisec·
APTグループ Tianwu のマルウェアPangolin8RATおよびカスタムCobalt Strike Beaconに関するリサーチを採択いただきました。 参加予定の皆さま、よろしくお願いいたします。
Analysis Center@jpcert_ac

#JSAC2026 の全てのプログラムを公開しました。詳しくはタイムテーブルをご覧ください。 ^AS jsac.jpcert.or.jp/timetable.html

日本語
0
0
17
3.4K
Naoki Takayama
Naoki Takayama@mopisec·
Slide deck and recording of my presentation "Inside Pandora's Box: dissecting the latest arsenal and tactics of APT27" at #vb2025 is now available. Thank you to @virusbtn for organizing such an amazing conference!! youtu.be/TUATnkPEsnc virusbulletin.com/conference/vb2…
YouTube video
YouTube
Naoki Takayama@mopisec

Excited to announce that my talk "Inside Pandora's Box: Dissecting the latest arsenal and tactics of APT27" has been accepted at Virus Bulletin 2025 ( #vb2025 ) . I am looking forward to share my research everyone there! 🔗virusbulletin.com/conference/vb2…

English
0
15
39
11.3K