Adi_Cha_'s profile picture. Research Scientist -  @TrellixARC
Security Researcher | 
Blue Team | Red Team | Threat Hunting | Detection Engg.
🌌🔭
ExploitDB-GHDB-author ID=10689

Adithya Chandra

@Adi_Cha_

Research Scientist - @TrellixARC Security Researcher | Blue Team | Red Team | Threat Hunting | Detection Engg. 🌌🔭 ExploitDB-GHDB-author ID=10689

Repost di Adithya Chandra

Another scanner for the React vulnerability github.com/Malayke/Next.j…

cyb3rops's tweet image. Another scanner for the React vulnerability

github.com/Malayke/Next.j…
cyb3rops's tweet image. Another scanner for the React vulnerability

github.com/Malayke/Next.j…
cyb3rops's tweet image. Another scanner for the React vulnerability

github.com/Malayke/Next.j…

Repost di Adithya Chandra

"How to defend against AI powered attacks? How to defend against ransomware attacks? How to defend against APT attacks? How to defend against cyber attacks? " Over the years we’ve seen it all. There’s no real difference when it comes to protecting your org from these attacks.…

cyb3rops's tweet image. "How to defend against AI powered attacks? 
How to defend against ransomware attacks? 
How to defend against APT attacks? 
How to defend against cyber attacks? "

Over the years we’ve seen it all.
There’s no real difference when it comes to protecting your org from these attacks.…

Repost di Adithya Chandra

New backdoor called #kalim used by #muddywater APT group. multi-threaded C2 tool with AES encryption, file transfer capabilities, and persistent command execution sample: virustotal.com/gui/file/0c807… sample: virustotal.com/gui/file/2fb21… c2: moodleuni[.]com

MalGamy12's tweet image. New backdoor called #kalim used by #muddywater APT group. multi-threaded C2 tool with AES encryption, file transfer capabilities, and persistent command execution
sample: virustotal.com/gui/file/0c807…
sample: virustotal.com/gui/file/2fb21…
c2: moodleuni[.]com
MalGamy12's tweet image. New backdoor called #kalim used by #muddywater APT group. multi-threaded C2 tool with AES encryption, file transfer capabilities, and persistent command execution
sample: virustotal.com/gui/file/0c807…
sample: virustotal.com/gui/file/2fb21…
c2: moodleuni[.]com
MalGamy12's tweet image. New backdoor called #kalim used by #muddywater APT group. multi-threaded C2 tool with AES encryption, file transfer capabilities, and persistent command execution
sample: virustotal.com/gui/file/0c807…
sample: virustotal.com/gui/file/2fb21…
c2: moodleuni[.]com
MalGamy12's tweet image. New backdoor called #kalim used by #muddywater APT group. multi-threaded C2 tool with AES encryption, file transfer capabilities, and persistent command execution
sample: virustotal.com/gui/file/0c807…
sample: virustotal.com/gui/file/2fb21…
c2: moodleuni[.]com

Repost di Adithya Chandra

Path traversal via WinRAR drops Normal.dotm into Word templates - automatic execution on every Word launch. No user interaction needed after initial extraction. This combines archive handling vuln with Office persistence mechanism. Defenders need to monitor template directory…

#bitter Group used the WinRAR vulnerability CVE-2025-6218. When users decompress with a vulnerable WinRAR version, the special paths (constructed with ".. " spaces) in the compressed package release the malicious file Normal.dotm to…

blackorbird's tweet image. #bitter Group used the WinRAR vulnerability CVE-2025-6218.
When users decompress with a vulnerable WinRAR version, the special paths (constructed with ".. " spaces) in the compressed package release the malicious file Normal.dotm to…


Repost di Adithya Chandra

New Research! seqrite.com/blog/operation… We found Silent Lynx APT, making sluggish changes to their arsenal, adding Silent Loader, SilentSweeper & LAPLAS implant. The campaigns are targeted towards multiple other countries. Contains a lot of pivoting and other necessary details.

ElementalX2's tweet image. New Research!

seqrite.com/blog/operation…

We found Silent Lynx APT, making sluggish changes to their arsenal, adding Silent Loader, SilentSweeper & LAPLAS implant. The campaigns are targeted towards multiple other countries. Contains a lot of pivoting and other necessary details.
ElementalX2's tweet image. New Research!

seqrite.com/blog/operation…

We found Silent Lynx APT, making sluggish changes to their arsenal, adding Silent Loader, SilentSweeper & LAPLAS implant. The campaigns are targeted towards multiple other countries. Contains a lot of pivoting and other necessary details.
ElementalX2's tweet image. New Research!

seqrite.com/blog/operation…

We found Silent Lynx APT, making sluggish changes to their arsenal, adding Silent Loader, SilentSweeper & LAPLAS implant. The campaigns are targeted towards multiple other countries. Contains a lot of pivoting and other necessary details.
ElementalX2's tweet image. New Research!

seqrite.com/blog/operation…

We found Silent Lynx APT, making sluggish changes to their arsenal, adding Silent Loader, SilentSweeper & LAPLAS implant. The campaigns are targeted towards multiple other countries. Contains a lot of pivoting and other necessary details.

Repost di Adithya Chandra

💥 Wiz Research has uncovered a critical Redis vulnerability that's been hiding for 13 years We found RediShell (CVE-2025-49844): an RCE bug in Redis that affects every version of Redis out there. It's rated CVSS 10 - the highest severity possible. The vulnerability lets…

wiz_io's tweet image. 💥 Wiz Research has uncovered a critical Redis vulnerability that's been hiding for 13 years

We found RediShell (CVE-2025-49844): an RCE bug in Redis that affects every version of Redis out there. It's rated CVSS 10 - the highest severity possible.

The vulnerability lets…

Repost di Adithya Chandra

Threat actors are leveraging interest in the upcoming #FIFAWorldCup by registering domains that seem related to the event. But these sites promote fraudulent tickets, betting, gambling, pirated streaming and the distribution of unwanted apps. Details at bit.ly/4maHT7M

Unit42_Intel's tweet image. Threat actors are leveraging interest in the upcoming #FIFAWorldCup by registering domains that seem related to the event. But these sites promote fraudulent tickets, betting, gambling, pirated streaming and the distribution of unwanted apps. Details at bit.ly/4maHT7M
Unit42_Intel's tweet image. Threat actors are leveraging interest in the upcoming #FIFAWorldCup by registering domains that seem related to the event. But these sites promote fraudulent tickets, betting, gambling, pirated streaming and the distribution of unwanted apps. Details at bit.ly/4maHT7M
Unit42_Intel's tweet image. Threat actors are leveraging interest in the upcoming #FIFAWorldCup by registering domains that seem related to the event. But these sites promote fraudulent tickets, betting, gambling, pirated streaming and the distribution of unwanted apps. Details at bit.ly/4maHT7M
Unit42_Intel's tweet image. Threat actors are leveraging interest in the upcoming #FIFAWorldCup by registering domains that seem related to the event. But these sites promote fraudulent tickets, betting, gambling, pirated streaming and the distribution of unwanted apps. Details at bit.ly/4maHT7M

Repost di Adithya Chandra

A new attack on Linux is challenging everything we thought we knew. We found malware hidden not in the content, but in the filename itself. Read the full analysis. bit.ly/45sxajN

TrellixARC's tweet image. A new attack on Linux is challenging everything we thought we knew. We found malware hidden not in the content, but in the filename itself. Read the full analysis. bit.ly/45sxajN

Repost di Adithya Chandra

#AI-powered summary-related Chrome extensions are on the rise, posing serious #DataSecurity risks. We found multiple #BrowserExtensions sending sensitive user data (e.g., email, chat logs) to low-reputation domains. Examples at bit.ly/4maWFvN

Unit42_Intel's tweet image. #AI-powered summary-related Chrome extensions are on the rise, posing serious #DataSecurity risks. We found multiple #BrowserExtensions sending sensitive user data (e.g., email, chat logs) to low-reputation domains. Examples at bit.ly/4maWFvN
Unit42_Intel's tweet image. #AI-powered summary-related Chrome extensions are on the rise, posing serious #DataSecurity risks. We found multiple #BrowserExtensions sending sensitive user data (e.g., email, chat logs) to low-reputation domains. Examples at bit.ly/4maWFvN
Unit42_Intel's tweet image. #AI-powered summary-related Chrome extensions are on the rise, posing serious #DataSecurity risks. We found multiple #BrowserExtensions sending sensitive user data (e.g., email, chat logs) to low-reputation domains. Examples at bit.ly/4maWFvN
Unit42_Intel's tweet image. #AI-powered summary-related Chrome extensions are on the rise, posing serious #DataSecurity risks. We found multiple #BrowserExtensions sending sensitive user data (e.g., email, chat logs) to low-reputation domains. Examples at bit.ly/4maWFvN

Repost di Adithya Chandra

PathWiper malware using a classic lateral movement technique to spread: DCOM via Microsoft Excel. Our research team breaks down the attack flow and shows how Trellix NDR provides the visibility needed to stop it. 🛡️ bit.ly/4otiA3b

TrellixARC's tweet image. PathWiper malware using a classic lateral movement technique to spread: DCOM via Microsoft Excel. Our research team breaks down the attack flow and shows how Trellix NDR provides the visibility needed to stop it. 🛡️ bit.ly/4otiA3b

Repost di Adithya Chandra

Another artefact from the SharePoint exploitation (CVE-2025-53770) just showed up: 30955794792a7ce045660bb1e1917eef36f1d5865891b8110bf982382b305b27 virustotal.com/gui/file/30955… The PowerShell payload described in @eye_security’s write-up triggered multiple YARA rules in our…

cyb3rops's tweet image. Another artefact from the SharePoint exploitation (CVE-2025-53770) just showed up:

30955794792a7ce045660bb1e1917eef36f1d5865891b8110bf982382b305b27

virustotal.com/gui/file/30955…

The PowerShell payload described in @eye_security’s write-up triggered multiple YARA rules in our…
cyb3rops's tweet image. Another artefact from the SharePoint exploitation (CVE-2025-53770) just showed up:

30955794792a7ce045660bb1e1917eef36f1d5865891b8110bf982382b305b27

virustotal.com/gui/file/30955…

The PowerShell payload described in @eye_security’s write-up triggered multiple YARA rules in our…
cyb3rops's tweet image. Another artefact from the SharePoint exploitation (CVE-2025-53770) just showed up:

30955794792a7ce045660bb1e1917eef36f1d5865891b8110bf982382b305b27

virustotal.com/gui/file/30955…

The PowerShell payload described in @eye_security’s write-up triggered multiple YARA rules in our…

Wrote a set of YARA rules to detect the specific web shells dropped during the SharePoint CVE-2025-53770 exploitation. - Cleartext and compiled variants - Forensic artefacts in logs and on disk Hope it helps. Rules will be available in THOR Lite and THOR Cloud Lite shortly.…

cyb3rops's tweet image. Wrote a set of YARA rules to detect the specific web shells dropped during the SharePoint CVE-2025-53770 exploitation.

- Cleartext and compiled variants
- Forensic artefacts in logs and on disk

Hope it helps.

Rules will be available in THOR Lite and THOR Cloud Lite shortly.…
cyb3rops's tweet image. Wrote a set of YARA rules to detect the specific web shells dropped during the SharePoint CVE-2025-53770 exploitation.

- Cleartext and compiled variants
- Forensic artefacts in logs and on disk

Hope it helps.

Rules will be available in THOR Lite and THOR Cloud Lite shortly.…
cyb3rops's tweet image. Wrote a set of YARA rules to detect the specific web shells dropped during the SharePoint CVE-2025-53770 exploitation.

- Cleartext and compiled variants
- Forensic artefacts in logs and on disk

Hope it helps.

Rules will be available in THOR Lite and THOR Cloud Lite shortly.…


Repost di Adithya Chandra

sharepoint.payload.txt gist.github.com/gboddin/6374c0…

leak_ix's tweet image. sharepoint.payload.txt
gist.github.com/gboddin/6374c0…

Repost di Adithya Chandra

DMARC can reveal more domains associated with a target. dmarc.live/info/<target-domain> allows you to find domains using the same DMARC record. Check it out 👇 There's also a python tool: github.com/Tedixx/dmarc-s…


Repost di Adithya Chandra

Attackers are more frequently using Windows shortcut (LNK) files to distribute malware. We cover four main categories of LNK malware: exploit execution, malicious file execution, in-argument script execution and overlay execution. bit.ly/3InIu7C

Unit42_Intel's tweet image. Attackers are more frequently using Windows shortcut (LNK) files to distribute malware. We cover four main categories of LNK malware: exploit execution, malicious file execution, in-argument script execution and overlay execution. bit.ly/3InIu7C

Repost di Adithya Chandra

DoNot APT is still active! Our new blog uncovers their latest campaign targeting European government entities, utilizing spear-phishing tactics with Google Drive links to deploy malware such as the YTY Framework and GEdit. Read more: bit.ly/4lrxapN

TrellixARC's tweet image. DoNot APT is still active! Our new blog uncovers their latest campaign targeting European government entities, utilizing spear-phishing tactics with Google Drive links to deploy malware such as the YTY Framework and GEdit. Read more: bit.ly/4lrxapN

Repost di Adithya Chandra

Analyzing LNK malware? Unit 42 details the structure of LNK files, then dissects overlay content execution techniques and more. Learn how attackers exploit the flexibility of this file type. bit.ly/3InIu7C

Unit42_Intel's tweet image. Analyzing LNK malware? Unit 42 details the structure of LNK files, then dissects overlay content execution techniques and more. Learn how attackers exploit the flexibility of this file type. bit.ly/3InIu7C

Repost di Adithya Chandra

Credentials access via Shadow Snapshots, WMI and SMB, all done remotely. Technique implemented inside impacket framework accompanied with detection automation utilizing ETW providers: Microsoft-Windows-WMI-Activity + Microsoft-Windows-SMBServer. A technique developed by Peter…

SEKTOR7net's tweet image. Credentials access via Shadow Snapshots, WMI and SMB, all done remotely.

Technique implemented inside impacket framework accompanied with detection automation utilizing ETW providers: Microsoft-Windows-WMI-Activity + Microsoft-Windows-SMBServer.

A technique developed by Peter…
SEKTOR7net's tweet image. Credentials access via Shadow Snapshots, WMI and SMB, all done remotely.

Technique implemented inside impacket framework accompanied with detection automation utilizing ETW providers: Microsoft-Windows-WMI-Activity + Microsoft-Windows-SMBServer.

A technique developed by Peter…

Repost di Adithya Chandra

🚨 LockBit's admin panel hacked! Our analysis of the leaked data reveals surprising victimology (China & Taiwan), affiliate negotiation tactics, and the true — often inflated — earnings of a major RaaS operation. Read more by @j_tologon. bit.ly/4mVKnbr

TrellixARC's tweet image. 🚨 LockBit&apos;s admin panel hacked! Our analysis of the leaked data reveals surprising victimology (China &amp;amp; Taiwan), affiliate negotiation tactics, and the true — often inflated — earnings of a major RaaS operation. Read more by @j_tologon. bit.ly/4mVKnbr

Repost di Adithya Chandra

Windows SMB Client Elevation of Privilege Vulnerability CVSS Score: 8.8 Attack Vector: Network Attack Complexity: Low Privileges Required: Low User Interaction: None Do I have to say more? msrc.microsoft.com/update-guide/v…

cyb3rops's tweet image. Windows SMB Client Elevation of Privilege Vulnerability

CVSS Score: 8.8

Attack Vector: Network
Attack Complexity: Low
Privileges Required: Low
User Interaction: None

Do I have to say more? 

msrc.microsoft.com/update-guide/v…

Repost di Adithya Chandra

Zero-Day used by Stealth Falcon APT group in a spear-phishing campaign: 💥 .URL file exploitation (assigned CVE-2025-33053) 🧰 Custom Mythic implants, LOLBins, and custom payloads 🌍 High-profile targets across the Middle East and Africa research.checkpoint.com/2025/stealth-f…


Loading...

Something went wrong.


Something went wrong.