HackrAnalytics's profile picture. Expert cybersecurity services. Chicago based, serving customers globally. 

Get in touch 👇

Hacker Analytics

@HackrAnalytics

Expert cybersecurity services. Chicago based, serving customers globally. Get in touch 👇

Lazarus group activity

#APT #Lazarus uses ClickFix technique to deliver malware with disguised name of Nvidia f9e18687a38e968811b93351e9fca089 a4e58b91531d199f268c5ea02c7bf456 hxxps://driverservices.store/visiodrive/nvidiaRelease.zip hxxp://45.159.248.110 103.231.75.101:8888

RedDrip7's tweet image. #APT #Lazarus uses ClickFix technique to deliver malware with disguised name of Nvidia

f9e18687a38e968811b93351e9fca089
a4e58b91531d199f268c5ea02c7bf456

hxxps://driverservices.store/visiodrive/nvidiaRelease.zip
hxxp://45.159.248.110
103.231.75.101:8888
RedDrip7's tweet image. #APT #Lazarus uses ClickFix technique to deliver malware with disguised name of Nvidia

f9e18687a38e968811b93351e9fca089
a4e58b91531d199f268c5ea02c7bf456

hxxps://driverservices.store/visiodrive/nvidiaRelease.zip
hxxp://45.159.248.110
103.231.75.101:8888
RedDrip7's tweet image. #APT #Lazarus uses ClickFix technique to deliver malware with disguised name of Nvidia

f9e18687a38e968811b93351e9fca089
a4e58b91531d199f268c5ea02c7bf456

hxxps://driverservices.store/visiodrive/nvidiaRelease.zip
hxxp://45.159.248.110
103.231.75.101:8888
RedDrip7's tweet image. #APT #Lazarus uses ClickFix technique to deliver malware with disguised name of Nvidia

f9e18687a38e968811b93351e9fca089
a4e58b91531d199f268c5ea02c7bf456

hxxps://driverservices.store/visiodrive/nvidiaRelease.zip
hxxp://45.159.248.110
103.231.75.101:8888


BlackSuit affiliates watching the FBI drain their crypto wallets


Hacker Analytics reposted

According to the New York Times, the Russian government is responsible for compromising the United States legal document management system. They specifically mentioned PACER. The New York Times provided little evidence to support these claims other than "according to a person…


Our CTI command center.

HackrAnalytics's tweet image. Our CTI command center.

Great quick tutorial

How to find viable targets for client-side desync attacks: 1️⃣ Open Burp Suite and intercept requests. 2️⃣ Choose an endpoint that wouldn't usually expect a POST request (e.g GET) and send it to repeater. 3️⃣ Go to Inspector > Request Attributes > Protocol field > Upgrade to…



Looks like our feathery friend is giving off some 'cyber vibes'! 🦜💻

Something strangely familiar about this bird 🦜 Makes me want to hack something 🤔

intigriti's tweet image. Something strangely familiar about this bird 🦜

Makes me want to hack something 🤔


Hacker Analytics reposted

StackOverflow is in the midst of a civil war. Recently StackOverflow established a partnership with OpenAI. Users have begun to rebel against this by deleting answers. StackOverflow has retaliated by doing sweeping bans tomshardware.com/tech-industry/…


Hacker Analytics reposted

If you've ever been curious about how people are hacking cars, check out this fascinating training over at Hackers Arise. Learn key fob hacking with SDR and CAN protocol hacking. hackers-arise.com/online-store/C… @three_cube

alita53390030's tweet image. If you've ever been curious about how people are hacking cars, check out this fascinating training over at Hackers Arise.

Learn key fob hacking with SDR and CAN protocol hacking.

hackers-arise.com/online-store/C…

@three_cube

Hacker Analytics reposted

QCSuper is a tool communicating with Qualcomm-based phones and modems, allowing to capture raw 2G/3G/4G radio frames, among other things. github.com/P1sec/QCSuper #mobilesecurity #androidsecurity #infosec

ptracesecurity's tweet image. QCSuper is a tool communicating with Qualcomm-based phones and modems, allowing to capture raw 2G/3G/4G radio frames, among other things. github.com/P1sec/QCSuper #mobilesecurity #androidsecurity #infosec

Hacker Analytics reposted

Reclaim your data. Follow @Logos_network

Logos_network's tweet image. Reclaim your data. Follow @Logos_network

Hacker Analytics reposted

Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles github.com/RedSiege/AutoF… #Pentesting #CyberSecurity #Infosec

ptracesecurity's tweet image. Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles github.com/RedSiege/AutoF…  #Pentesting #CyberSecurity #Infosec

Hacker Analytics reposted

1/4: We've uncovered a malicious version of #LedgerLive circulating in the wild. The threat actors behind the #AMOS #stealer are advertising a fake #Ledger app that replaces the original upon execution, remaining permanently within the system and stealing users' seed phrases.

moonlock_lab's tweet image. 1/4: We've uncovered a malicious version of #LedgerLive circulating in the wild. The threat actors behind the #AMOS #stealer are advertising a fake #Ledger app that replaces the original upon execution, remaining permanently within the system and stealing users' seed phrases.
moonlock_lab's tweet image. 1/4: We've uncovered a malicious version of #LedgerLive circulating in the wild. The threat actors behind the #AMOS #stealer are advertising a fake #Ledger app that replaces the original upon execution, remaining permanently within the system and stealing users' seed phrases.
moonlock_lab's tweet image. 1/4: We've uncovered a malicious version of #LedgerLive circulating in the wild. The threat actors behind the #AMOS #stealer are advertising a fake #Ledger app that replaces the original upon execution, remaining permanently within the system and stealing users' seed phrases.

United States Trends

Loading...

Something went wrong.


Something went wrong.