NexusFuzzy's profile picture. Infostealer hunter by night, threat actors’ headache 24/7. I track C2s, ruin botnets, and make cybercriminals rethink their life choices

NexusFuzzy 💩

@NexusFuzzy

Infostealer hunter by night, threat actors’ headache 24/7. I track C2s, ruin botnets, and make cybercriminals rethink their life choices

If you do not want your commands to show up in history on Linux, just prepend them with a space character. Probably worth checking echo $HISTCONTROL on (compromised) servers indicating that history might not be trusted #DFIR #IncidentResponse

NexusFuzzy's tweet image. If you do not want your commands to show up in history on Linux, just prepend them with a space character. Probably worth checking echo $HISTCONTROL on (compromised) servers indicating that history might not be trusted   #DFIR #IncidentResponse

NexusFuzzy 💩 reposted

Quck analysis of new #ToolShell payload observed by @leak_ix: Paylaod is a .dll executed in memory. Sha-256: 3461da3a2ddcced4a00f87dcd7650af48f97998a3ac9ca649d7ef3b7332bd997 It collects System Info and the sensitive machine key. Sends back in response. Single Request takeover.

Gi7w0rm's tweet image. Quck analysis of new #ToolShell payload observed by @leak_ix:
Paylaod is a .dll executed in memory.
Sha-256: 3461da3a2ddcced4a00f87dcd7650af48f97998a3ac9ca649d7ef3b7332bd997

It collects System Info and the sensitive machine key.
Sends back in response. Single Request takeover.

⚠️ New payload in the relation to #ToolShell . Attackers now don't need the static file anymore, leaking keys from memory without leaving the file. This means the existence of a file is not a reliable IoC anymore.



Those funky looking IP addresses already give it away that it‘s AI generated garbage

NexusFuzzy's tweet image. Those funky looking IP addresses already give it away that it‘s AI generated garbage

„Silent“… That shit lights up every alert dashboard like it‘s a christmas tree

🚨 1 COMMAND TO OWN AN ENTIRE NETWORK 🧠 Advanced Nmap Recon + Grep Filtering + Banner Fingerprinting nmap -n -Pn -sS -sV -p80 --open --script=banner -T5 192.168.1.0/24 -oG - | grep 'open' | grep -v 'tcpwrapped' ✅ Fast ✅ Silent ✅ Filters noise ✅ IDs Apache, IIS, embedded…

TheMsterDoctor1's tweet image. 🚨 1 COMMAND TO OWN AN ENTIRE NETWORK

🧠 Advanced Nmap Recon + Grep Filtering + Banner Fingerprinting

nmap -n -Pn -sS -sV -p80 --open --script=banner -T5 192.168.1.0/24 -oG - | grep 'open' | grep -v 'tcpwrapped'

✅ Fast
✅ Silent
✅ Filters noise
✅ IDs Apache, IIS, embedded…


I think my ChatGPT session had a stroke

NexusFuzzy's tweet image. I think my ChatGPT session had a stroke

#Archetyp market has been taken down by law enforcement during #OperationDeepSentinel operation-deepsentinel.com


At this point, ransomware gangs really need to implement proper role-based access control - can’t have every low-level script kiddie leaking victim data like it’s happy hour at the breach buffet. Maybe start with a Data Leak Prevention Officer?

🎁 Another unexpected gift for the threat intelligence community. In March 2025, the VanHelsing ransomware group first emerged. Now, in a surprising turn of events, the group’s administrator has leaked the entire source code on the RAMP forum. The leak includes Tor keys,…

PRODAFT's tweet image. 🎁 Another unexpected gift for the threat intelligence community.

In March 2025, the VanHelsing ransomware group first emerged. Now, in a surprising turn of events, the group’s administrator has leaked the entire source code on the RAMP forum. The leak includes Tor keys,…


NexusFuzzy 💩 reposted

This week, the FBI disrupted LummaC2, a popular infostealer service, which conducted millions of attacks against victims. With help from partners like Microsoft, the FBI is fulfilling its mission to disrupt key services in the cybercriminal ecosystem: justice.gov/opa/pr/justice…

FBI's tweet image. This week, the FBI disrupted LummaC2, a popular infostealer service, which conducted millions of attacks against victims. With help from partners like Microsoft, the FBI is fulfilling its mission to disrupt key services in the cybercriminal ecosystem: justice.gov/opa/pr/justice…

It‘s DNS I bet

Spain just suffered a full-scale telecom blackout. These are definitely cyber attacks!



NexusFuzzy's tweet image.

NexusFuzzy 💩 reposted

We're proud to announce our support for @CapeSandbox , a fully open-source malware sandbox developed and maintained by a dedicated group of volunteers. After almost a year of downtime, we are extremely happy that we were able to help CAPE get back online again! 🥳 👉…

abuse_ch's tweet image. We're proud to announce our support for @CapeSandbox , a fully open-source malware sandbox developed and maintained by a dedicated group of volunteers. After almost a year of downtime, we are extremely happy that we were able to help CAPE get back online again! 🥳

👉…

Coming soon, featuring your favorite security researchers like @Gi7w0rm and @g0njxa #RansomwareTycoon Wanting to get featured? Let me know :)

NexusFuzzy's tweet image. Coming soon, featuring your favorite security researchers like @Gi7w0rm and @g0njxa #RansomwareTycoon Wanting to get featured? Let me know :)
NexusFuzzy's tweet image. Coming soon, featuring your favorite security researchers like @Gi7w0rm and @g0njxa #RansomwareTycoon Wanting to get featured? Let me know :)
NexusFuzzy's tweet image. Coming soon, featuring your favorite security researchers like @Gi7w0rm and @g0njxa #RansomwareTycoon Wanting to get featured? Let me know :)

Man, that gives me milw0rm vibes. Also, if you remember milw0rm, please don't forget to book your annual colonoscopy!

NexusFuzzy's tweet image. Man, that gives me milw0rm vibes. Also, if you remember milw0rm, please don't forget to book your annual colonoscopy!

Spain just suffered a full-scale telecom blackout. These are definitely cyber attacks!



NexusFuzzy's tweet image. #Vidar #Infostealer vidars[.]su otx.alienvault.com/indicator/doma…

Cryptocurrency exchange Bybit (@Bybit_Official ) has suffered a security breach. Threat actors exploited a 'masked' transaction to siphon over $1.4 billion in Ethereum (ETH) and staked Ethereum (stETH) from one of the exchanges cold wallets.

vxdb's tweet image. Cryptocurrency exchange Bybit (@Bybit_Official ) has suffered a security breach. Threat actors exploited a 'masked' transaction to siphon over $1.4 billion in Ethereum (ETH) and staked Ethereum (stETH) from one of the exchanges cold wallets.


Loading...

Something went wrong.


Something went wrong.