R3dHash's profile picture. Cyber Threat Intelligence | OSINT | Misinformation | Threat Hunting

dougy

@R3dHash

Cyber Threat Intelligence | OSINT | Misinformation | Threat Hunting

dougy reposted

We are excited that we were once again part in the coordinated international operation #OpEndgame 📣, taking action against the notorious information and credential stealer #Rhadamanthys 🕵️ We assisted in the takedown of threat actor infrastructure and share a full list of…

abuse_ch's tweet image. We are excited that we were once again part in the coordinated international operation  #OpEndgame 📣, taking action against the notorious information and credential stealer #Rhadamanthys 🕵️ We assisted in the takedown of threat actor infrastructure and share a full list of…

dougy reposted

Possible new leak of internal Conti / Trickbot chats A valuable dataset of internal communications that appears to be missing from public leaks. Some conversations are dated 2019. Not previously published in Conti-Leaks; partially overlaps with Trick-Leaks, but in a different…


dougy reposted

When you think there’s a new APT in town... Relax, it’s just our Red Team doing their thing (thanks to @Defte_ technique)😅 Want to improve your detections or challenge your team? Contact us!

⚠️ Our threat intel team just caught attackers using a clever new trick to bypass security tools: cache smuggling. Instead of downloading malware, they hide it in fake images that browsers automatically cache. Then PowerShell extracts and runs it—no web requests needed.

ExpelSecurity's tweet image. ⚠️ Our threat intel team just caught attackers using a clever new trick to bypass security tools: cache smuggling.

Instead of downloading malware, they hide it in fake images that browsers automatically cache. Then PowerShell extracts and runs it—no web requests needed.


dougy reposted

Proud to support our Law Enforcement partners in another successful cybercrime disruption: Operation SIMCARTEL Great work everyone involved 👏 europol.europa.eu/media-press/ne…

Shadowserver's tweet image. Proud to support our Law Enforcement partners in another successful cybercrime disruption:
Operation SIMCARTEL 

Great work everyone involved 👏

europol.europa.eu/media-press/ne…
Shadowserver's tweet image. Proud to support our Law Enforcement partners in another successful cybercrime disruption:
Operation SIMCARTEL 

Great work everyone involved 👏

europol.europa.eu/media-press/ne…

dougy reposted

⚠️ Breach Notification from F5 Networks: “In August 2025, we learned a highly sophisticated nation-state threat actor maintained long-term, persistent access to, and downloaded files from, certain F5 systems.” my.f5.com/manage/s/artic…


dougy reposted

Now you know why the China tab in the APT spreadsheet is the biggest one. You can only imagine the scale of damage their industrial espionage caused - and why some believe it’s far worse than anything ransomware groups ever did.

From software, equipment to materials, China is reconstructing an entire ecosystem inside the country

Xixi_2328857214's tweet image. From software, equipment to materials, China is reconstructing an entire ecosystem inside the country


dougy reposted

We are releasing details on BRICKSTORM malware activity, a China-based threat hitting US tech to potentially target downstream customers and hunt for data on vulnerabilities in products. This actor is stealthy, and we've provided a tool to hunt for them. cloud.google.com/blog/topics/th…


dougy reposted

Following the @volatility parity release, VolWeb v3.15.0 is now available with some new features like Linux “Explore” support. Checkout the release note here: forensicxlab.com/blog/volweb-3-… Project: github.com/k1nd0ne/VolWeb #DFIR

k1nd0ne's tweet image. Following the @volatility parity release, VolWeb v3.15.0 is now available with some new features like Linux “Explore” support.

Checkout the release note here: forensicxlab.com/blog/volweb-3-…

Project: github.com/k1nd0ne/VolWeb

#DFIR
k1nd0ne's tweet image. Following the @volatility parity release, VolWeb v3.15.0 is now available with some new features like Linux “Explore” support.

Checkout the release note here: forensicxlab.com/blog/volweb-3-…

Project: github.com/k1nd0ne/VolWeb

#DFIR
k1nd0ne's tweet image. Following the @volatility parity release, VolWeb v3.15.0 is now available with some new features like Linux “Explore” support.

Checkout the release note here: forensicxlab.com/blog/volweb-3-…

Project: github.com/k1nd0ne/VolWeb

#DFIR
k1nd0ne's tweet image. Following the @volatility parity release, VolWeb v3.15.0 is now available with some new features like Linux “Explore” support.

Checkout the release note here: forensicxlab.com/blog/volweb-3-…

Project: github.com/k1nd0ne/VolWeb

#DFIR

dougy reposted

CyberNews pushed the same fucking story last year. It's even written by the same author. You can't keep fear mongering people every time a Threat Actor assembles a data leak package

vxunderground's tweet image. CyberNews pushed the same fucking story last year. It's even written by the same author.

You can't keep fear mongering people every time a Threat Actor assembles a data leak package
vxunderground's tweet image. CyberNews pushed the same fucking story last year. It's even written by the same author.

You can't keep fear mongering people every time a Threat Actor assembles a data leak package

dougy reposted

An indictment was unsealed yesterday charging four foreign nationals with operating botnet services that targeted thousands of wireless internet routers. The conspirators allegedly amassed more than $46 million from selling access to infected routers. justice.gov/usao-ndok/pr/b…

FBI's tweet image. An indictment was unsealed yesterday charging four foreign nationals with operating botnet services that targeted thousands of wireless internet routers. The conspirators allegedly amassed more than $46 million from selling access to infected routers. justice.gov/usao-ndok/pr/b…

dougy reposted

Bearhost (aka UNDERGROUND and recently VOODOO SERVERS), alledgelly the "biggest bulletproof hosting" has decided to do an exit scam after several years of service, leaving a "farewell note" in forums and shutting down servers suddenly with no further reasons @spamhaus @abuse_ch

g0njxa's tweet image. Bearhost (aka UNDERGROUND and recently VOODOO SERVERS), alledgelly the "biggest bulletproof hosting" has decided to do an exit scam after several years of service, leaving a "farewell note" in forums and shutting down servers suddenly with no further reasons

@spamhaus @abuse_ch
g0njxa's tweet image. Bearhost (aka UNDERGROUND and recently VOODOO SERVERS), alledgelly the "biggest bulletproof hosting" has decided to do an exit scam after several years of service, leaving a "farewell note" in forums and shutting down servers suddenly with no further reasons

@spamhaus @abuse_ch
g0njxa's tweet image. Bearhost (aka UNDERGROUND and recently VOODOO SERVERS), alledgelly the "biggest bulletproof hosting" has decided to do an exit scam after several years of service, leaving a "farewell note" in forums and shutting down servers suddenly with no further reasons

@spamhaus @abuse_ch

dougy reposted

🚨 A major blow to ransomware ops: Medialand, a core BPH linked to Yalishanda (LARVA-34), exposed. Used by BlackBasta & others. Likely same actors behind Feb 11 BlackBasta leak. This leak offers rare, high-value insight into cybercriminal infrastructure. #ThreatIntel

PRODAFT's tweet image. 🚨 A major blow to ransomware ops: Medialand, a core BPH linked to Yalishanda (LARVA-34), exposed. Used by BlackBasta & others. Likely same actors behind Feb 11 BlackBasta leak. This leak offers rare, high-value insight into cybercriminal infrastructure. #ThreatIntel

dougy reposted

🚨 Ivanti Vulnerability (CVE-2025-22457) Actively Exploited Mandiant & Ivanti discovered active exploitation of a critical buffer overflow vulnerability in Ivanti Connect Secure VPN, leading to remote code execution. Patch now to secure your systems: bit.ly/4iTpKdD

Mandiant's tweet image. 🚨 Ivanti Vulnerability (CVE-2025-22457) Actively Exploited

Mandiant & Ivanti discovered active exploitation of a critical buffer overflow vulnerability in Ivanti Connect Secure VPN, leading to remote code execution.

Patch now to secure your systems: bit.ly/4iTpKdD

dougy reposted

🔎 [THREAD] – New analysis by Intrinsec Cyber Threat Intelligence on the latest operations by Russian-aligned intrusion sets #UAC0050 & #UAC0006📢 🔗 Our Report: intrinsec.com/wp-content/upl…


dougy reposted

Our Indicators of Compromise blog post for CVE-2025-2825, an authentication bypass affecting #CrushFTP. horizon3.ai/attack-researc…


dougy reposted

False positives happen - it’s just part of managing community-driven data! 🤷 But transparency is key, that's why we’ve rolled out a consolidated False Positive List... 🔍 Now you can identify false positives across our platforms via API, with CSV or JSON export options. Find…

abuse_ch's tweet image. False positives happen - it’s just part of managing community-driven data! 🤷 But transparency is key, that's why we’ve rolled out a consolidated False Positive List...

🔍 Now you can identify false positives across our platforms via API, with CSV or JSON export options. Find…

dougy reposted

🚨 Suspicious French-themed domains spotted in the Prospero OOO (RU) range! 🚨 A cluster of domains mimicking BNP Paribas, Ameli, La Poste, Netflix, and more—likely set up for fraud. Stay vigilant! 🕵️‍♂️ Examples: 15-bnpparibas[.]com 5-bnpparibas[.]com 8-bnpparibas[.]com…


dougy reposted

We have received the following comment from Kaspersky which we would like to share with you ⤵️ "Kaspersky is aware of the public claim about the company's allegedly providing services to a "bulletproof" web hosting provider. Kaspersky denies these claims as the company does not…


Loading...

Something went wrong.


Something went wrong.