SwitchToThread's profile picture.

unpack64

@SwitchToThread

🇧🇷BTMOB custom module: sets up OkHttp WebSocket C2, pings/redirects C2, then executes JSON-driven ops: screen stream/control, mic capture, file search/move/upload (chunked b64 + ZIP), browser/notification/lock overlays, call-forwarding, local proxy, terminal shell, and injection…

SwitchToThread's tweet image. 🇧🇷BTMOB custom module: sets up OkHttp WebSocket C2, pings/redirects C2, then executes JSON-driven ops: screen stream/control, mic capture, file search/move/upload (chunked b64 + ZIP), browser/notification/lock overlays, call-forwarding, local proxy, terminal shell, and injection…

#Malware #Android - BTMOB 🧑‍🎄 Apuntando a Brasil 🇧🇷🎯 Site hxxps://191[.]101[.]131[.]165/magia-cristalina/ C2 hxxp://209[.]50[.]227.162/yaarsa/private/yarsap_80541.php 209[.]50[.]227[.]162:8080

Merlax_'s tweet image. #Malware #Android - BTMOB 🧑‍🎄

Apuntando a Brasil 🇧🇷🎯

Site
hxxps://191[.]101[.]131[.]165/magia-cristalina/

C2
hxxp://209[.]50[.]227.162/yaarsa/private/yarsap_80541.php
209[.]50[.]227[.]162:8080
Merlax_'s tweet image. #Malware #Android - BTMOB 🧑‍🎄

Apuntando a Brasil 🇧🇷🎯

Site
hxxps://191[.]101[.]131[.]165/magia-cristalina/

C2
hxxp://209[.]50[.]227.162/yaarsa/private/yarsap_80541.php
209[.]50[.]227[.]162:8080
Merlax_'s tweet image. #Malware #Android - BTMOB 🧑‍🎄

Apuntando a Brasil 🇧🇷🎯

Site
hxxps://191[.]101[.]131[.]165/magia-cristalina/

C2
hxxp://209[.]50[.]227.162/yaarsa/private/yarsap_80541.php
209[.]50[.]227[.]162:8080
Merlax_'s tweet image. #Malware #Android - BTMOB 🧑‍🎄

Apuntando a Brasil 🇧🇷🎯

Site
hxxps://191[.]101[.]131[.]165/magia-cristalina/

C2
hxxp://209[.]50[.]227.162/yaarsa/private/yarsap_80541.php
209[.]50[.]227[.]162:8080


unpack64 reposted

Another Brazilian #Magecart observed: first GTM (dropper) spawns a second GTM (maps dataLayer: products, InitiateCheckout, Purchase) then a typo-squatted CDN loads a skimmer that hooks payment inputs for exfiltration. #CTI #LATAM

_eremit4's tweet image. Another Brazilian #Magecart observed: first GTM (dropper) spawns a second GTM (maps dataLayer: products, InitiateCheckout, Purchase) then a typo-squatted CDN loads a skimmer that hooks payment inputs for exfiltration. #CTI #LATAM
_eremit4's tweet image. Another Brazilian #Magecart observed: first GTM (dropper) spawns a second GTM (maps dataLayer: products, InitiateCheckout, Purchase) then a typo-squatted CDN loads a skimmer that hooks payment inputs for exfiltration. #CTI #LATAM

POST /api/event?event=pwaOpen HTTP/2 Host: nubanktrading[.]site Cookie: piuiding6cq=xxxxxxxxxxxxxxxx; pcpn4bdt0w=pwa; pwaid5n52de=xxxxxxxxx; splitidfnp8kv=-1; fpvdate1uehvj=2025-10-06; sdata6yo0lp=xxxxxxxxxxxxxxxx Origin: https://nubanktrading[.]site Referer:…

SwitchToThread's tweet image. POST /api/event?event=pwaOpen HTTP/2
Host: nubanktrading[.]site
Cookie: piuiding6cq=xxxxxxxxxxxxxxxx; pcpn4bdt0w=pwa; pwaid5n52de=xxxxxxxxx; splitidfnp8kv=-1; fpvdate1uehvj=2025-10-06; sdata6yo0lp=xxxxxxxxxxxxxxxx
Origin: https://nubanktrading[.]site
Referer:…

🇧🇷 #phishing Nubank atendimentonubank[.]site avalaianubank[.]site checkout-nubank[.]online comprovantenubank[.]online indeniza-nubank[.]site indenizacaonubank[.]site indenizacaonubankoficial[.]online indenizanubank[.]online indenizanubank[.]shop indenizanubank[.]site…

SwitchToThread's tweet image. 🇧🇷 #phishing Nubank

atendimentonubank[.]site
avalaianubank[.]site
checkout-nubank[.]online
comprovantenubank[.]online
indeniza-nubank[.]site
indenizacaonubank[.]site
indenizacaonubankoficial[.]online
indenizanubank[.]online
indenizanubank[.]shop
indenizanubank[.]site…


🇧🇷 #phishing Nubank atendimentonubank[.]site avalaianubank[.]site checkout-nubank[.]online comprovantenubank[.]online indeniza-nubank[.]site indenizacaonubank[.]site indenizacaonubankoficial[.]online indenizanubank[.]online indenizanubank[.]shop indenizanubank[.]site…

SwitchToThread's tweet image. 🇧🇷 #phishing Nubank

atendimentonubank[.]site
avalaianubank[.]site
checkout-nubank[.]online
comprovantenubank[.]online
indeniza-nubank[.]site
indenizacaonubank[.]site
indenizacaonubankoficial[.]online
indenizanubank[.]online
indenizanubank[.]shop
indenizanubank[.]site…

🇧🇷Scammers are impersonating Serasa and asking victims to make a PIX payment to “clear their name.” ▶️Destination { "type": "dynamic", "merchantCategoryCode": "0000", "transactionCurrency": 986, "countryCode": "BR", "merchantName": "AGILE LTDA", "merchantCity":…

SwitchToThread's tweet image. 🇧🇷Scammers are impersonating Serasa and asking victims to make a PIX payment to “clear their name.”

▶️Destination

{
  "type": "dynamic",
  "merchantCategoryCode": "0000",
  "transactionCurrency": 986,
  "countryCode": "BR",
  "merchantName": "AGILE LTDA",
  "merchantCity":…
SwitchToThread's tweet image. 🇧🇷Scammers are impersonating Serasa and asking victims to make a PIX payment to “clear their name.”

▶️Destination

{
  "type": "dynamic",
  "merchantCategoryCode": "0000",
  "transactionCurrency": 986,
  "countryCode": "BR",
  "merchantName": "AGILE LTDA",
  "merchantCity":…
SwitchToThread's tweet image. 🇧🇷Scammers are impersonating Serasa and asking victims to make a PIX payment to “clear their name.”

▶️Destination

{
  "type": "dynamic",
  "merchantCategoryCode": "0000",
  "transactionCurrency": 986,
  "countryCode": "BR",
  "merchantName": "AGILE LTDA",
  "merchantCity":…

🇧🇷 #phishing Uma nova e sofisticada campanha de phishing está circulando na internet, utilizando a marca e o prestígio de um marketplace famoso para enganar usuários com a promessa de um cartão de crédito nível “gold” com limite pré-aprovado de R$ 4.700,00 e zero anuidade. O…

SwitchToThread's tweet image. 🇧🇷 #phishing Uma nova e sofisticada campanha de phishing está circulando na internet, utilizando a marca e o prestígio de um marketplace famoso para enganar usuários com a promessa de um cartão de crédito nível “gold” com limite pré-aprovado de R$ 4.700,00 e zero anuidade. O…
SwitchToThread's tweet image. 🇧🇷 #phishing Uma nova e sofisticada campanha de phishing está circulando na internet, utilizando a marca e o prestígio de um marketplace famoso para enganar usuários com a promessa de um cartão de crédito nível “gold” com limite pré-aprovado de R$ 4.700,00 e zero anuidade. O…
SwitchToThread's tweet image. 🇧🇷 #phishing Uma nova e sofisticada campanha de phishing está circulando na internet, utilizando a marca e o prestígio de um marketplace famoso para enganar usuários com a promessa de um cartão de crédito nível “gold” com limite pré-aprovado de R$ 4.700,00 e zero anuidade. O…

🇧🇷 "Login - VR Benefícios" hxxps://acesso-portal-vr-empresa.site/login #phishing

SwitchToThread's tweet image. 🇧🇷 "Login - VR Benefícios"
hxxps://acesso-portal-vr-empresa.site/login
#phishing

Seeing a sharp rise in the creation of domains linked to unregulated and fraudulent betting schemes in Brazil. Owner: Nome: LEANDRO ROCHA ALMEIDA Email: [email protected] 0000bet[.]com[.]br 0077bet[.]com[.]br 1218bet[.]com[.]br 122bet[.]com[.]br…

SwitchToThread's tweet image. Seeing a sharp rise in the creation of domains linked to unregulated and fraudulent betting schemes in Brazil.

Owner:

Nome: LEANDRO ROCHA ALMEIDA
Email: receitafederaldarussia@gmail.com

0000bet[.]com[.]br
0077bet[.]com[.]br
1218bet[.]com[.]br
122bet[.]com[.]br…

#Phishing PIX Stealer🇧🇷 "A CAIXA ECONÔMICA FEDERAL confirma o registro do seu processo indenizatório vinculado ao seu CPF. Após a confirmação do pagamento do IMPOSTO, a sua indenização será LIBERADA imediatamente para sua CHAVE PIX" https://pay[.]declaracao[.]org/ { "type":…

SwitchToThread's tweet image. #Phishing PIX Stealer🇧🇷

"A CAIXA ECONÔMICA FEDERAL confirma o registro do seu processo indenizatório vinculado ao seu CPF. Após a confirmação do pagamento do IMPOSTO, a sua indenização será LIBERADA imediatamente para sua CHAVE PIX"

https://pay[.]declaracao[.]org/

{
  "type":…

A large phishing campaign is impersonating Caixa Econômica Federal [Brazil] resgatebr[.]blog/cx/final/ ➡️('config', 'G-LMY7TWF8W9'); consultagratuita[.]cfd recebasuavalor[.]cfd valorareceber[.]cfd prontoconsulta[.]cfd achesuavalor[.]cfd conferecredito[.]cfd recebaagora[.]cfd…

SwitchToThread's tweet image. A large phishing campaign is impersonating Caixa Econômica Federal [Brazil]

resgatebr[.]blog/cx/final/ ➡️('config', 'G-LMY7TWF8W9');

consultagratuita[.]cfd
recebasuavalor[.]cfd
valorareceber[.]cfd
prontoconsulta[.]cfd
achesuavalor[.]cfd
conferecredito[.]cfd
recebaagora[.]cfd…

Loading...

Something went wrong.


Something went wrong.