SwitchToThread's profile picture.

unpack64

@SwitchToThread

BTMOB is one of the Android banking trojans responsible for significant financial losses to Brazil’s banking sector by enabling fraudulent PIX transactions.

SwitchToThread's tweet image. BTMOB is one of the Android banking trojans responsible for significant financial losses to Brazil’s banking sector by enabling fraudulent PIX transactions.

1/ Found an Android BroadcastReceiver (adapter.differentiator.decoder.alarme) that listens for a custom action and spawns a background thread to restart hidden services. Behavior: receives MY_CUSTOM_ACTION ➡️ spawns thread ➡️ conditionally starts two obfuscated services A…

SwitchToThread's tweet image. 1/ Found an Android BroadcastReceiver (adapter.differentiator.decoder.alarme) that listens for a custom action and spawns a background thread to restart hidden services. Behavior:

receives MY_CUSTOM_ACTION ➡️ spawns thread ➡️ conditionally starts two obfuscated services

A…


unpack64 reposted

One analyzed C2 shows ~2,000 potential victims @dodo_sec @1ZRR4H @Merlax_

johnk3r's tweet image. One analyzed C2 shows ~2,000 potential victims

@dodo_sec @1ZRR4H @Merlax_

🇧🇷BTMOB custom module: sets up OkHttp WebSocket C2, pings/redirects C2, then executes JSON-driven ops: screen stream/control, mic capture, file search/move/upload (chunked b64 + ZIP), browser/notification/lock overlays, call-forwarding, local proxy, terminal shell, and injection…

SwitchToThread's tweet image. 🇧🇷BTMOB custom module: sets up OkHttp WebSocket C2, pings/redirects C2, then executes JSON-driven ops: screen stream/control, mic capture, file search/move/upload (chunked b64 + ZIP), browser/notification/lock overlays, call-forwarding, local proxy, terminal shell, and injection…

#Malware #Android - BTMOB 🧑‍🎄 Apuntando a Brasil 🇧🇷🎯 Site hxxps://191[.]101[.]131[.]165/magia-cristalina/ C2 hxxp://209[.]50[.]227.162/yaarsa/private/yarsap_80541.php 209[.]50[.]227[.]162:8080

Merlax_'s tweet image. #Malware #Android - BTMOB 🧑‍🎄

Apuntando a Brasil 🇧🇷🎯

Site
hxxps://191[.]101[.]131[.]165/magia-cristalina/

C2
hxxp://209[.]50[.]227.162/yaarsa/private/yarsap_80541.php
209[.]50[.]227[.]162:8080
Merlax_'s tweet image. #Malware #Android - BTMOB 🧑‍🎄

Apuntando a Brasil 🇧🇷🎯

Site
hxxps://191[.]101[.]131[.]165/magia-cristalina/

C2
hxxp://209[.]50[.]227.162/yaarsa/private/yarsap_80541.php
209[.]50[.]227[.]162:8080
Merlax_'s tweet image. #Malware #Android - BTMOB 🧑‍🎄

Apuntando a Brasil 🇧🇷🎯

Site
hxxps://191[.]101[.]131[.]165/magia-cristalina/

C2
hxxp://209[.]50[.]227.162/yaarsa/private/yarsap_80541.php
209[.]50[.]227[.]162:8080
Merlax_'s tweet image. #Malware #Android - BTMOB 🧑‍🎄

Apuntando a Brasil 🇧🇷🎯

Site
hxxps://191[.]101[.]131[.]165/magia-cristalina/

C2
hxxp://209[.]50[.]227.162/yaarsa/private/yarsap_80541.php
209[.]50[.]227[.]162:8080


unpack64 reposted

Another Brazilian #Magecart observed: first GTM (dropper) spawns a second GTM (maps dataLayer: products, InitiateCheckout, Purchase) then a typo-squatted CDN loads a skimmer that hooks payment inputs for exfiltration. #CTI #LATAM

_eremit4's tweet image. Another Brazilian #Magecart observed: first GTM (dropper) spawns a second GTM (maps dataLayer: products, InitiateCheckout, Purchase) then a typo-squatted CDN loads a skimmer that hooks payment inputs for exfiltration. #CTI #LATAM
_eremit4's tweet image. Another Brazilian #Magecart observed: first GTM (dropper) spawns a second GTM (maps dataLayer: products, InitiateCheckout, Purchase) then a typo-squatted CDN loads a skimmer that hooks payment inputs for exfiltration. #CTI #LATAM

POST /api/event?event=pwaOpen HTTP/2 Host: nubanktrading[.]site Cookie: piuiding6cq=xxxxxxxxxxxxxxxx; pcpn4bdt0w=pwa; pwaid5n52de=xxxxxxxxx; splitidfnp8kv=-1; fpvdate1uehvj=2025-10-06; sdata6yo0lp=xxxxxxxxxxxxxxxx Origin: https://nubanktrading[.]site Referer:…

SwitchToThread's tweet image. POST /api/event?event=pwaOpen HTTP/2
Host: nubanktrading[.]site
Cookie: piuiding6cq=xxxxxxxxxxxxxxxx; pcpn4bdt0w=pwa; pwaid5n52de=xxxxxxxxx; splitidfnp8kv=-1; fpvdate1uehvj=2025-10-06; sdata6yo0lp=xxxxxxxxxxxxxxxx
Origin: https://nubanktrading[.]site
Referer:…

🇧🇷 #phishing Nubank atendimentonubank[.]site avalaianubank[.]site checkout-nubank[.]online comprovantenubank[.]online indeniza-nubank[.]site indenizacaonubank[.]site indenizacaonubankoficial[.]online indenizanubank[.]online indenizanubank[.]shop indenizanubank[.]site…

SwitchToThread's tweet image. 🇧🇷 #phishing Nubank

atendimentonubank[.]site
avalaianubank[.]site
checkout-nubank[.]online
comprovantenubank[.]online
indeniza-nubank[.]site
indenizacaonubank[.]site
indenizacaonubankoficial[.]online
indenizanubank[.]online
indenizanubank[.]shop
indenizanubank[.]site…


🇧🇷 #phishing Nubank atendimentonubank[.]site avalaianubank[.]site checkout-nubank[.]online comprovantenubank[.]online indeniza-nubank[.]site indenizacaonubank[.]site indenizacaonubankoficial[.]online indenizanubank[.]online indenizanubank[.]shop indenizanubank[.]site…

SwitchToThread's tweet image. 🇧🇷 #phishing Nubank

atendimentonubank[.]site
avalaianubank[.]site
checkout-nubank[.]online
comprovantenubank[.]online
indeniza-nubank[.]site
indenizacaonubank[.]site
indenizacaonubankoficial[.]online
indenizanubank[.]online
indenizanubank[.]shop
indenizanubank[.]site…

🇧🇷Scammers are impersonating Serasa and asking victims to make a PIX payment to “clear their name.” ▶️Destination { "type": "dynamic", "merchantCategoryCode": "0000", "transactionCurrency": 986, "countryCode": "BR", "merchantName": "AGILE LTDA", "merchantCity":…

SwitchToThread's tweet image. 🇧🇷Scammers are impersonating Serasa and asking victims to make a PIX payment to “clear their name.”

▶️Destination

{
  "type": "dynamic",
  "merchantCategoryCode": "0000",
  "transactionCurrency": 986,
  "countryCode": "BR",
  "merchantName": "AGILE LTDA",
  "merchantCity":…
SwitchToThread's tweet image. 🇧🇷Scammers are impersonating Serasa and asking victims to make a PIX payment to “clear their name.”

▶️Destination

{
  "type": "dynamic",
  "merchantCategoryCode": "0000",
  "transactionCurrency": 986,
  "countryCode": "BR",
  "merchantName": "AGILE LTDA",
  "merchantCity":…
SwitchToThread's tweet image. 🇧🇷Scammers are impersonating Serasa and asking victims to make a PIX payment to “clear their name.”

▶️Destination

{
  "type": "dynamic",
  "merchantCategoryCode": "0000",
  "transactionCurrency": 986,
  "countryCode": "BR",
  "merchantName": "AGILE LTDA",
  "merchantCity":…

🇧🇷 #phishing Uma nova e sofisticada campanha de phishing está circulando na internet, utilizando a marca e o prestígio de um marketplace famoso para enganar usuários com a promessa de um cartão de crédito nível “gold” com limite pré-aprovado de R$ 4.700,00 e zero anuidade. O…

SwitchToThread's tweet image. 🇧🇷 #phishing Uma nova e sofisticada campanha de phishing está circulando na internet, utilizando a marca e o prestígio de um marketplace famoso para enganar usuários com a promessa de um cartão de crédito nível “gold” com limite pré-aprovado de R$ 4.700,00 e zero anuidade. O…
SwitchToThread's tweet image. 🇧🇷 #phishing Uma nova e sofisticada campanha de phishing está circulando na internet, utilizando a marca e o prestígio de um marketplace famoso para enganar usuários com a promessa de um cartão de crédito nível “gold” com limite pré-aprovado de R$ 4.700,00 e zero anuidade. O…
SwitchToThread's tweet image. 🇧🇷 #phishing Uma nova e sofisticada campanha de phishing está circulando na internet, utilizando a marca e o prestígio de um marketplace famoso para enganar usuários com a promessa de um cartão de crédito nível “gold” com limite pré-aprovado de R$ 4.700,00 e zero anuidade. O…

🇧🇷 "Login - VR Benefícios" hxxps://acesso-portal-vr-empresa.site/login #phishing

SwitchToThread's tweet image. 🇧🇷 "Login - VR Benefícios"
hxxps://acesso-portal-vr-empresa.site/login
#phishing

Loading...

Something went wrong.


Something went wrong.