cyberhust1er's profile picture. Intelligence Analyst and Researcher

Taisiia G.

@cyberhust1er

Intelligence Analyst and Researcher

Taisiia G. รีโพสต์แล้ว

Microsoft and Cloudflare just nuked a global phishing empire. 🔒 338 fake domains tied to “RaccoonO365” — a $355/month phishing-as-a-service — used to steal 5,000+ Microsoft 365 passwords across 94 countries were seized in a coordinated takedown. Full story →…

TheHackersNews's tweet image. Microsoft and Cloudflare just nuked a global phishing empire.

🔒 338 fake domains tied to “RaccoonO365” — a $355/month phishing-as-a-service — used to steal 5,000+ Microsoft 365 passwords across 94 countries were seized in a coordinated takedown.

Full story →…

Taisiia G. รีโพสต์แล้ว

🚨 #Salty2FA: A Previously Undetected Phishing Kit Targeting High-Risk Industries. ⚠️ We’ve identified an active #phishing campaign, ongoing since June, engineered to bypass nearly all known 2FA methods and linked to the #Storm1575 threat actor. We named it for its distinctive…

anyrun_app's tweet image. 🚨 #Salty2FA: A Previously Undetected Phishing Kit Targeting High-Risk Industries.
⚠️ We’ve identified an active #phishing campaign, ongoing since June, engineered to bypass nearly all known 2FA methods and linked to the #Storm1575 threat actor. 

We named it for its distinctive…
anyrun_app's tweet image. 🚨 #Salty2FA: A Previously Undetected Phishing Kit Targeting High-Risk Industries.
⚠️ We’ve identified an active #phishing campaign, ongoing since June, engineered to bypass nearly all known 2FA methods and linked to the #Storm1575 threat actor. 

We named it for its distinctive…
anyrun_app's tweet image. 🚨 #Salty2FA: A Previously Undetected Phishing Kit Targeting High-Risk Industries.
⚠️ We’ve identified an active #phishing campaign, ongoing since June, engineered to bypass nearly all known 2FA methods and linked to the #Storm1575 threat actor. 

We named it for its distinctive…

Taisiia G. รีโพสต์แล้ว

Scattered Lapsus$ Hunters new channel: t.me/sp1d3rlapsushu… The following PGP message has been signed by Shiny of Shinyhunters. "It has come to my attention that both BreachForums and its official PGP key have been compromised" Read on...


Taisiia G. รีโพสต์แล้ว

BreachForums has possibly returned at their original Onion address with what looks like it's original data. I verified the Canary with the PGP and it is valid. http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd[.]onion

DarkWebInformer's tweet image. BreachForums has possibly returned at their original Onion address with what looks like it's original data.

I verified the Canary with the PGP and it is valid.

http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd[.]onion
DarkWebInformer's tweet image. BreachForums has possibly returned at their original Onion address with what looks like it's original data.

I verified the Canary with the PGP and it is valid.

http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd[.]onion
DarkWebInformer's tweet image. BreachForums has possibly returned at their original Onion address with what looks like it's original data.

I verified the Canary with the PGP and it is valid.

http://breached26tezcofqla4adzyn22notfqwcac7gpbrleg4usehljwkgqd[.]onion

Taisiia G. รีโพสต์แล้ว

SmokeLoader announces today a "major update", featuring improved stealth, enhanced data theft, better admin tools, and expanded file management. Full release note: 👇👀

g0njxa's tweet image. SmokeLoader announces today a "major update", featuring improved stealth, enhanced data theft, better admin tools, and expanded file management.

Full release note: 👇👀
g0njxa's tweet image. SmokeLoader announces today a "major update", featuring improved stealth, enhanced data theft, better admin tools, and expanded file management.

Full release note: 👇👀

After several months of silence and after Operation Endgame , #SmokeLoader staff announces a new variant update of the loader

g0njxa's tweet image. After several months of silence and after Operation Endgame , #SmokeLoader staff announces a new variant update of the loader
g0njxa's tweet image. After several months of silence and after Operation Endgame , #SmokeLoader staff announces a new variant update of the loader


Taisiia G. รีโพสต์แล้ว

A new clickfix technique, FileFix, developed by @mrd0x, is being used in the wild—poorly. Website tersmoles[.]com delivers a "Legitimate Chrome Installer" using FileFix. The attacker didn’t even change the path and filename—just copy-pasted code directly from demo website

CyberGhost13337's tweet image. A new clickfix technique, FileFix, developed by @mrd0x, is being used in the wild—poorly.

Website tersmoles[.]com delivers a "Legitimate Chrome Installer" using FileFix.

The attacker didn’t even change the path and filename—just copy-pasted code directly from demo website
CyberGhost13337's tweet image. A new clickfix technique, FileFix, developed by @mrd0x, is being used in the wild—poorly.

Website tersmoles[.]com delivers a "Legitimate Chrome Installer" using FileFix.

The attacker didn’t even change the path and filename—just copy-pasted code directly from demo website

Taisiia G. รีโพสต์แล้ว

I found a what I think novel approach which allowed me to list some of the content of #Lumma #Infostealer Command & Control servers with the help of left behind .DS_Store files. Blog, tool and Lumma files can be found here nexusfuzzy.medium.com/lumma-stealer-…

NexusFuzzy's tweet image. I found a what I think novel approach which allowed me to list some of the content of #Lumma #Infostealer Command & Control servers with the help of left behind .DS_Store files. Blog, tool and Lumma files can be found here nexusfuzzy.medium.com/lumma-stealer-…
NexusFuzzy's tweet image. I found a what I think novel approach which allowed me to list some of the content of #Lumma #Infostealer Command & Control servers with the help of left behind .DS_Store files. Blog, tool and Lumma files can be found here nexusfuzzy.medium.com/lumma-stealer-…
NexusFuzzy's tweet image. I found a what I think novel approach which allowed me to list some of the content of #Lumma #Infostealer Command & Control servers with the help of left behind .DS_Store files. Blog, tool and Lumma files can be found here nexusfuzzy.medium.com/lumma-stealer-…

Taisiia G. รีโพสต์แล้ว

After the announcement of seizure of some of the Lumma Stealer panel domains, new ones were opened shortly in the following hours. Please remember that the whole activity has not ceased👀 /yuriy-andropov.com @ViriBack

g0njxa's tweet image. After the announcement of seizure of some of the Lumma Stealer panel domains, new ones were opened shortly in the following hours.
 Please remember that the whole activity has not ceased👀

/yuriy-andropov.com @ViriBack
g0njxa's tweet image. After the announcement of seizure of some of the Lumma Stealer panel domains, new ones were opened shortly in the following hours.
 Please remember that the whole activity has not ceased👀

/yuriy-andropov.com @ViriBack

First thoughts about #Lumma Stealer "disruption" (?): There's no need in calling big names on something that (from what I've read and tested) has not happened in the magnitude I'm watching on the media At the moment, Lumma still works, still has working C2s and *apparently* no…

g0njxa's tweet image. First thoughts about #Lumma Stealer "disruption" (?):

There's no need in calling big names on something that (from what I've read and tested) has not happened in the magnitude I'm watching on the media

At the moment, Lumma still works, still has working C2s and *apparently* no…
g0njxa's tweet image. First thoughts about #Lumma Stealer "disruption" (?):

There's no need in calling big names on something that (from what I've read and tested) has not happened in the magnitude I'm watching on the media

At the moment, Lumma still works, still has working C2s and *apparently* no…
g0njxa's tweet image. First thoughts about #Lumma Stealer "disruption" (?):

There's no need in calling big names on something that (from what I've read and tested) has not happened in the magnitude I'm watching on the media

At the moment, Lumma still works, still has working C2s and *apparently* no…


Taisiia G. รีโพสต์แล้ว

🚨 A major blow to ransomware ops: Medialand, a core BPH linked to Yalishanda (LARVA-34), exposed. Used by BlackBasta & others. Likely same actors behind Feb 11 BlackBasta leak. This leak offers rare, high-value insight into cybercriminal infrastructure. #ThreatIntel

PRODAFT's tweet image. 🚨 A major blow to ransomware ops: Medialand, a core BPH linked to Yalishanda (LARVA-34), exposed. Used by BlackBasta & others. Likely same actors behind Feb 11 BlackBasta leak. This leak offers rare, high-value insight into cybercriminal infrastructure. #ThreatIntel

Taisiia G. รีโพสต์แล้ว

A year’s worth of #BlackBasta’s internal chats just leaked, revealing their ops, key players, and alleged ties to powerful allies. Intel 471 breaks down what the messages expose and what it means for #ransomware actors. Read more: hubs.la/Q039bkyb0

intel471.com

Black Basta exposed: A look at a cybercrime data leak

Black Basta suffered a leak of 197,000 internal chats messages, which has exposed critical details about how this damaging ransomware gang operated, including how its top member claims to have eluded...


Taisiia G. รีโพสต์แล้ว

🚨 Telekom Security detected a major #vishing campaign against multiple targets in #Germany, likely related to a ransomware group. We are still analyzing, but here is what we know so far 🧵1/x

DTCERT's tweet image. 🚨 Telekom Security detected a major #vishing campaign against multiple targets in #Germany, likely related to a ransomware group. We are still analyzing, but here is what we know so far 🧵1/x

Taisiia G. รีโพสต์แล้ว

Don't get distracted. Distractions kill you. Choose life instead. Live to your fullest potential. Build, create, lead with awesomeness. Don't let some outrageous thing steer you somewhere else. Stay on course. Every second you are distracted is a second of your life robbed.


Taisiia G. รีโพสต์แล้ว

🕵️‍♂️ Just did a deep dive into the IP 91.222.173.30 linked with Lazarus Group's "Contagious Interview" campaign, with some interesting findings! An SSH key analysis revealed 18 IPs, with several showing connections to DarkGate and TA571 activities. Here's the breakdown:…

TLP_R3D's tweet image. 🕵️‍♂️ Just did a deep dive into the IP 91.222.173.30 linked with Lazarus Group's "Contagious Interview" campaign, with some interesting findings!

An SSH key analysis revealed 18 IPs, with several showing connections to DarkGate and TA571 activities. 

Here's the breakdown:…

Taisiia G. รีโพสต์แล้ว

Marc is facing a tough recovery after a serious accident. He’s always there for others, now it’s our turn to support him. Please consider donating and sharing to help him on this journey. gofund.me/18cbebc8

gofundme.com

Donate to Support Marc Rogers' Road to Recovery, organized by Katie Vogel

Jan. 9 update: How this fundraiser supports Marc's recovery Every penny of this fun… Katie Vogel needs your support for Support Marc Rogers' Road to Recovery


Taisiia G. รีโพสต์แล้ว
CTIcmm's tweet image.

Taisiia G. รีโพสต์แล้ว

Cozy Bear, also known as APT29, presents unique challenges for threat hunters. Traditional detection often falls short, but focusing on behavioral patterns and MITRE ATT&CK techniques can make a difference. Learn more in our latest blog: hubs.la/Q02_pQPZ0


Taisiia G. รีโพสต์แล้ว

FINALLY! 🔥 The new blog has been launched in collaboration with @g0njxa 💙 Today, we hope to expose the #CRYPTOLOVE traffer's group operation. It is a long read, but we promise it is worth it. trac-labs.com/hearts-stolen-…


Taisiia G. รีโพสต์แล้ว

📍For more than 8 months, our threat researchers from @orangecyberdef have worked on mapping 🇨🇳 China's civil-military–industrial complex when it comes to #cyberespionage operations. ⛯ Consult our newly published deep-dive report and interactive map here: research.cert.orangecyberdefense.com/hidden-network…


Taisiia G. รีโพสต์แล้ว

1/X Here's some details on recent SOCGholish / FakeUpdates initial infections and the TDS (Keitaro?) that goes along with it. This loader uses compromised sites to display a fake "browser update" themed lure that, when clicked, downloads the malware.

Malware_Brandon's tweet image. 1/X 
Here's some details on recent  SOCGholish / FakeUpdates initial infections and the TDS (Keitaro?) that goes along with it. This loader uses compromised sites to display a fake "browser update" themed lure that, when clicked, downloads the malware.

Loading...

Something went wrong.


Something went wrong.