mr_r3bot's profile picture. OutputDebugString(L"Till no more bug") 
 . Tweets are my own

Quang Vo

@mr_r3bot

OutputDebugString(L"Till no more bug") . Tweets are my own

Pinned

Inspired by @tijme talks about COM and UAC bypass , I have ported his POC code for exploiting COM object to bypass UAC and eventually elevated permission to BOF file and integrate it to Havoc client modules Any feedbacks are welcome. github.com/mr-r3bot/bof-m…


Quang Vo reposted

As a follow up to my last post, here is part II of driver reverse engineering 101, this time about dynamic analysis. We unpack a VMProtected kernel driver and restore its IAT with some emulation. Enjoy:) eversinc33.com/posts/driver-r…


Quang Vo reposted

I with my colleagues from @GroupIB_TI and @GroupIB_DFIR uncover how #UNC2891 is blending stealthy malware, physical infiltration, and money #mule ops to pull off high-impact bank attacks in Southeast Asia. 📌 Key findings: • Undetected access since 2017 • Rootkits, log…

KseProso's tweet image. I with my colleagues from @GroupIB_TI  and @GroupIB_DFIR uncover how #UNC2891 is blending stealthy malware, physical infiltration, and money #mule ops to pull off high-impact bank attacks in Southeast Asia.

📌 Key findings: 
• Undetected access since 2017 
• Rootkits, log…
KseProso's tweet image. I with my colleagues from @GroupIB_TI  and @GroupIB_DFIR uncover how #UNC2891 is blending stealthy malware, physical infiltration, and money #mule ops to pull off high-impact bank attacks in Southeast Asia.

📌 Key findings: 
• Undetected access since 2017 
• Rootkits, log…

I never understand why there is net.exe and then net1.exe 😶


Quang Vo reposted

#Lazarus carry out hands-on-keyboard activities for at least six consecutive hours, using compromised WordPress sites with vulnerable plugins as part of their attack infrastructure.#DreamJob orangecyberdefense.com/global/blog/ce…

blackorbird's tweet image. #Lazarus carry out hands-on-keyboard activities for at least six consecutive hours, using compromised WordPress sites with vulnerable plugins as part of their attack infrastructure.#DreamJob
orangecyberdefense.com/global/blog/ce…
blackorbird's tweet image. #Lazarus carry out hands-on-keyboard activities for at least six consecutive hours, using compromised WordPress sites with vulnerable plugins as part of their attack infrastructure.#DreamJob
orangecyberdefense.com/global/blog/ce…

#Lazarus Operation DreamJob targets the UAV sector DroneEXEHijackingLoader.dll /ScoringMathTea RAT welivesecurity.com/en/eset-resear…

blackorbird's tweet image. #Lazarus Operation DreamJob targets the UAV sector

DroneEXEHijackingLoader.dll /ScoringMathTea RAT

welivesecurity.com/en/eset-resear…


Quang Vo reposted

Writeup of new PDF malware converter: blog.lukeacha.com/2025/11/primep… Persistence, remote code execution, browser hijack, obfuscation, and more. #YAPA #EvilAI @SquiblydooBlog @MalasadaTech808 @x3ph1 @SecurityAura


Quang Vo reposted

ESET researchers have discovered a network implant used by the China-aligned PlushDaemon APT group to perform adversary-in-the-middle attacks | welivesecurity.com/en/eset-resear… @ESET


Quang Vo reposted

Autumn Dragon: China-nexus APT Group Targets South East Asia In this report, we describe how we tracked for several months a sustained espionage campaign against the government, media, and news sectors in several countries surrounding the South China Sea: cyberarmor.tech/blog/autumn-dr…


Quang Vo reposted

A bit late but here are the slides for the talk I gave at London Beacon25 conference, on UDRLs: rwxstoned.github.io/2025-11-19-bea…


Quang Vo reposted

Researchers from the Israel National Digital Agency have uncovered an ongoing espionage campaign conducted by Iranian threat actors tracked as SpearSpecter (APT42, Mint Sandstorm, Educated Manticore, CharmingCypress). govextra.gov.il/national-digit…

virusbtn's tweet image. Researchers from the Israel National Digital Agency have uncovered an ongoing espionage campaign conducted by Iranian threat actors tracked as SpearSpecter (APT42, Mint Sandstorm, Educated Manticore, CharmingCypress). govextra.gov.il/national-digit…

Quang Vo reposted

🐈 Cat’s Got Your Files: Lynx Ransomware 🎉New report out by @Friffnz, Daniel Casenove & @MittenSec!🎉 Attackers used stolen creds to access RDP, quickly pivoted to a DC with a second compromised admin, created impersonation accounts, mapped the environment, and more.

TheDFIRReport's tweet image. 🐈 Cat’s Got Your Files: Lynx Ransomware

🎉New report out by @Friffnz, Daniel Casenove & @MittenSec!🎉

Attackers used stolen creds to access RDP, quickly pivoted to a DC with a second compromised admin, created impersonation accounts, mapped the environment, and more.

Quang Vo reposted

#Lazarus ScoringMathTea is a RAT (Remote Access Trojan) in C++, developed and operated by Lazarus, which provides operators with all the necessary capabilities that a good RAT can offer, including remote command execution, loading and execution of plugins in memory, among other…

blackorbird's tweet image. #Lazarus 
ScoringMathTea is a RAT (Remote Access Trojan) in C++, developed and operated by Lazarus, which provides operators with all the necessary capabilities that a good RAT can offer, including remote command execution, loading and execution of plugins in memory, among other…

Quang Vo reposted

📣 Everything defenders need to know about UNC1549: a deep dive analysis of suspected Iran-nexus espionage targeting the aerospace, aviation, and defense industries in the Middle East. Dive into the details: bit.ly/3LLpzFF

Mandiant's tweet image. 📣 Everything defenders need to know about UNC1549: a deep dive analysis of suspected Iran-nexus espionage targeting the aerospace, aviation, and defense industries in the Middle East.

Dive into the details: bit.ly/3LLpzFF

Quang Vo reposted

Malware development tricks, by @cocomelonckz 46 Windows keylogger cocomelonc.github.io/malware/2025/0… 47 Windows clipboard hijacking cocomelonc.github.io/malware/2025/0… 48 leveraging Office macros cocomelonc.github.io/malware/2025/0… 49 abusing Azure DevOps REST API for covert data channels cocomelonc.github.io/malware/2025/0…


Quang Vo reposted

#APT28 OneDrive.exe Sideloading + SSPICLI.dll + tmp7E9C.dll + sspicli.dll + testtemp.ini (VBA Macro backdoor) = Outlook Macro splunk.com/en_us/blog/sec…

blackorbird's tweet image. #APT28 
OneDrive.exe Sideloading + SSPICLI.dll + tmp7E9C.dll  + sspicli.dll + testtemp.ini (VBA Macro backdoor) = Outlook Macro
splunk.com/en_us/blog/sec…
blackorbird's tweet image. #APT28 
OneDrive.exe Sideloading + SSPICLI.dll + tmp7E9C.dll  + sspicli.dll + testtemp.ini (VBA Macro backdoor) = Outlook Macro
splunk.com/en_us/blog/sec…

Quang Vo reposted

Attention malware analysts 💻 Our latest blog post delves into Time Travel Debugging (TTD). We introduce the basics of WinDbg and TTD to help you start incorporating TTD into your analysis. 📄: bit.ly/441J3vS

Mandiant's tweet image. Attention malware analysts 💻 

Our latest blog post delves into Time Travel Debugging (TTD). We introduce the basics of WinDbg and TTD to help you start incorporating TTD into your analysis.

📄: bit.ly/441J3vS

Quang Vo reposted

#ElasticSecurityLabs uncovers #RONINGLOADER, a multi-stage loader utilizing signed drivers, PPL abuse, CI Policies, and other evasion techniques to deliver #DragonBreath's gh0st RAT variant. Check it out at ela.st/roningloader

elasticseclabs's tweet image. #ElasticSecurityLabs uncovers #RONINGLOADER, a multi-stage loader utilizing signed drivers, PPL abuse, CI Policies, and other evasion techniques to deliver #DragonBreath's gh0st RAT variant. 

Check it out at ela.st/roningloader

Loading...

Something went wrong.


Something went wrong.