nextronsystems's profile picture. Managed Compromise Assessments #YARA #IOCs #DFIR #APT #Sigma - the home of @thor_scanner, ASGARD and the Aurora Agent

Nextron Systems

@nextronsystems

Managed Compromise Assessments #YARA #IOCs #DFIR #APT #Sigma - the home of @thor_scanner, ASGARD and the Aurora Agent

Pinned

✨ Exciting News! ⚡️ We've launched our official Nextron Community Discord Server! A hub for tech talks, support, and exclusive updates. 🔗 Join us now to connect, learn, and shape the future of products (THOR, THOR Lite, THOR Cloud, Aurora, etc.): discord.gg/r6BTgbDvRt

nextronsystems's tweet image. ✨ Exciting News! ⚡️

We've launched our official Nextron Community Discord Server! A hub for tech talks, support, and exclusive updates.

🔗 Join us now to connect, learn, and shape the future of products (THOR, THOR Lite, THOR Cloud, Aurora, etc.): discord.gg/r6BTgbDvRt

🔒 NetScaler CVE-2025-7775 under attack! Patching is not enough. Appliances may have already been compromised. Use THOR to scan via SSHFS & uncover web shells, backdoors + artifacts. Details in our blog: eu1.hubs.ly/H0mVbP60

nextronsystems's tweet image. 🔒 NetScaler CVE-2025-7775 under attack!

Patching is not enough. Appliances may have already been compromised.
Use THOR to scan via SSHFS & uncover web shells, backdoors + artifacts.

Details in our blog: eu1.hubs.ly/H0mVbP60

Even with the best defenses, attackers still find a way. Recent UK breaches show that policies & EDRs miss hidden threats like renamed binaries, web shells & malware-less persistence. 🛡️ Compromise Assessments with THOR uncover what others overlook. 👉 eu1.hubs.ly/H0mGtPy0

nextronsystems's tweet image. Even with the best defenses, attackers still find a way.
Recent UK breaches show that policies & EDRs miss hidden threats like renamed binaries, web shells & malware-less persistence.

🛡️ Compromise Assessments with THOR uncover what others overlook.

👉 eu1.hubs.ly/H0mGtPy0

New Partnership: Nextron Systems x Arctic Wolf 🐺 Together, we’re strengthening SOC defenses with Nextron’s curated Sigma rule feed for sharper detection and broader coverage. Read more: eu1.hubs.ly/H0mGxhM0 #CyberSecurity #ThreatDetection #Sigma

nextronsystems's tweet image. New Partnership: Nextron Systems x Arctic Wolf 🐺

Together, we’re strengthening SOC defenses with Nextron’s curated Sigma rule feed for sharper detection and broader coverage.

Read more: eu1.hubs.ly/H0mGxhM0

#CyberSecurity #ThreatDetection #Sigma

Nextron Systems reposted

We’ve partnered with Arctic Wolf 🐺 @AWNetworks - They extend their detection coverage with Nextron’s curated Sigma rule feed: 700+ high-quality rules - Most of our rules are generic, technique-focused, and designed to detect unknown threats - not just IOCs - We get structured…

nextronresearch's tweet image. We’ve partnered with Arctic Wolf 🐺 @AWNetworks 

- They extend their detection coverage with Nextron’s curated Sigma rule feed: 700+ high-quality rules
- Most of our rules are generic, technique-focused, and designed to detect unknown threats - not just IOCs
- We get structured…

𝗛𝗮𝘃𝗲 𝗮𝘁𝘁𝗮𝗰𝗸𝗲𝗿𝘀 𝗯𝗲𝗲𝗻 𝗶𝗻𝘀𝗶𝗱𝗲 𝘆𝗼𝘂𝗿 𝘀𝘆𝘀𝘁𝗲𝗺 𝗯𝗲𝗳𝗼𝗿𝗲 𝘁𝗵𝗲 𝗽𝗮𝘁𝗰𝗵? ToolShell exploits gave unauthenticated access. Web shells, stolen keys, persistence. 🕵️ Learn more in our blog post: eu1.hubs.ly/H0mxXnJ0

nextronsystems's tweet image. 𝗛𝗮𝘃𝗲 𝗮𝘁𝘁𝗮𝗰𝗸𝗲𝗿𝘀 𝗯𝗲𝗲𝗻 𝗶𝗻𝘀𝗶𝗱𝗲 𝘆𝗼𝘂𝗿 𝘀𝘆𝘀𝘁𝗲𝗺 𝗯𝗲𝗳𝗼𝗿𝗲 𝘁𝗵𝗲 𝗽𝗮𝘁𝗰𝗵?

ToolShell exploits gave unauthenticated access.
Web shells, stolen keys, persistence.

🕵️ Learn more in our blog post: 
eu1.hubs.ly/H0mxXnJ0

⏱️ Instant Timelines with THOR - No manual tagging. No log wrangling. DFIR expert Maurice Fielenbach shows how to map persistence in minutes: ✔️ Registry Run Keys ✔️ Startup folder implants ✔️ LOLBin payloads 👉 Step-by-step guide & tool usage here: eu1.hubs.ly/H0mvr2d0

nextronsystems's tweet image. ⏱️ Instant Timelines with THOR - No manual tagging. No log wrangling.

DFIR expert Maurice Fielenbach shows how to map persistence in minutes:

✔️ Registry Run Keys
✔️ Startup folder implants
✔️ LOLBin payloads

👉 Step-by-step guide & tool usage here: eu1.hubs.ly/H0mvr2d0

New in ASGARD Analysis Cockpit v4.3: ✔️ Case Intelligence (suggested cases from intel) ✔️ THOR Cloud integration ✔️ Redesigned UI for smoother analysis A significant leap for forensic analysts. ➡️ eu1.hubs.ly/H0mtcNd0 #DFIR #ThreatIntel #ThreatHunting #ASGARD #THORCloud


Nextron Systems reposted

A new lateral movement PoC was published on GitHub: SpeechRuntimeMove (COM Hijacking via SpeechRuntime DCOM) We added the repo to our stack to build, test, and analyze The sample uploaded to VirusTotal is already covered by at least 5 of our generic rules (VT only shows up to 5…

cyb3rops's tweet image. A new lateral movement PoC was published on GitHub: SpeechRuntimeMove (COM Hijacking via SpeechRuntime DCOM)

We added the repo to our stack to build, test, and analyze

The sample uploaded to VirusTotal is already covered by at least 5 of our generic rules
(VT only shows up to 5…
cyb3rops's tweet image. A new lateral movement PoC was published on GitHub: SpeechRuntimeMove (COM Hijacking via SpeechRuntime DCOM)

We added the repo to our stack to build, test, and analyze

The sample uploaded to VirusTotal is already covered by at least 5 of our generic rules
(VT only shows up to 5…
cyb3rops's tweet image. A new lateral movement PoC was published on GitHub: SpeechRuntimeMove (COM Hijacking via SpeechRuntime DCOM)

We added the repo to our stack to build, test, and analyze

The sample uploaded to VirusTotal is already covered by at least 5 of our generic rules
(VT only shows up to 5…
cyb3rops's tweet image. A new lateral movement PoC was published on GitHub: SpeechRuntimeMove (COM Hijacking via SpeechRuntime DCOM)

We added the repo to our stack to build, test, and analyze

The sample uploaded to VirusTotal is already covered by at least 5 of our generic rules
(VT only shows up to 5…

Nextron Systems reposted

I keep seeing reports of attackers going after #ESX hosts – exporting VMs, cloning domain controllers, grabbing NTDIS files. Not really surprising. ESX often ends up being the quiet corner of the network where no one’s looking. Thing is: we’ve had some solid ways to deal with…

cyb3rops's tweet image. I keep seeing reports of attackers going after #ESX hosts – exporting VMs, cloning domain controllers, grabbing NTDIS files.
Not really surprising. ESX often ends up being the quiet corner of the network where no one’s looking.

Thing is: we’ve had some solid ways to deal with…

New in THOR Lite 📦 Archive scanning with YARA - previously exclusive to the full version 🧠 Curated rulesets from YARA Forge Two powerful features, now unlocked nextron-systems.com/2025/08/13/new…

nextronsystems's tweet image. New in THOR Lite

📦 Archive scanning with YARA - previously exclusive to the full version

🧠 Curated rulesets from YARA Forge

Two powerful features, now unlocked

nextron-systems.com/2025/08/13/new…
nextronsystems's tweet image. New in THOR Lite

📦 Archive scanning with YARA - previously exclusive to the full version

🧠 Curated rulesets from YARA Forge

Two powerful features, now unlocked

nextron-systems.com/2025/08/13/new…

Persistence without malware? Here's how attackers abuse T1547.001 using only built-in Windows tools - and how to catch them. 🕵️ 🔍 eu1.hubs.ly/H0mk5Tf0

nextronsystems's tweet image. Persistence without malware? 
Here's how attackers abuse T1547.001 using only built-in Windows tools - and how to catch them. 🕵️

🔍 eu1.hubs.ly/H0mk5Tf0

THOR Cloud now supports webhooks ⚡️ Want to get alerted the moment a scan detects something on one of your systems? You can One webhook. One alert. No polling. Works even in the free THOR Cloud Lite Blog Post nextron-systems.com/2025/08/07/web…

nextronsystems's tweet image. THOR Cloud now supports webhooks ⚡️

Want to get alerted the moment a scan detects something on one of your systems? You can

One webhook. One alert. No polling.

Works even in the free THOR Cloud Lite

Blog Post 
nextron-systems.com/2025/08/07/web…

Hidden Autostarts: An eye-opening tour of Run key variants you’ve probably overlooked Learn how attackers abuse T1547.001 not just with reg.exe, but also via PowerShell, VBScript, regini.exe, and even mshta.exe. eu1.hubs.ly/H0m6Xn-0

nextronsystems's tweet image. Hidden Autostarts: An eye-opening tour of Run key variants you’ve probably overlooked

Learn how attackers abuse T1547.001 not just with reg.exe, but also via PowerShell, VBScript, regini.exe, and even mshta.exe.

eu1.hubs.ly/H0m6Xn-0

Plague: The PAM Backdoor That Slipped Past Every Scanner A stealthy Linux implant, undetected by all AV engines, hijacks PAM for silent SSH access. Learn how to uncover it and why YARA + behavior-based hunting matters. 🔗 eu1.hubs.ly/H0m7DT30 #Linux #ThreatHunting #YARA

nextronsystems's tweet image. Plague: The PAM Backdoor That Slipped Past Every Scanner

A stealthy Linux implant, undetected by all AV engines, hijacks PAM for silent SSH access. Learn how to uncover it and why YARA + behavior-based hunting matters.
🔗 eu1.hubs.ly/H0m7DT30 

#Linux #ThreatHunting #YARA

What’s the most abused MITRE persistence technique? 🕵️ T1547.001 – Registry Run Keys / Startup Folder is #1, used by 54 threat groups. DFIR expert Maurice Fielenbach crunched the ATT&CK data. Read the key findings + detection tips 👉 eu1.hubs.ly/H0m3q2B0

nextronsystems's tweet image. What’s the most abused MITRE persistence technique? 🕵️
T1547.001 – Registry Run Keys / Startup Folder is #1, used by 54 threat groups.

DFIR expert Maurice Fielenbach crunched the ATT&CK data.
Read the key findings + detection tips 👉 eu1.hubs.ly/H0m3q2B0

Nextron Systems reposted

Persistence is noisy - if you know what to listen for. We analyzed attacker telemetry and cut through the ATT&CK noise to dissect the most abused persistence method in the wild: registry run keys. Learn how to hunt it properly. nextron-systems.com/2025/07/29/det… by Maurice Fielenbach


Nextron Systems reposted

⚡️ We’ve partnered with @Threatray to combine deep code analysis and generic YARA-based detection - Soon THOR Thunderstorm matches enrich Threatray’s platform - Our analysts gain insights from Threatray’s Binary Intelligence Platform - Detection meets classification…

nextronresearch's tweet image. ⚡️ We’ve partnered with @Threatray to combine deep code analysis and generic YARA-based detection

- Soon THOR Thunderstorm matches enrich Threatray’s platform
- Our analysts gain insights from Threatray’s Binary Intelligence Platform
- Detection meets classification…

Nextron Systems reposted

We analyzed the top 500 most successful THOR rules – “successful” meaning: they detected samples that were either ignored or missed by nearly all AV engines on VirusTotal. Some rules detect clear malware. Others reveal dual-use tools, renamed hacktools, misused admin binaries,…

nextronresearch's tweet image. We analyzed the top 500 most successful THOR rules – “successful” meaning: they detected samples that were either ignored or missed by nearly all AV engines on VirusTotal.

Some rules detect clear malware. Others reveal dual-use tools, renamed hacktools, misused admin binaries,…
nextronresearch's tweet image. We analyzed the top 500 most successful THOR rules – “successful” meaning: they detected samples that were either ignored or missed by nearly all AV engines on VirusTotal.

Some rules detect clear malware. Others reveal dual-use tools, renamed hacktools, misused admin binaries,…

Nextron Systems reposted

This isn’t malware – it’s a controlled test case. But it shows something most YARA scanners simply can’t do. THOR performs in-memory matching with full segment awareness. In this case, the rule hits two regions in the same process: - One string in the memory of the loaded binary…

cyb3rops's tweet image. This isn’t malware – it’s a controlled test case.
But it shows something most YARA scanners simply can’t do.

THOR performs in-memory matching with full segment awareness. In this case, the rule hits two regions in the same process:
- One string in the memory of the loaded binary…

Nextron Systems reposted

🚨 About CVE-2025-33053 - a crazy Windows execution flow vulnerability This flaw abuses how Windows resolves executable paths when trusted binaries spawn child processes without full paths. For example, a legitimate tool like iediagcmd.exe is launched from a .url file that…

nextronresearch's tweet image. 🚨 About CVE-2025-33053 - a crazy Windows execution flow vulnerability  

This flaw abuses how Windows resolves executable paths when trusted binaries spawn child processes without full paths. 
For example, a legitimate tool like iediagcmd.exe is launched from a .url file that…
nextronresearch's tweet image. 🚨 About CVE-2025-33053 - a crazy Windows execution flow vulnerability  

This flaw abuses how Windows resolves executable paths when trusted binaries spawn child processes without full paths. 
For example, a legitimate tool like iediagcmd.exe is launched from a .url file that…
nextronresearch's tweet image. 🚨 About CVE-2025-33053 - a crazy Windows execution flow vulnerability  

This flaw abuses how Windows resolves executable paths when trusted binaries spawn child processes without full paths. 
For example, a legitimate tool like iediagcmd.exe is launched from a .url file that…
nextronresearch's tweet image. 🚨 About CVE-2025-33053 - a crazy Windows execution flow vulnerability  

This flaw abuses how Windows resolves executable paths when trusted binaries spawn child processes without full paths. 
For example, a legitimate tool like iediagcmd.exe is launched from a .url file that…

Loading...

Something went wrong.


Something went wrong.