precisionsec's profile picture. PrecisionSec threat feeds offer curated #threatintelligence focused on malware and C2 frameworks that are typically utilized in an intrusion or incident.

PrecisionSec

@precisionsec

PrecisionSec threat feeds offer curated #threatintelligence focused on malware and C2 frameworks that are typically utilized in an intrusion or incident.

Pinned

We are at #blackhat2022 and #defcon this year! If you are in Vegas this week, feel free to reach out for a demo of any of our feeds, meet for a beer or just to talk malware. DM's are open! #BHUSA #blackhat #threatintelligence


PrecisionSec reposted

Join me at @BSidesVancouver on May 26 for my workshop "Precision #ThreatHunting: Unveiling Adversary Infrastructure using Free and Open Source Tools," designed to teach participants techniques for discovering and analyzing adversary infrastructure. Only 6 seats left! #OSINT

powershellcode's tweet image. Join me at @BSidesVancouver on May 26 for my workshop "Precision #ThreatHunting: Unveiling Adversary Infrastructure using Free and Open Source Tools," designed to teach participants techniques for discovering and analyzing adversary infrastructure. Only 6 seats left! #OSINT

Emotet is back! After many months of inactivity, we're seeing malicious documents downloading the typical follow up exe. Our detection is holding and as always our customers are already protected by the latest #Emotet #IOCs: precisionsec.com/threat-intelli…

precisionsec's tweet image. Emotet is back! After many months of inactivity, we're seeing malicious documents downloading the typical follow up exe. 

Our detection is holding and as always our customers are already protected by the latest #Emotet #IOCs:

precisionsec.com/threat-intelli…

Our #Emotet #IOC feed is up and running! Currently featuring a live feed of URL's distributing (internally verified) Emotet binaries. C2 IP's are available for customers in our private feed. precisionsec.com/threat-intelli…

precisionsec's tweet image. Our #Emotet #IOC feed is up and running! Currently featuring a live feed of URL's distributing (internally verified) Emotet binaries. C2 IP's are available for customers in our private feed.

precisionsec.com/threat-intelli…

#Emotet malspam campaign uses Snowden's new book as lure blog.malwarebytes.com/?p=40544


PrecisionSec reposted

#RevengeRAT #base64 hosted on #pastebin: hxxps://pastebin[.]com/e8grybhb Some other interesting #powershell #malware posted by that user: pastebin.com/u/jccdt

powershellcode's tweet image. #RevengeRAT #base64 hosted on #pastebin: hxxps://pastebin[.]com/e8grybhb

Some other interesting #powershell #malware posted by that user: 

pastebin.com/u/jccdt

Product update: We've added #iceid / #bokbot and #ave_maria stealer detection to our #ThreatIntel feed and our Threat Analyst Platform. Register for a free trial here: precisionsec.com/free-trial/

precisionsec's tweet image. Product update: We've added #iceid / #bokbot and #ave_maria stealer detection to our #ThreatIntel feed and our Threat Analyst Platform. Register for a free trial here: precisionsec.com/free-trial/

#Emotet Resumes Operations, Distributes Malicious #PDF Files precisionsec.com/emotet-resumes…

precisionsec's tweet image. #Emotet Resumes Operations, Distributes Malicious #PDF Files

precisionsec.com/emotet-resumes…

#Phishing Campaign uses Hijacked Emails to Deliver #Ursnif by Replying to Ongoing Threads blog.trendmicro.com/trendlabs-secu…


Nice writeup on recent changes to #Emotet delivery

Here's my write-up on the new Emotet version and the major updates in the malware. New Firewall/SRM evasion technique and single URI for final payload. blog.joshlemon.com.au/emotet-downloa…



PrecisionSec reposted

[#Malware Analysis] IQY file embedded in PDF drops EXE with valid digital signature vmray.com/analyses/2c572…


PrecisionSec reposted

This map shows live and kicking #Emotet Tier-1 C&C proxies for the past 24 hours. 95 servers in total listening on random ports, however majority uses TCP port 80 or 443. Notice that there are no T1's located in Russia.

peterkruse's tweet image. This map shows live and kicking #Emotet Tier-1 C&C proxies for the past 24 hours. 95 servers in total listening on random ports, however majority uses TCP port 80 or 443. Notice that there are no T1's located in Russia.

Loading...

Something went wrong.


Something went wrong.