#weaponizeddoc search results
So Regsvr32 can be used to fetch a file from a URL? wtf.... #WeaponizedDoc @Invincea Kills It. Your AV won't.
#WeaponizedDoc drops H1N1/Pony by creating 11 cab files. Win95 shipped on 13 cabs. virustotal.com/en/file/93f71c…
Some victims are able to dodge a #WeaponizedDoc and its payload due to a fatal error. Good ol' Dr. Watson.
This #WeaponizedDoc attack- Spreadsheet embedded inside word doc or two attachments? Looks new to me.
Tracking this MemSys #WeaponizedDoc campaign for a while. Uses local DotNet to steal passwords and email contacts.
Not a single AV will stop this new #Cerber #WeaponizedDoc @Invincea kills it. virustotal.com/en/file/671119…
This #Locky spammer spent July 4th Fat Fingering his #WeaponizedDoc names. Its (RANDNUM) Your users open it anyways.
This #WeaponizedDoc uses a reservation, not an invoice for lure. 40k+ TCP connections! virustotal.com/en/file/e5fbfd…
Hey @malwrhunterteam this #WeaponizedDoc dropped Orcus Ozone Vypr VPN. #RAT Fake Tax Doc Phish @Invincea killed it
HR Policies Update #WeaponizedDoc drops #Locky #Ransomware Your workforce will open it. Think your AV will save you?
CarbonBlack_Inc : CB ThreatSight recently discovered a widespread #phishing campaign targeting customers via a #WeaponizedDoc which invokes PowerShell w/ obfuscated code to establish netconns and attempts to drop and execute a 2nd stage payload, often th…
Customer gets pounded for no damage by #WeaponizedDoc that powershells to pseudodarkleech p0wnt site. #Cerber? virustotal.com/en/file/aa2583…
Absolutley NOT psychological. 😡 Worldwide #coverup by using #psyops on severely injured citizens, utilizing gaslighting & suggestablitiy on the most vulnerable women. Countless, women told it's in "their heads" probably same blokes who still standby hysteria. #WeaponizedDoc
CB ThreatSight discovered a #phishing campaign targeting customers via a #WeaponizedDoc. The doc invokes PowerShell w/ obfuscated code to establish netconns & attempts to drop & execute a 2nd stage payload such as #Ursnif ow.ly/CZZN50viwBx @ThreatHuntress @rayrayssi @Jpeg42
CarbonBlack_Inc : CB ThreatSight recently discovered a widespread #phishing campaign targeting customers via a #WeaponizedDoc which invokes PowerShell w/ obfuscated code to establish netconns and attempts to drop and execute a 2nd stage payload, often th…
CB ThreatSight recently discovered a widespread #phishing campaign targeting customers via a #WeaponizedDoc which invokes PowerShell w/ obfuscated code to establish netconns and attempts to drop and execute a 2nd stage payload, often the #polymorphic banking trojan #Emotet
CarbonBlack_Inc : Cb #ThreatSight has investigated a wide #phishing campaign targeting customers via a #WeaponizedDoc - invokes #CMD and #PowerShell w/ obfuscated code, establishes net conns, attempts to drop/execute a 2nd stg payload - …
Cb #ThreatSight has investigated a wide #phishing campaign targeting customers via a #WeaponizedDoc - invokes #CMD and #PowerShell w/ obfuscated code, establishes net conns, attempts to drop/execute a 2nd stg payload - ow.ly/jXdZ30lBCK7 #infosec @joshpatesec @ThreatHuntress
So Regsvr32 can be used to fetch a file from a URL? wtf.... #WeaponizedDoc @Invincea Kills It. Your AV won't.
Customer gets pounded for no damage by #WeaponizedDoc that powershells to pseudodarkleech p0wnt site. #Cerber? virustotal.com/en/file/aa2583…
HR Manager puts resumes into folders for open sales positions. SURPRISE! This one is Hancitor #WeaponizedDoc No damage done cuz @Invincea
#WeaponizedDoc drops H1N1/Pony by creating 11 cab files. Win95 shipped on 13 cabs. virustotal.com/en/file/93f71c…
Some victims are able to dodge a #WeaponizedDoc and its payload due to a fatal error. Good ol' Dr. Watson.
Tracking this MemSys #WeaponizedDoc campaign for a while. Uses local DotNet to steal passwords and email contacts.
Not a single AV will stop this new #Cerber #WeaponizedDoc @Invincea kills it. virustotal.com/en/file/671119…
Hey @malwrhunterteam this #WeaponizedDoc dropped Orcus Ozone Vypr VPN. #RAT Fake Tax Doc Phish @Invincea killed it
This #WeaponizedDoc attack- Spreadsheet embedded inside word doc or two attachments? Looks new to me.
This #Locky spammer spent July 4th Fat Fingering his #WeaponizedDoc names. Its (RANDNUM) Your users open it anyways.
CB ThreatSight discovered a #phishing campaign targeting customers via a #WeaponizedDoc. The doc invokes PowerShell w/ obfuscated code to establish netconns & attempts to drop & execute a 2nd stage payload such as #Ursnif ow.ly/CZZN50viwBx @ThreatHuntress @rayrayssi @Jpeg42
Cb #ThreatSight has investigated a wide #phishing campaign targeting customers via a #WeaponizedDoc - invokes #CMD and #PowerShell w/ obfuscated code, establishes net conns, attempts to drop/execute a 2nd stg payload - ow.ly/jXdZ30lBCK7 #infosec @joshpatesec @ThreatHuntress
So Regsvr32 can be used to fetch a file from a URL? wtf.... #WeaponizedDoc @Invincea Kills It. Your AV won't.
Not a single AV will stop this new #Cerber #WeaponizedDoc @Invincea kills it. virustotal.com/en/file/671119…
CB ThreatSight recently discovered a widespread #phishing campaign targeting customers via a #WeaponizedDoc which invokes PowerShell w/ obfuscated code to establish netconns and attempts to drop and execute a 2nd stage payload, often the #polymorphic banking trojan #Emotet
#WeaponizedDoc drops H1N1/Pony by creating 11 cab files. Win95 shipped on 13 cabs. virustotal.com/en/file/93f71c…
This #WeaponizedDoc uses a reservation, not an invoice for lure. 40k+ TCP connections! virustotal.com/en/file/e5fbfd…
Some victims are able to dodge a #WeaponizedDoc and its payload due to a fatal error. Good ol' Dr. Watson.
CarbonBlack_Inc : CB ThreatSight recently discovered a widespread #phishing campaign targeting customers via a #WeaponizedDoc which invokes PowerShell w/ obfuscated code to establish netconns and attempts to drop and execute a 2nd stage payload, often th…
This #Locky spammer spent July 4th Fat Fingering his #WeaponizedDoc names. Its (RANDNUM) Your users open it anyways.
HR Policies Update #WeaponizedDoc drops #Locky #Ransomware Your workforce will open it. Think your AV will save you?
Tracking this MemSys #WeaponizedDoc campaign for a while. Uses local DotNet to steal passwords and email contacts.
CarbonBlack_Inc : Cb #ThreatSight has investigated a wide #phishing campaign targeting customers via a #WeaponizedDoc - invokes #CMD and #PowerShell w/ obfuscated code, establishes net conns, attempts to drop/execute a 2nd stg payload - …
Something went wrong.
Something went wrong.
United States Trends
- 1. Rosalina 26.6K posts
- 2. Bowser Jr 9,049 posts
- 3. $LMT $450.50 Lockheed F-35 N/A
- 4. $SENS $0.70 Senseonics CGM N/A
- 5. $APDN $0.20 Applied DNA N/A
- 6. Jeffrey Epstein 52.5K posts
- 7. Jameis 4,799 posts
- 8. Michael Wolff 3,015 posts
- 9. Crypto ETFs 2,932 posts
- 10. H-1B 64.2K posts
- 11. #wednesdaymotivation 4,912 posts
- 12. Benny Safdie 3,893 posts
- 13. #SuperMarioGalaxyMovie 2,398 posts
- 14. Good Wednesday 34K posts
- 15. Hump Day 17K posts
- 16. Ben Shelton N/A
- 17. Maxwell 57.8K posts
- 18. Captain Marvel 1,911 posts
- 19. House Oversight Committee 3,294 posts
- 20. #Talus_Labs N/A