Possible Scattered Spider Infra Targeting @KennedyWilson 🕷️ /18.117.173[.]7 /kennedywilsoninc[.]com #IoCs #ScatteredSpider | #ThreatHunting #Censys @500mk500 @MichalKoczwara @malwrhunterteam @skocherhan @1ZRR4H

soursec_'s tweet image. Possible Scattered Spider Infra Targeting @KennedyWilson 🕷️

/18.117.173[.]7
/kennedywilsoninc[.]com

#IoCs #ScatteredSpider | #ThreatHunting #Censys

@500mk500 @MichalKoczwara @malwrhunterteam @skocherhan @1ZRR4H
soursec_'s tweet image. Possible Scattered Spider Infra Targeting @KennedyWilson 🕷️

/18.117.173[.]7
/kennedywilsoninc[.]com

#IoCs #ScatteredSpider | #ThreatHunting #Censys

@500mk500 @MichalKoczwara @malwrhunterteam @skocherhan @1ZRR4H
soursec_'s tweet image. Possible Scattered Spider Infra Targeting @KennedyWilson 🕷️

/18.117.173[.]7
/kennedywilsoninc[.]com

#IoCs #ScatteredSpider | #ThreatHunting #Censys

@500mk500 @MichalKoczwara @malwrhunterteam @skocherhan @1ZRR4H
soursec_'s tweet image. Possible Scattered Spider Infra Targeting @KennedyWilson 🕷️

/18.117.173[.]7
/kennedywilsoninc[.]com

#IoCs #ScatteredSpider | #ThreatHunting #Censys

@500mk500 @MichalKoczwara @malwrhunterteam @skocherhan @1ZRR4H

More sex shop themed Cyber Stealer panels: 69.30.247[.]233:3004 iloveboats9[.]vip @solostalking @500mk500 #InfoSec #malware #iocs

AUZombie's tweet image. More sex shop themed Cyber Stealer panels:

69.30.247[.]233:3004
iloveboats9[.]vip

@solostalking @500mk500 

#InfoSec  #malware #iocs

⚠️ Gunra is a fast-growing #ransomware using Conti-based code and double extortion It targets healthcare, manufacturing, and other sectors worldwide, deletes recovery options, and encrypts data across entire networks 👾 Explore analysis & gather #IOCs: any.run/malware-trends…

anyrun_app's tweet image. ⚠️ Gunra is a fast-growing #ransomware using Conti-based code and double extortion

It targets healthcare, manufacturing, and other sectors worldwide, deletes recovery options, and encrypts data across entire networks

👾 Explore analysis & gather #IOCs: any.run/malware-trends…

🚨 We uncovered #Tykit, a new #phishing kit targeting hundreds of US & EU companies in finance, construction, and telecom. It uses SVG-based delivery to harvest Microsoft 365 credentials ⚠️ See full analysis, how to detect it, and gather #IOCs: any.run/cybersecurity-…

anyrun_app's tweet image. 🚨 We uncovered #Tykit, a new #phishing kit targeting hundreds of US & EU companies in finance, construction, and telecom. 

It uses SVG-based delivery to harvest Microsoft 365 credentials ⚠️
 
See full analysis, how to detect it, and gather #IOCs: any.run/cybersecurity-…

La próxima versión de #4n4lDetector será la herramienta que más nos ayudará en la recolección de #IOCs de #malware... no tengo dudas. Se han revisado y mejorado todos los módulos que la componen. Gracias a Sandra Badia Gimeno por la realización del nuevo logo de la herramienta.😘

enelpc's tweet image. La próxima versión de #4n4lDetector será la herramienta que más nos ayudará en la recolección de #IOCs de #malware... no tengo dudas. Se han revisado y mejorado todos los módulos que la componen. Gracias a Sandra Badia Gimeno por la realización del nuevo logo de la herramienta.😘

🚨 #DragonForce #ransomware is built to paralyze organizations It wipes backups, disables recovery, spreads across networks, and encrypts everything with no way back. Victims are left facing multimillion-dollar ransom demands See analysis & gather #IOCs: any.run/malware-trends…

anyrun_app's tweet image. 🚨 #DragonForce #ransomware is built to paralyze organizations

It wipes backups, disables recovery, spreads across networks, and encrypts everything with no way back. Victims are left facing multimillion-dollar ransom demands

See analysis & gather #IOCs: any.run/malware-trends…

Ever got a bunch of #IOCs or #YARA rules and thought “how do I quickly check a few endpoints without setting up anything?” Here’s a trick: use THOR Cloud. You can just upload your IOCs or YARA rules, create a small scan campaign, and send someone a link. They download the…

Introducing THOR-Cloud Lite 🌩️: Seamless On-Demand Forensic Scanning Made Easy - apply YARA + Sigma + IOCs - it's free - many more features upcoming Blog 📘 nextron-systems.com/2023/10/30/int… Release Session 📺 youtu.be/ApeXFnFkKZg Register for Free ⚡️ thorcloud-lite.nextron-systems.com/ui/register?ut…

cyb3rops's tweet image. Introducing THOR-Cloud Lite 🌩️: Seamless On-Demand Forensic Scanning Made Easy

- apply YARA + Sigma + IOCs
- it's free
- many more features upcoming

Blog 📘
nextron-systems.com/2023/10/30/int…

Release Session 📺
youtu.be/ApeXFnFkKZg

Register for Free ⚡️
thorcloud-lite.nextron-systems.com/ui/register?ut…
cyb3rops's tweet image. Introducing THOR-Cloud Lite 🌩️: Seamless On-Demand Forensic Scanning Made Easy

- apply YARA + Sigma + IOCs
- it's free
- many more features upcoming

Blog 📘
nextron-systems.com/2023/10/30/int…

Release Session 📺
youtu.be/ApeXFnFkKZg

Register for Free ⚡️
thorcloud-lite.nextron-systems.com/ui/register?ut…
cyb3rops's tweet image. Introducing THOR-Cloud Lite 🌩️: Seamless On-Demand Forensic Scanning Made Easy

- apply YARA + Sigma + IOCs
- it's free
- many more features upcoming

Blog 📘
nextron-systems.com/2023/10/30/int…

Release Session 📺
youtu.be/ApeXFnFkKZg

Register for Free ⚡️
thorcloud-lite.nextron-systems.com/ui/register?ut…
cyb3rops's tweet image. Introducing THOR-Cloud Lite 🌩️: Seamless On-Demand Forensic Scanning Made Easy

- apply YARA + Sigma + IOCs
- it's free
- many more features upcoming

Blog 📘
nextron-systems.com/2023/10/30/int…

Release Session 📺
youtu.be/ApeXFnFkKZg

Register for Free ⚡️
thorcloud-lite.nextron-systems.com/ui/register?ut…


🚨 Hunt Alert 🚨 Pivoted from the #SlowTempest #IOCs and uncovered a peculiar HTML page—only ~140 results globally, mainly in Hong Kong/China 🇭🇰🇨🇳. Most common port: 8888, potentially a admin/login panel. Thanks @MichalKoczwara for your input! Notably, the HTML page pivots…

TLP_R3D's tweet image. 🚨 Hunt Alert 🚨

Pivoted from the #SlowTempest #IOCs and uncovered a peculiar HTML page—only ~140 results globally, mainly in Hong Kong/China 🇭🇰🇨🇳. 

Most common port: 8888, potentially a admin/login panel. Thanks @MichalKoczwara for your input! 

Notably, the HTML page pivots…

#GlassCage zero-click attack IOS Once triggered, the chain escalates to full root access via a combination of WebKit RCE (CVE-2025-24201) and Core Media kernel exploitation (CVE-2025-24085).#IOCs weareapartyof1.substack.com/p/glass-cage-z…

blackorbird's tweet image. #GlassCage zero-click attack IOS
Once triggered, the chain escalates to full root access via a combination of WebKit RCE (CVE-2025-24201) and Core Media kernel exploitation (CVE-2025-24085).#IOCs
weareapartyof1.substack.com/p/glass-cage-z…
blackorbird's tweet image. #GlassCage zero-click attack IOS
Once triggered, the chain escalates to full root access via a combination of WebKit RCE (CVE-2025-24201) and Core Media kernel exploitation (CVE-2025-24085).#IOCs
weareapartyof1.substack.com/p/glass-cage-z…

Over the past 30 days, our community shared 27,165 new #IOCs on ThreatFox 🦊 — an 18% increase from the previous month.👏 Huge shoutout to 'juroots', our top contributor with 2,746 IOCs submitted. 💀The most-shared malware family (or in this case framework)? Clearfake, with…

abuse_ch's tweet image. Over the past 30 days, our community shared 27,165 new #IOCs on ThreatFox 🦊 — an 18% increase from the previous month.👏 Huge shoutout to 'juroots', our top contributor with 2,746 IOCs submitted.

💀The most-shared malware family (or in this case framework)? Clearfake, with…

Aprende a analizar el servidor del troyano #LarryLurexRAT con #4n4lDetector v.2.8. Además, abordo la extracción de #IOCs, #EDR y la recolección de información previa a un ejercicio de #reversing de #malware. Descarga: github.com/4n0nym0us/4n4l… Vídeo: youtube.com/watch?v=-zCPk_…

enelpc's tweet image. Aprende a analizar el servidor del troyano #LarryLurexRAT con #4n4lDetector v.2.8. Además, abordo la extracción de #IOCs, #EDR y la recolección de información previa a un ejercicio de #reversing de #malware.

Descarga:
github.com/4n0nym0us/4n4l…
Vídeo:
youtube.com/watch?v=-zCPk_…

We got you some fresh #IOCs before the weekend. Yesterday, Google Threat Intel Group @Mandiant published a new report about #APT24's recent activities using #BADAUDIO as a first stage downloader. We retrohunted for this threat in our dataset and found two additional recent…

ThreatrayLabs's tweet image. We got you some fresh #IOCs before the weekend.
Yesterday, Google Threat Intel Group @Mandiant published a new report about #APT24's recent activities using #BADAUDIO as a first stage downloader.

We retrohunted for this threat in our dataset and found two additional recent…
ThreatrayLabs's tweet image. We got you some fresh #IOCs before the weekend.
Yesterday, Google Threat Intel Group @Mandiant published a new report about #APT24's recent activities using #BADAUDIO as a first stage downloader.

We retrohunted for this threat in our dataset and found two additional recent…
ThreatrayLabs's tweet image. We got you some fresh #IOCs before the weekend.
Yesterday, Google Threat Intel Group @Mandiant published a new report about #APT24's recent activities using #BADAUDIO as a first stage downloader.

We retrohunted for this threat in our dataset and found two additional recent…

In the new #Latrodecuts version, the authors switched to AES-256 for string encryption and decryption. I provide this #IDAPython script, which you can use to extract and decrypt the strings, quickly get up to speed, and get #IOCs. github.com/Blu3Eye/Malwar…

BlueEye46572843's tweet image. In the new #Latrodecuts version, the authors switched to AES-256 for string encryption and decryption.
I provide this #IDAPython script, which you can use to extract and decrypt the strings, quickly get up to speed, and get #IOCs.
github.com/Blu3Eye/Malwar…

👾 #Salty2FA is a #PhaaS that hijacks sessions and steals Microsoft 365 credentials, bypassing six MFA types. ⚠️ It uses Cloudflare Turnstile, heavy obfuscation and real-time credential validation to evade detection. See analysis & gather #IOCs: any.run/malware-trends…

anyrun_app's tweet image. 👾 #Salty2FA is a #PhaaS that hijacks sessions and steals Microsoft 365 credentials, bypassing six MFA types.

⚠️ It uses Cloudflare Turnstile, heavy obfuscation and real-time credential validation to evade detection. 

See analysis & gather #IOCs: any.run/malware-trends…

I had a blast at the @Gartner_inc #iocs event this week! Thanks to the whole @SADA crew and shout out to @milesward for the awesome tag team presentation on what we’re seeing in the #genai space!

MrSimonMargolis's tweet image. I had a blast at the @Gartner_inc #iocs event this week! Thanks to the whole @SADA crew and shout out to @milesward for the awesome tag team presentation on what we’re seeing in the #genai space!

Catch the unknowns. 🕵️‍♂️ Understand the attackers. Be ready. 🛡️ CATALYST delivers fresh IOCs & never-before-seen TTPs, linked to threat clusters. Level up your threat intel! 👉 Try it: catalyst.prodaft.com/welcome #ThreatIntel #Malware #IOCs #TTPs

PRODAFT's tweet image. Catch the unknowns. 🕵️‍♂️ Understand the attackers. Be ready. 🛡️  

CATALYST delivers fresh IOCs & never-before-seen TTPs, linked to  threat clusters. Level up your threat intel! 

👉 Try it: catalyst.prodaft.com/welcome

#ThreatIntel #Malware #IOCs #TTPs

🚨 #DarkVision is a low-cost RAT used for corporate espionage and data theft, recently spread via multi-stage loaders in targeted campaigns against organizations of all sizes. 👾 See detailed analysis & gather #IOCs: any.run/malware-trends…

anyrun_app's tweet image. 🚨 #DarkVision is a low-cost RAT used for corporate espionage and data theft, recently spread via multi-stage loaders in targeted campaigns against organizations of all sizes.

👾 See detailed analysis & gather #IOCs:
any.run/malware-trends…

Nine of the 25 domains identified as #IoCs for the #AmateraStealer and #PureMiner SVG #phishing campaign were deemed likely to turn malicious 14–105 days before they were dubbed as such. We also uncovered 90+ new artifacts, 20 are already considered malicious. Get the lowdown in:…

whoisxmlapi's tweet image. Nine of the 25 domains identified as #IoCs for the #AmateraStealer and #PureMiner SVG #phishing campaign were deemed likely to turn malicious 14–105 days before they were dubbed as such. We also uncovered 90+ new artifacts, 20 are already considered malicious. Get the lowdown in:…

Join the @Yugabyte team in Las Vegas on Dec 9-11 at @Gartner_inc #IOCS, the premier conference for infrastructure, operations, and cloud leaders.🔥 Visit our experts at the Yugabyte booth to win cool prizes and discover how #AI-ready, #multimodal, #distributed, #YugabyteDB can…

Yugabyte's tweet image. Join the @Yugabyte team in Las Vegas on Dec 9-11 at @Gartner_inc #IOCS, the premier conference for infrastructure, operations, and cloud leaders.🔥

Visit our experts at the Yugabyte booth to win cool prizes and discover how #AI-ready, #multimodal, #distributed, #YugabyteDB can…

Manual rule writing? Out. Our Seamless IOC Ingestion feature auto-imports all threat intel indicators. No manual config. Deployment time: Hours ➡️ Minutes. Read more: hubs.la/Q03SgCH50 #ThreatIntelligence #IOCs #SecurityAutomation #SOCEfficiency #RuleWriting #Cybersecurity


Possible Scattered Spider Infra Targeting @KennedyWilson 🕷️ /18.117.173[.]7 /kennedywilsoninc[.]com #IoCs #ScatteredSpider | #ThreatHunting #Censys @500mk500 @MichalKoczwara @malwrhunterteam @skocherhan @1ZRR4H

soursec_'s tweet image. Possible Scattered Spider Infra Targeting @KennedyWilson 🕷️

/18.117.173[.]7
/kennedywilsoninc[.]com

#IoCs #ScatteredSpider | #ThreatHunting #Censys

@500mk500 @MichalKoczwara @malwrhunterteam @skocherhan @1ZRR4H
soursec_'s tweet image. Possible Scattered Spider Infra Targeting @KennedyWilson 🕷️

/18.117.173[.]7
/kennedywilsoninc[.]com

#IoCs #ScatteredSpider | #ThreatHunting #Censys

@500mk500 @MichalKoczwara @malwrhunterteam @skocherhan @1ZRR4H
soursec_'s tweet image. Possible Scattered Spider Infra Targeting @KennedyWilson 🕷️

/18.117.173[.]7
/kennedywilsoninc[.]com

#IoCs #ScatteredSpider | #ThreatHunting #Censys

@500mk500 @MichalKoczwara @malwrhunterteam @skocherhan @1ZRR4H
soursec_'s tweet image. Possible Scattered Spider Infra Targeting @KennedyWilson 🕷️

/18.117.173[.]7
/kennedywilsoninc[.]com

#IoCs #ScatteredSpider | #ThreatHunting #Censys

@500mk500 @MichalKoczwara @malwrhunterteam @skocherhan @1ZRR4H

More sex shop themed Cyber Stealer panels: 69.30.247[.]233:3004 iloveboats9[.]vip @solostalking @500mk500 #InfoSec #malware #iocs

AUZombie's tweet image. More sex shop themed Cyber Stealer panels:

69.30.247[.]233:3004
iloveboats9[.]vip

@solostalking @500mk500 

#InfoSec  #malware #iocs

🚨 Hunt Alert 🚨 Pivoted from the #SlowTempest #IOCs and uncovered a peculiar HTML page—only ~140 results globally, mainly in Hong Kong/China 🇭🇰🇨🇳. Most common port: 8888, potentially a admin/login panel. Thanks @MichalKoczwara for your input! Notably, the HTML page pivots…

TLP_R3D's tweet image. 🚨 Hunt Alert 🚨

Pivoted from the #SlowTempest #IOCs and uncovered a peculiar HTML page—only ~140 results globally, mainly in Hong Kong/China 🇭🇰🇨🇳. 

Most common port: 8888, potentially a admin/login panel. Thanks @MichalKoczwara for your input! 

Notably, the HTML page pivots…

In case you are a medical institution, it may be worth blocking this in your firewall or if you're using the CMS features, at least search internet traffic logs for the IP 202.114.4[.]119 #iocs

craiu's tweet image. In case you are a medical institution, it may be worth blocking this in your firewall or if you're using the CMS features, at least search internet traffic logs for the IP 202.114.4[.]119 #iocs
craiu's tweet image. In case you are a medical institution, it may be worth blocking this in your firewall or if you're using the CMS features, at least search internet traffic logs for the IP 202.114.4[.]119 #iocs

In the new #Latrodecuts version, the authors switched to AES-256 for string encryption and decryption. I provide this #IDAPython script, which you can use to extract and decrypt the strings, quickly get up to speed, and get #IOCs. github.com/Blu3Eye/Malwar…

BlueEye46572843's tweet image. In the new #Latrodecuts version, the authors switched to AES-256 for string encryption and decryption.
I provide this #IDAPython script, which you can use to extract and decrypt the strings, quickly get up to speed, and get #IOCs.
github.com/Blu3Eye/Malwar…

Very interesting sample. Targeting IR. b11a32e53602ea984a8608bead21c301c1bc3f2482b4cc9c69bf6876afbdb266 2 Stage > hxxps://networking.s3.ir-thr-at1[.]arvanstorage[.]ir/Payload.bat #maldoc #IoCs

DmitriyMelikov's tweet image. Very interesting sample. Targeting IR. 

b11a32e53602ea984a8608bead21c301c1bc3f2482b4cc9c69bf6876afbdb266

2 Stage >  hxxps://networking.s3.ir-thr-at1[.]arvanstorage[.]ir/Payload.bat

#maldoc #IoCs
DmitriyMelikov's tweet image. Very interesting sample. Targeting IR. 

b11a32e53602ea984a8608bead21c301c1bc3f2482b4cc9c69bf6876afbdb266

2 Stage >  hxxps://networking.s3.ir-thr-at1[.]arvanstorage[.]ir/Payload.bat

#maldoc #IoCs

#GlassCage zero-click attack IOS Once triggered, the chain escalates to full root access via a combination of WebKit RCE (CVE-2025-24201) and Core Media kernel exploitation (CVE-2025-24085).#IOCs weareapartyof1.substack.com/p/glass-cage-z…

blackorbird's tweet image. #GlassCage zero-click attack IOS
Once triggered, the chain escalates to full root access via a combination of WebKit RCE (CVE-2025-24201) and Core Media kernel exploitation (CVE-2025-24085).#IOCs
weareapartyof1.substack.com/p/glass-cage-z…
blackorbird's tweet image. #GlassCage zero-click attack IOS
Once triggered, the chain escalates to full root access via a combination of WebKit RCE (CVE-2025-24201) and Core Media kernel exploitation (CVE-2025-24085).#IOCs
weareapartyof1.substack.com/p/glass-cage-z…

Our latest advisory has #TTPs, #IOCs, and recommended mitigations to protect against exploitation of CVE-2023-26360, a vulnerability in Adobe ColdFusion that was exploited for initial access to fed gov’t servers. Read advisory: go.dhs.gov/oCD

CISAgov's tweet image. Our latest advisory has #TTPs, #IOCs, and recommended mitigations to protect against exploitation of CVE-2023-26360, a vulnerability in Adobe ColdFusion that was exploited for initial access to fed gov’t servers. Read advisory: go.dhs.gov/oCD

#botnet #iocs! 430 duplicates which means they have been online for a while. and 49 new malware urls! Malware urls/IOC's can be found here: pastebin.com/0QTEJvkX urlhaus.abuse.ch/browse/

banthisguy9349's tweet image. #botnet #iocs!

430 duplicates which means they have been online for a while.
and 49 new malware urls!

Malware urls/IOC's can be found here:
pastebin.com/0QTEJvkX
urlhaus.abuse.ch/browse/

At the recently held CYDES 2025, we disclosed #APT group #NightEagle (APT-Q-95). This threat group has been targeting high-tech industries for a long time, including chip semiconductors, AI/GPT and other fields. Actors used an unknown Exchange exploit chain. PPT: #IOCs #APT

RedDrip7's tweet image. At the recently held CYDES 2025, we disclosed #APT group #NightEagle (APT-Q-95).
This threat group has been targeting high-tech industries for a long time, including chip semiconductors, AI/GPT and other fields.
Actors used an unknown Exchange exploit chain.
PPT: #IOCs #APT
RedDrip7's tweet image. At the recently held CYDES 2025, we disclosed #APT group #NightEagle (APT-Q-95).
This threat group has been targeting high-tech industries for a long time, including chip semiconductors, AI/GPT and other fields.
Actors used an unknown Exchange exploit chain.
PPT: #IOCs #APT
RedDrip7's tweet image. At the recently held CYDES 2025, we disclosed #APT group #NightEagle (APT-Q-95).
This threat group has been targeting high-tech industries for a long time, including chip semiconductors, AI/GPT and other fields.
Actors used an unknown Exchange exploit chain.
PPT: #IOCs #APT
RedDrip7's tweet image. At the recently held CYDES 2025, we disclosed #APT group #NightEagle (APT-Q-95).
This threat group has been targeting high-tech industries for a long time, including chip semiconductors, AI/GPT and other fields.
Actors used an unknown Exchange exploit chain.
PPT: #IOCs #APT

La próxima versión de #4n4lDetector será la herramienta que más nos ayudará en la recolección de #IOCs de #malware... no tengo dudas. Se han revisado y mejorado todos los módulos que la componen. Gracias a Sandra Badia Gimeno por la realización del nuevo logo de la herramienta.😘

enelpc's tweet image. La próxima versión de #4n4lDetector será la herramienta que más nos ayudará en la recolección de #IOCs de #malware... no tengo dudas. Se han revisado y mejorado todos los módulos que la componen. Gracias a Sandra Badia Gimeno por la realización del nuevo logo de la herramienta.😘

🚨 Phishing Alert: We’ve spotted fake timesheet report emails leading to the Tycoon 2FA phishing kit—now abusing Pinterest visual bookmarks as intermediaries. Stay vigilant! 🔍   #IoCs: pin[.]it/7FwOYIHSO 8a[.]nextwavxe[.]ru/zz4bnhS7UpYZhbV4xqA/ #CyberSecurity #Phishing

SpiderLabs's tweet image. 🚨 Phishing Alert: We’ve spotted fake timesheet report emails leading to the Tycoon 2FA phishing kit—now abusing Pinterest visual bookmarks as intermediaries. 

Stay vigilant! 🔍 
 
#IoCs:
pin[.]it/7FwOYIHSO
8a[.]nextwavxe[.]ru/zz4bnhS7UpYZhbV4xqA/

#CyberSecurity #Phishing…

Catch the unknowns. 🕵️‍♂️ Understand the attackers. Be ready. 🛡️ CATALYST delivers fresh IOCs & never-before-seen TTPs, linked to threat clusters. Level up your threat intel! 👉 Try it: catalyst.prodaft.com/welcome #ThreatIntel #Malware #IOCs #TTPs

PRODAFT's tweet image. Catch the unknowns. 🕵️‍♂️ Understand the attackers. Be ready. 🛡️  

CATALYST delivers fresh IOCs & never-before-seen TTPs, linked to  threat clusters. Level up your threat intel! 

👉 Try it: catalyst.prodaft.com/welcome

#ThreatIntel #Malware #IOCs #TTPs

Tracking #Candiru’s DevilsTongue #Spyware in Multiple Countries #IOCs Update github.com/blackorbird/AP…

blackorbird's tweet image. Tracking #Candiru’s DevilsTongue #Spyware in Multiple Countries 
#IOCs Update
github.com/blackorbird/AP…
blackorbird's tweet image. Tracking #Candiru’s DevilsTongue #Spyware in Multiple Countries 
#IOCs Update
github.com/blackorbird/AP…
blackorbird's tweet image. Tracking #Candiru’s DevilsTongue #Spyware in Multiple Countries 
#IOCs Update
github.com/blackorbird/AP…

One more sample of #spearphishing gz attachment reaching #Lokibot C2 104.248.205.66:80 DHL Shipment DOC_643040277.gz >DHL Shipment DOC_643040277.exe > PowerShell > schtasks.exe > yPSkSzOrArThBa.exe The new #IOCs below. Ref: threatfox-api.abuse.ch/ioc/1323367/ @NDA0E

kddx0178318's tweet image. One more sample of #spearphishing gz attachment reaching #Lokibot C2 104.248.205.66:80
DHL Shipment DOC_643040277.gz >DHL Shipment DOC_643040277.exe > PowerShell >  schtasks.exe > yPSkSzOrArThBa.exe  
The new #IOCs below.

Ref: threatfox-api.abuse.ch/ioc/1323367/ @NDA0E
kddx0178318's tweet image. One more sample of #spearphishing gz attachment reaching #Lokibot C2 104.248.205.66:80
DHL Shipment DOC_643040277.gz >DHL Shipment DOC_643040277.exe > PowerShell >  schtasks.exe > yPSkSzOrArThBa.exe  
The new #IOCs below.

Ref: threatfox-api.abuse.ch/ioc/1323367/ @NDA0E

I had a blast at the @Gartner_inc #iocs event this week! Thanks to the whole @SADA crew and shout out to @milesward for the awesome tag team presentation on what we’re seeing in the #genai space!

MrSimonMargolis's tweet image. I had a blast at the @Gartner_inc #iocs event this week! Thanks to the whole @SADA crew and shout out to @milesward for the awesome tag team presentation on what we’re seeing in the #genai space!

#TransparentTribe #APT36 with a lot of detection opportunities and #IOCs #India #APT #GoLang #Linux

dimitribest's tweet image. #TransparentTribe #APT36 with a lot of detection opportunities and #IOCs
#India #APT #GoLang #Linux

Our team discovered Pakistani-based advanced persistent threat group Transparent Tribe (APT36) targeting the government, defense and aerospace sectors of India. Technical analysis, victimology and attribution details in our latest @BlackBerry Threat Research & Intelligence post…



Loading...

Something went wrong.


Something went wrong.


United States Trends