360 Netlab

@360Netlab

Network Security Research Lab at 360

Vrijeme pridruživanja: siječanj 2018.

Tweetovi

Blokirali ste korisnika/cu @360Netlab

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @360Netlab

  1. proslijedio/la je Tweet
    2. velj

    Now I understand why so many Gafgyt and Mirai variants were named Corona, as shown in my download DB. The authors wanted their shit to spread like a real corona family of virus.

    Poništi
  2. proslijedio/la je Tweet
    14. sij

    -- reporting address hxxps://apis-analytics.com/testify apis-analytics[.]com just registered severals days ago

    Poništi
  3. 14. sij

    Our application for an automatic developer account has been shot down and appeal is not allowed. ☺️. Anyhow, xbox was ddosed today by the gafgyt botnet.

    Poništi
  4. 9. sij

    Our (DDoS botnet C2 command tracking system) shows was attacked about 45 mins ago by the xor.ddos botnet. (Should we create a dedicated twitter account for this purpose so our followers won't get flooded by the alerts?

    Poništi
  5. 6. sij

    Our DDos botnet C2 command tracking system shows is being attacked right now by the mirai botnet.

    Poništi
  6. 5. sij

    Our DDos botnet C2 command tracking system shows was attacked 5 hours ago today by the mirai botnet, big mac hater?

    Poništi
  7. 4. sij

    Our DDos botnet C2 command tracking system shows (151.101.2.219) has been ddos attacked today by the gafgyt botnet, what is the motivation for attacking ?

    Poništi
  8. proslijedio/la je Tweet
    3. sij

    (1/2)releases new tool for SSH brute. It downloads an .tgz file from 94.237.85[.89:8080/sshd.tar.gz.$(uname -m) which contains 3 files: pw|ss|ssh - pw: SSH passwd list(18K+) - ss: pnscan ELF file to scan SSH Servers - ssh: bruteforcing tool which integrates sshpass

    Prikaži ovu nit
    Poništi
  9. 29. pro 2019.

    A new mirai variant is causing network wide 81 scan traffic spike, and it is going after this , do you see it?

    Poništi
  10. 29. pro 2019.
    Poništi
  11. 26. pro 2019.

    Hmmmm, googletagmanager, sounds very legit....,😜

    Poništi
  12. 25. pro 2019.

    #0-day And sending the captured files to a receiver at 103.82.143.51. Due to the real impact here, we suggest reader looking for anything going to that IP on their network and take necessary actions. (2/2)

    Poništi
  13. 25. pro 2019.

    #0-day Since 2019-12-04 08:22:29 (UTC), we have been witnessing ongoing 0 day attack targeting a network CPE vendor (not the big players, but there are about ~100,000 devices online according to public available data). The attacker is snooping on port 21,25,143,110 (1/2)

    Poništi
  14. 23. pro 2019.

    Our latest blog, Mozi, another botnet uses DHT protocol targeting weak telnet password and 11 different vulnerabilities

    Poništi
  15. 17. pro 2019.

    Our latest blog, Dacls, the Dual platform RAT, what is interesting is the links to the Lazarus Group, so Lazarus targets Linux as well?

    Poništi
  16. 10. pro 2019.
    Poništi
  17. 10. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    8. pro 2019.
    Poništi
  19. proslijedio/la je Tweet
    28. stu 2019.

    recently I spent some time on data-anomaly-driven web security tracing, parts of the results: -- way too many WordPress sites were been hacked( i got over 10k in less 1 month), and most of them will keep the compromised status for very long time

    Prikaži ovu nit
    Poništi
  20. 20. stu 2019.

    Our latest blog, This P2P botnet is an interesting one, with multiply build-in features and encryption mechanisms, it just sits quietly under the radar, what is it waiting for?

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·