Opens profile photo
Follow
Vitali Kremez
@VK_Intel
Ethical Hacker | Reverse Engineer | CEO | Malware Course Author "Zero2Hero" / "Zero2Automated" | Former .gov Cybercrime | Threat Seeker Award
New York, NYvkremez.comJoined August 2015

Vitali Kremez’s Tweets

#Royal ransomware operation in action.
Quote Tweet
1/ So, site impersonating @Fortinet downloads signed MSI that uses Powershell to run #BatLoader, if the user is connected to a domain (corporate network) it deploys: 1) #Ursnif (Bot) 2) #Vidar (Stealer) 3) #Syncro RMM (C2) 4) #CobaltStrike And possibly 5) #Ransomware 💥
Show this thread
Image
Image
Image
Image
83
Offsecurity: First time flying as a private pilot single engine land from east -> west coast of Florida. Aircraft: Cessna 172N IFR training and rotorcraft add-on next!
Embedded video
0:05
2.4K views
1
22
📌We have observed the "Anti-Putin" messages from Cobalt Strike flooding activities mapped to ex-Conti cybercrime enterprise members.
Quote Tweet
Ransomware gang's Cobalt Strike servers DDoSed with anti-Russia messages - @Ionut_Ilascu bleepingcomputer.com/news/security/
Show this thread
1
11
Insight:⚡️#Emotet loader-as-a-service infection metrics globally for 2022 of ~1,300,000 unique bot_ids / top targeted infected by loader (including honeypot activity). Still alive but on a general decline. The public report is incoming.
Image
Image
1
66
Me and Vitali had a longer talk about his prediction on the impending death of the RaaS ecosystem, or at least of its major players. risky.biz/RBTALKS3/
Quote Tweet
🤔Prediction: Expect less ransomware locker deployment but a prolong phase of corporate espionage/exfiltration by cybercrime enterprises. The ransomware-as-a-service (RaaS) as well as targeted ransomware deployment model is almost dead for the following reasons 1/n
Show this thread
5
58
⚡️2022 Trend: Call-back phishing campaigns aka "BazarCall" are the de-facto top method of getting a backdoor on the protected corporate networks. 1⃣Ransomware and extortionists want to talk to the corporate employees over ☎️. 2⃣Targets are just larger & phishing is more complex
Image
3
46
Show this thread
⚡️Timely report on the latest Cobalt Strike domain fronting technique leveraging tyk[.]io. Many ex-Conti groups leverage this domain fronting technique for Cobalt Strike beacon resolver/traffic. Watch out for tyk[.]io traffic.
121
Bonus prediction***as it already had started to happen*** Incident response business & negotiation business or any biz tied directly to ransomware will decease to exist as orgs will build internal capabilities & would not hire external consultants in limited data breach cases.
3
24
Show this thread
👇 1 - overt and shadow sanctions/ban of Russia affected cryptocurrency brokers procuring money for data recovery services 2 - evolution of backup soft/services with physical backup implemenations made the effect of ransomware less impactful than before 2 / 3
2
39
Show this thread
🤔Prediction: Expect less ransomware locker deployment but a prolong phase of corporate espionage/exfiltration by cybercrime enterprises. The ransomware-as-a-service (RaaS) as well as targeted ransomware deployment model is almost dead for the following reasons 1/n
9
211
Show this thread
😍Team, I will be in Las Vegas this year. Excited to meet *you* in person. Ping me via DM during Aug 8-13
6
Incoming tech dive into the BlackCat/AlphaV ransomware binary in Win x64 and Lin/Deb x64 ESXI fersion (in one hour) with a plethora of tech insights (h/t to Rust compiler binary) + YARA signatures
Image
Image
1
80
🤔LockBit retaliated for Mandiant link of them to the sanctioned entity. LockBit RaaS days are ticking away just like Conti's did. By & large, the OFAC sanctions work well enough to deter cryptotraders & brokers to stop transacting w/ ransomware ops suspected of OFAC violation
1
22
Conti's blog last swan song leaking: all of the previous failed extortion data from SFTP server in the same format CREDS.csv / HOSTS.csv to 100% (most of them) are released. Waiting until the blog (last piece) goes offline / before suspended.
38