abuse.ch

@abuse_ch

Fighting malware and botnets

Zurich
Vrijeme pridruživanja: svibanj 2009.

Tweetovi

Blokirali ste korisnika/cu @abuse_ch

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @abuse_ch

  1. prije 11 sati

    Top networks with the highest amount of new malware distribution sites in January 2020: #1 2,786 URLs AS4837 CHINA169-BACKBONE 🇨🇳 #2 2,479 URLs AS4134 CHINANET-BACKBONE 🇨🇳 #3 2,196 URLs AS15169 GOOGLE 🇺🇸 Source:

    Poništi
  2. prije 13 sati

    TrickBot malspam incoming, targeting Germany 🇩🇪 Sending IP: 193.124.207.151 From: Emily <info@samanta-b.space> Subject: Arbeit suchen Filename: LebenslaufzurArbeit.docm MD5 hash: ccd025215b6d2761e03b75c91fcc6cf1 TrickBot payload URL:

    Poništi
  3. 29. sij

    Introducing my newest project: I got phished The goal is to notify IT-security representatives about phishing victims within their constituency 📨 👉 A big thanks to who initiated the project! 👏 For bug reports and feature requests -> DM me

    Poništi
  4. 28. sij

    Dridex malspam incoming 📨 Sender domains: deliverychuckh\.website delivercedor\.website deliverychuckh\.website Filename: BS005738599784.vbs BS005738599784.rar MD5 hash (VBS): 0cd98cbe50e461d2cb8f1651003d4383 Dridex C2s: 46.105.131.71:443 173.249.16.143:1443

    Poništi
  5. 22. sij

    What's going on at ? Although I'm reporting malware distribution sites through their "Abuse API", they in average stay active for more than one month! 😱 /cc

    Poništi
  6. 21. sij

    Gozi malspam incoming, targeting German internet users Subject: Re: Kennst du Kiki Weimer, Viviane Ifko und 8 weitere Personen? Filename: (info0121.doc) MD5: 6823ebfe2275efd13a07b0a297db9c04 (doc) Payload URL:

    Poništi
  7. 20. sij

    Congratulations to for hosting the oldest active Emotet site, serving malware for more than 1 1/2 years! /cc

    Poništi
  8. 15. sij

    New (active) Emotet botnet C&Cs over the past 12 months 📅 You can clearly see the long vacation Emotet took in June and July 🌅

    Poništi
  9. 14. sij

    I'm wondering what's behind this IP address 👀... Whatever it is, it appears to be infected with TrickBot

    Poništi
  10. 14. sij

    relies on donations in order to operate. I'm very happy to welcome the Austrian security company Blue Shield as a new partner, supporting with a bare metal server. Thanks for your support Blue Shield!

    Poništi
  11. 13. sij

    Current set of Emotet C&Cs: MD5: 483d709c3402edb123582dd28187585a

    Prikaži ovu nit
    Poništi
  12. 13. sij

    Heads up! Emotet is back and just re-started it's spam campaigns 📨 Doc (MD5): aead1225141fadd849a27de8a27d16be Payload delivery URLs via URLhaus:

    Prikaži ovu nit
    Poništi
  13. 12. sij

    I'm happy to announce that the migration finally completed and that all services are back up and running. Thanks for your patient!

    Prikaži ovu nit
    Poništi
  14. 10. sij

    Migration is taking longer than I expected. So far, 1/3 of the data has been migrated. Stay tuned...

    Prikaži ovu nit
    Poništi
  15. 10. sij

    Today, I'm going to migrate a core component of *.abuse.ch (which is currently hosted on an almost 10 years old server) to a new infrastructure. As a result, most of the projects will temporarily react slowly today or become unavailable.

    Prikaži ovu nit
    Poništi
  16. 9. sij

    The abuse team at is a good example on how even large hosting providers can improve their abuse desk response time. The following chart shows how long it took for DO to take action on abuse reports from over time. Well done !

    Poništi
  17. 7. sij

    Emotet is being used by threat actors to drop additional malware (which may then drop Ransomware). It's time to block Emotet and TrickBot C2s at your network edged! How to mitigate Emotet: IP Blocklist (blackhole them - NOW!):

    Poništi
  18. 27. pro 2019.
    Poništi
  19. 25. pro 2019.

    Hello & Could you please have a look at ring2\.ug which apparently has been registered by threat actors to distribute malware?

    Poništi
  20. 20. pro 2019.

    Countries 🌍 with the most TrickBot infections (commonly used to drop Ryuk Ransomware 💰). Almost 1/4 of all TrickBot infections are are located in the US 🇺🇸 Here's how to mitigate Emotet and TrickBot:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·