After more than a month "sleep", Serpent guys are back.
There was a new campaign in past 2 days.
Main target: still Netherlands.
@bartblaze
-
-
Replying to @malwrhunterteam @bartblaze
MalwareHunterTeam Retweeted MalwareHunterTeam
Here is a sample: https://twitter.com/GrujaRS/status/890330006211244032 … See the config here:https://twitter.com/malwrhunterteam/status/890457500050493440 …
MalwareHunterTeam added,
1 reply 3 retweets 3 likes -
Replying to @malwrhunterteam @bartblaze
MalwareHunterTeam Retweeted MalwareHunterTeam
The TOR domain is the still same as here: https://twitter.com/malwrhunterteam/status/862649797983055872 … Also note that the campaign ID went back to "#01"...
MalwareHunterTeam added,
1 reply 1 retweet 3 likes -
Replying to @malwrhunterteam @bartblaze
MalwareHunterTeam Retweeted BleepingComputer
Anyway, seem Dutch police likes to play more than catching actors targeting their country from more than a year ago:https://twitter.com/BleepinComputer/status/890459256360767489 …
MalwareHunterTeam added,
1 reply 0 retweets 5 likes -
Replying to @malwrhunterteam @bartblaze
Recent security report stated that the group behind WildFire "wasn't mainly targeting dutch citizens anymore".
2 replies 0 retweets 0 likes -
-
Replying to @bartblaze @malwrhunterteam
https://www.ncsc.nl/actueel/Cybersecuritybeeld+Nederland/cybersecuritybeeld-nederland-2017.html … page 35, right side in the blue area.
1 reply 0 retweets 0 likes
Will check it out, thank you! :)
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.