Opens profile photo
Follow
Costin Raiu
@craiu
Romanian antihacker from another planet. #threatintel #yara #chess #taekwondo
Technology-Security CompanyBucharestJoined October 2007

Costin Raiu’s posts

This is nuts. Solarwinds had a support page (now removed) advising users to DISABLE antivirus scanning for Orion products' folders.
Image
Image
31
679
23 years ago, I joined the Kaspersky team. Today, I am 46 and that makes it half my life dedicated to protecting the world. You probably know some of the research we did over the years in GReAT – looking back, I’m very proud of what we accomplished. It has been an incredible… Show more
113
732
Out of the 140 known C2 servers we are tracking at OVH that are used by APT and sophisticated crime groups, approximately 64% are still online. The affected 36% include several APTs: Charming Kitten, APT39, Bahamut and OceanLotus.
15
676
A sample of the iOS malware family described by Google and used in zero days attacks finally hit multi-scanner services today. sha256: 0d2ee9ade24163613772fdda201af985d852ab506e3d3e7f07fb3fa8b0853560
Image
7
591
Wow, is that a floppy disk reader on this Emotet server in Ukraine? Also love the soldering iron next to it.
Image
44
612
Thanks to the latest Whatsapp patch, we can now see stickers in full size. Also patching a RCE used in the wild to deploy malware, but who cares about that.
Image
14
523
In case this story gave you chills, search your network logs for: bin5y4muil.execute-api.us-east-1.amazonaws[.]com - 👇👇👇
Image
6
417
Simple math problem. It takes 10 programmers 4 months to write a backdoor. How long does it take 1000 programmers to write the same backdoor? 🤔
115
406
"Apple is aware of a report that this issue may have been actively exploited" - iOS 14.4 is out, patching webkit+kernel 0-days:
Image
7
397
New MikroTik zero day attack patched yesterday installs mips malware that appears related to Luabot, fetches next stage from two hardcoded C2s.
Image
8
352
Interesting opsec slip in one second stage loader used by UNC2452 / DarkHalo post abusing SolarWinds backdoor: sample has forgotten C++ header path pointing to: "c:\build\workspace\cobalt_cryptor_far (dev071)\farmanager\far\platform.concurrency.hpp"
4
295
The Lazarus APT group, known for targeting security researchers (between many other things), setup a few fake profiles on LinkedIn for what appears to be another round. One of these profiles was named, I kid you not, Sebastian “Lazarescue” 😅
Image
12
291
Today we release KTAE, the Kaspersky Threat Attribution Engine. I wrote a small blog describing how this went from an idea to a product: "Looking at big threats using code similarity - part 1":
2
280
Launched today: Learn how to become a GReAT Threat Hunting Ninja with our new online #Yara training. ✔️ 63 training videos. ✔️ 200 hours of virtual lab access. ✔️ Real-world APT hunting. ✔️ Trainer: yours truly ✔️ 6 months access. Check it out: xtraining.kaspersky.com/courses/hunt-a
Embedded video
GIF
6
274
45.155.205[.]233 at Selectel is possibly the top IP hitting our honeypots while trying to exploit #log4j #log4shell vuln. They are stepping up their game with various obfuscation attempts too. Seen this morning:
Image
Image
16
247
The inherent design flaw in Whatsapp, Signal or Whatsapp is that your account is your phone number. This is making it easier for anyone to exploit bugs in these apps and target you through nothing but your phone number. Why bother remembering another username? A: “Security”
Image
9
217
This new Bloomberg story be like: “alright guys, listen, we weren’t entirely correct about that supermicro bug, but we weren’t entirely wrong either because, Lenovo, and, intel, and chips encrypted in motherboard and did you btw hear about the bios thing at pentagon?”
8
231
According to a recent FBI report, Shlayer, an OSX trojan, is now the top most detected malware in K-12 educational institutions. Since February 2018, we have collected 32k different malicious samples of this Trojan.
Image
9
229
Interesting spearphishing, "third_islamic_unity_conference.doc" - uploaded from Ukraine in May, matching Fireeye's Methodology_OLE_CHARENCODING_2 yara.
Image
7
231
In some cases, the #shadowhammer backdoor checks both the NIC and WiFi adapter MACs to identify the victim for further exploitation. Second stage is deployed only if both addresses match. It was really that targeted.
8
207
So, it would appear someone got their hands on the ProxyLogon exploit chain before it was reported to Microsoft.
Image
Image
5
216
KTAE code similarity analysis for the malware used to target security researchers involved in 0day analysis and development. "Manuscrypt" (also known as FALLCHILL) is typically used by the Lazarus APT. 👉
Image
3
192
1/9 The French National Cybersecurity Agency released a report on Hades / Sandworm infecting Centreon servers with a PHP backdoor, followed by deploying the Exaramel Linux backdoor. Some notes:
4
175
Taking prices into account: iOS exploits are harder to find, but once you have one, it works everywhere with minimal adjustment. Android exploits are easier to find, but they require fine tuning for the myriad of versions and hardware out there.
Quote
Buyers debating buying exploits for their Android malware: “There are a lot of Android OS versions and the hardware differences between devices is making it a pain to use these exploits. They need tuning for each targeted environment!” - nice point from blog.lookout.com/shmoocon-2019
3
168
This is our cat Luna, we adopted her three months ago, she was very sick and dying. Two surgeries later, antibiotics and great care and love, she is finally well!
Image
14
175
Hah, looks like somebody setup a fake (scam) site at hxxp://solarleak[.]net/ - it has the same message as the original one, but a different Monero ID. Also, original site's DNSes at Njalla, new one at Qhoster #nohonoramongthieves
Image
5
167
So many public IOCs, including from reliable sources (eg. security agencies, Govcert's) contain unreliable information. In this case below, 192.64.119[.]190 is a Namecheap Parking IP with over 6000 distinct hosts on it. Import into an IDS to generate tons of false hits.
Image
10
159
Checkpoint clears some of the mystery surrounding APT3 with their awesome analysis of the Bemstour exploitation tool:
Image
3
151
The fast-spreading Petrwrap/Petya ransomware sample we have was compiled on June 18, 2017 according to its PE timestamp.
13
133
New Petrwrap/Petya ransomware has a fake Microsoft digital signature appended. Copied from Sysinternals Utils.
11
137
Now that a x64 TEARDROP sample became available (6e4050c6a2d2e5e49606d96dd2922da480f2e0c70082cc7e54449a7dc0d20f8d), it should be easier to link to older and parallel activity, which eventually will lead to connecting #UNC2452 #DarkHalo to known actor(s).
2
159
Beware of pivoting on parking IPs, it's easy to go down the wrong rabbit hole. (208.91.198[.]23 and 209.99.40[.]223 host hundreds of thousands of random, expired domains)
Image
Image
2
150
Wondering what "happend" here. Did Babuk copy the DarkSide ransom text, or is it an indication of some form of cooperation between them?
Image
Image
6
141
What are the most devastating malware developments during the past years? My top 3: 1. Golang 2. Fileless 3. Powershell
30
140
iOS 14.7 is out, fixing a number of unspecified vulnerabilities in Safari and the OS itself. Details to be added “soon”. Given recent happenings, this looks most welcome. 👌
Image
8
143
During the last months, I've been going through many of my old #Yara rules, optimizing and polishing. You know, "MZ" to uint16(0), "string caused too many matches" or "$a1 is slowing down scanning". I'm thinking of putting together an overview, interesting or not? #100DaysofYARA
8
147
The Kaspersky name for #DarkHydrus APT is #LazyMeerkat. This is an actor we've been tracking since Jan 2018. Their focus is mostly Middle East, governments and aviation. Unusually sneaky, creative.
Quote
#DarkHydrus is launching attacks to targets in Middle East. DNS tunneling is used for C2 communication Dropper:الفهارس.xlsm VT Link virustotal.com/#/file/513813a C2: edgekey.live akdns.live trafficmanager.live akamaized.live akamaiedge.live
Image
Image
Image
129