eSentire Threat Intel

@esthreat

An outlet for public release of observed indicators

Waterloo, Canada
Vrijeme pridruživanja: rujan 2019.

Tweetovi

Blokirali ste korisnika/cu @esthreat

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @esthreat

  1. proslijedio/la je Tweet
    Poništi
  2. 27. sij

    Following 's demo release, discussion of CVE-2020-0610 dominates cve talk on twitter

    Poništi
  3. 27. sij
    Poništi
  4. 21. sij

    They just keep coming this year! Advisories for

    Poništi
  5. 16. sij
    Poništi
  6. 15. sij

    eSentire perspectives on the threat landscape in 2019: more examples of delivery malware sharing obfuscation with banking trojan , some sexy espionage stuff, some malware evolution, being manually installed, etc. What a year!

    Poništi
  7. 13. sij
    Poništi
  8. 2. lis 2019.

    Active botnet indicators and injection attempts. The Mozi payload comes with "Hello, World" user agent, the d payload comes with "DEMON" user agent . Associated tags and classification included in images. indicators available in raw text:

    Poništi
  9. proslijedio/la je Tweet
    1. lis 2019.

    2019-09-30 - IRS-themed pushed -style - of an infection, some malware/artifacts, three malspam examples, and the IOCs available in a data dump at:

    Poništi
  10. 1. lis 2019.

    Today's Botnet Soup and an injection sample

    Poništi
  11. 20. ruj 2019.
    Poništi
  12. 20. ruj 2019.
    Prikaži ovu nit
    Poništi
  13. 19. ruj 2019.

    Our report in early August compares this recent variant dropping to 's analysis. also did a break down (referenced in our report) but hadn't identified the dropper as Ostap.

    Prikaži ovu nit
    Poništi
  14. 19. ruj 2019.

    A healthy dose of recent and indicators are reported by Brad :

    Poništi
  15. 19. ruj 2019.

    Some high level analysis on the return of Researchers are seeing the recent mailspam campaign hijack ongoing email threads and replying to all participants. Double check your revived email conversations.

    Poništi
  16. 16. ruj 2019.

    Looks like this variant is shifting download servers to 178.32.178.197 as evidenced by the thicker lines (indicating the most recent activity). The single attacking ip that joins the two clusters can be found in :

    Poništi
  17. 12. ruj 2019.

    Injection example from an active hailing 23.254.225.234 Running a sample of the the associated attacking infrastructure through , it looks like a variant:

    Poništi
  18. 12. ruj 2019.

    A month of activity. Attacking infrastructure (red) is grouped into campaigns by shared download server (cyan). Some devices act as both downloader and attacking infrastructure (purple). As usual, targets include many SOHO devices (netgear, D-Link, GPON)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·