Ring4sky

@h4ckak

Reverse | Threat Intelligence

Hong Kong
Vrijeme pridruživanja: svibanj 2016.

Tweetovi

Blokirali ste korisnika/cu @h4ckak

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @h4ckak

  1. 3. velj

    201911 Filename: Kashmir_news.apk MD5: 42c2d7aeb8a98df09c624a9605849927 CNC: wbclientservice.ddns\.net

    Poništi
  2. proslijedio/la je Tweet
    15. sij

    Operation :Cyber ​​attack on multinational military and political institutions in South Asia 198.54.117.197-200 IP 115.111.244.34 tatacommunications support IOC relate to 185.225.17.40 -> ap1-acl./net report from Antiy:

    Prikaži ovu nit
    Poništi
  3. 15. sij

    related file: 51F55B9B17FE656589010F07F60ADF85, and more documents with Command Centre.png.lnk:

    Poništi
  4. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  5. proslijedio/la je Tweet
    4. pro 2019.

    How to *not* do attribution? IR > found sample > use technique “X” > google “technique X” > found refs to “China” > We are attacked by China > case closed

    Poništi
  6. 21. lis 2019.

    Targeting Pakistan Filename: Key_Points.doc.lnk MD5: 7e23c62a81d2bfb90ef73047e170dea8 .ap1-port\.net asp-bin\.net

    Poništi
  7. proslijedio/la je Tweet
    21. lis 2019.

    NCSC and NSA accuse Russia's Turla group of performing fourth party collection by hacking the infrastructure of Iran's OilRig actor On that subject, @juanandres_js and gave a VB2017 presentation

    Prikaži ovu nit
    Poništi
  8. 18. lis 2019.

    20190917 targeting Pakistan government Filename: Circular_2019.rar MD5: 124da36fd483eb3d585f54fc525de678

    Poništi
  9. proslijedio/la je Tweet
    16. lis 2019.
    Poništi
  10. proslijedio/la je Tweet
    15. lis 2019.

    -C-09 exploit seems utilized by to target . Since the C2 stored on the third-party website gets disclosed in advance, they use a new hard-coded one (yetwq[.]twilightparadox[.]com) instead.

    Poništi
  11. proslijedio/la je Tweet
    8. lis 2019.

    My brief analysis the sample that targeting HR department of bank in VN

    Poništi
  12. proslijedio/la je Tweet
    9. lis 2019.

    (-C-01),A vine climbing over the Great Firewall: A long-term attack against China

    Poništi
  13. proslijedio/la je Tweet
    8. lis 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    and here is the guy who is behind this "hagga" crap. Owner of that Hagga pastebin acc also. +AQDaqureshiOfficial +linkedin:

    Poništi
  14. 28. ruj 2019.
    Poništi
  15. proslijedio/la je Tweet
    26. ruj 2019.

    "When you reach through the computer and on the other side is a terrorist organization, and you're that close, and you're touching something that's theirs" Read about how we worked with to deal a blow to how ISIS operates.

    Poništi
  16. proslijedio/la je Tweet

    Getting RCE in Office through URI handlers. details the now patched bug originally submitted by the prolific rgod.

    Poništi
  17. proslijedio/la je Tweet
    24. ruj 2019.

    produced a report last week in relation to . Today and I have written a follow up blog with more technical details, additional campaigns and additional tools linked to the actor. Enjoy!

    Poništi
  18. proslijedio/la je Tweet
    23. ruj 2019.

    Taiwan CDX —> International cyber defense exercise in November —> 15 nations

    Poništi
  19. proslijedio/la je Tweet

    NEW REPORT: Missing Link: Tibetan Groups Targeted with 1-Click Mobile Exploits

    Poništi
  20. proslijedio/la je Tweet
    22. ruj 2019.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·