Rezultati pretraživanja
  1. 4. velj
  2. 4. velj

    Just put up a new blog post. Check it out and let me know what you think. Hunting for APT28 malware in a stockpile of samples.

  3. 1. velj

    If you missed it and you look for a reading, please take a look here. Attacks Evolution

  4. 30. sij

    If the Russians hacked the DNC email server, it means that CrowdStrike's industry-leading flagship cybersecurity product FAILED to perform its most BASIC function against a KNOWN and well-documented threat.

  5. 15. sij

    MOFA.docx lure impersonating uploaded from Jordan, payload looks like Hash: 7c487d8462567a826da95c799591f5fb TTP: Template Injection (downloaded from google drive)

  6. 5. pro 2019.

    Analyzing how tactics, techniques and procedures of the Russia-linked APT28 cyberespionage group evolve over the time.

  7. 5. pro 2019.

    Useful timeline for APT28 using ATT&CK framework -> APT28 Attacks Evolution via

  8. 20. stu 2019.

    Golang downloaders: f3ec38b8d5a6e29db299e2eadacbcebe 79.142.70[.]106 e1509c589fde2272c0d20072dfe09722 37.120.140[.]215

  9. 7. stu 2019.

    2019-11-07: 📖📺[ RE Course] Let's Learn: New on "Zero to Hero" ⏩"Here We GO: & Journey From "" to | Importance of "gopclntab”-> function table w/ { FF FF FF FB 00 00 } Bytes -> Resolver Name, Version & Module Data

  10. 7. stu 2019.

    A new Lazarus campaign extended its interests to different financial institutions around the world, including Italy 🇮🇹

    Prikaži ovu nit
  11. 29. lis 2019.

    Microsoft has identified cyberattacks on sporting and anti-doping organizations. Read more at .

  12. 26. lis 2019.
    Prikaži ovu nit
  13. 24. lis 2019.

    Suspected Targeted attacks against mining corporations in Kazakhstan IOCS: 27e9247d28598207794424eeb5ea4b1b a863c2944581bc734619bf8d6ab1aef8 57c2b46c7f2ad9aba80e4b6248f9367a Analysis:

    Prikaži ovu nit
  14. 30. kol 2019.

    Even after an actor decides to change enough to resume success in intrusions, they have a hard time divorcing themselves from their previously attributed activity. This is why groups like are still . They can't manage to break free of the sins of their past.

  15. 29. kol 2019.

    Analysis and indicators of compromise about the last activity targeting eastern europe diplomatic sector. downloader + dropbox for remote template injection.

    Prikaži ovu nit
  16. 21. kol 2019.

    Decoy document seems utilized by to target the Ministry of Foreign Affairs of . Template injection has been used to reduce detection rate and the malicious macro from remote extracts downloader to retrieve the final payload.

  17. 7. kol 2019.

    spread new campaign. Target: devices. C2: 167.114.153.55 94.237.37.28 82.118.242.171 31.220.61.251 128.199.199.187 Persistence obtained by a script shell. Among the once again Hostinger.

  18. 5. kol 2019.

    Regarding the 🐻 on IOT devices report For your convenience - I've added the IOCs (C2s & script keywords) to the standard IOC set of Fenrir, my simple Bash IOC scanner Happy hunting 🏹🎉

  19. 8. srp 2019.

    Microsoft-like recent C2 domains onedrv-live[.]com onedrive-sharedfile[.]com microsoft-onthehub[.]com my-sharepoints[.]com my-sharefile[.]com

  20. 30. lip 2019.

    2019-06-30: 👁‍🗨/ Delphi 📌 Custom b64 Decode | Check - lamer.exe & python.exe C2: http://213.252.245 .32/ControllerReset/view/register/comid/sid.php ht/ MD5: 01095fb2e3f6e8bfff536686982998ba 🛡️Similar to previous ->

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.