Rezultati pretraživanja
  1. targeting the embassy of Romania in Moscow (moscova@mae.ro) - Email Subject: Upcoming Defense events February 2018 C2: cdnverify\.net Further Analysis in "Raw Threat Intelligence":

  2. related sample uploaded from Macedonia - "UDS 2019 Current Agenda.doc" C2: photopoststories\.com drops: ebdc6098c733b23e99daa60e55cf858b C:\Users\admin\AppData\Local\Temp\clnb.dat C:\ProgramData\adobe.dll

  3. /APT28: sometimes portrayed as wild & reckless, but as seen under our visibility, the group can be pragmatic, measured, and agile. Analysis of current deployment, code, cryptography, and targeting:

  4. 29. kol 2019.

    Analysis and indicators of compromise about the last activity targeting eastern europe diplomatic sector. downloader + dropbox for remote template injection.

    Prikaži ovu nit
  5. 6. lip 2018.
  6. The threat group continues to carry out attacks using their tool. The developers have once again created a new version of the using a different programming language, specifically the Go language:

  7. 2. tra 2019.

    Heads up on some possible // infrastructure: historicalfilms720hd[.]com jazzradiostream[.]com rockradiostream[.]com msofficelab[.]com onlineubersplit[.]com renodesmart[.]com More info in :

    Prikaži ovu nit
  8. The delivery documents in this attack campaign loaded remote templates whose installed a variety of first-stage . Learn about Dear Joohn, the Group’s global campaign:

  9. 18. pro 2018.
  10. 28. velj 2018.
  11. 16. velj 2019.

    2019-02-16: / "WINWORD.EXE" filename check | "ntdll.dll" | "Carberp"-like API Resolver (PEB -> PEB_LDR_DATA -> BaseDllName -> InLoadOrderModuleList) Client<->Server: space-delivery[.com Oct 2017; Newer Sample Upload MD5: 63b9b451c6daac14a838b318bbba458e

  12. 13. lip 2019.
  13. 26. velj 2018.

    A new sample, was only 5/66 on VT when first uploaded. Shares ~%85 code with other samples: Thx for tweeting about this one!

  14. Fresh payload using 138.204.170[.]189 for C2.

  15. 7. kol 2019.

    spread new campaign. Target: devices. C2: 167.114.153.55 94.237.37.28 82.118.242.171 31.220.61.251 128.199.199.187 Persistence obtained by a script shell. Among the once again Hostinger.

  16. Researchers hunting cyber-espionage group (also known as , Bear and ) say they have discovered the first-ever instance of a used in successful attacks.

  17. 25. sij 2019.
  18. 5. velj 2019.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.