Rezultati pretraživanja
  1. 13. stu 2019.

    Cyber Command flags North Korean-linked hackers behind ongoing financial heists

  2. 20. stu 2019.

    what is behind the second stone ? Analysis of the second stage backend script + backdoor + interactions.Observed a for stopping the II stage payload from continuing the execution.

    Prikaži ovu nit
  3. 12. pro 2018.
  4. 13. pro 2018.
    Odgovor korisnicima i sljedećem broju korisnika:

    Reminder: attribution solely on malware is challenging & figuring out overlaps of North Korean groups is even more confusing. We've seen deploy Hermes in past. This diagram illustrates overlaps of three 🇰🇵 groups APT38, TEMP.Hermit & Lazarus 28/n

  5. 8. lis 2018.

    North Korean Hacking Group A Serious Threat Warns cc

  6. 21. stu 2019.

    C2 analysis id=Encoded key + BoardID:UserID:Base64 &page= BoardID &index = UserID &ReportID = Base64 report:

    Prikaži ovu nit
  7. 3. lis 2018.
  8. Here's my report on Noth Korean hacking group and how they've been targeting Swift to rob banks of hundreds of millions

  9. 15. lis 2018.

    We did a special with 3 sets of guests who shared a unique experience: having months of their analysis measured against unveiled DOJ indictments. 🍻, 🍾, & 🍻 📺 videos & show notes: 🔊 podcast:

    Prikaži ovu nit
  10. 3. lis 2018.

    Check out the new report on a group that conducts financial crime on behalf of the NK govt

    Prikaži ovu nit
  11. 3. lis 2018.

    Struts exploits 🔛 Linux systems. Then they upload Windows recon tools that are Themida-packed & encrypted... because they are dicks. Chris DiGiamo, investigator on a very recent bank heist, confirmed moved their SWIFT toolset entirely in-memory.

    Prikaži ovu nit
  12. 19. sij

    If you missed it and you look for a reading, please take a look here. Is Lazarus/APT38

  13. 19. pro 2019.

    I could use a second set of eyes ( ), but I think this is old . C2: ecombox[.]store

  14. 28. stu 2019.

    I had a little of fun extracting common code snippets from samples commonly associated with to connect the dots between them through .

  15. 3. stu 2019.
  16. 26. lis 2019.

    Maybe ITW:265f407a157ab0ed017dd18cae0352ae filename:JD-HAL-Manager.doc Target at Karnataka

    Prikaži ovu nit
  17. 22. lis 2019.
  18. 9. ruj 2019.
  19. 14. kol 2019.

    malware sample matched tunneling tool (my own private yara. need to be confirmed). shared on for who want to download. md5:0ba6bb2ad05d86207b5303657e3f6874

  20. 12. lip 2019.

    The most recently named APT groups—, , —exemplify the variety of state-sponsored threats that network defenders face today. Watch our webinar fo a high-level overview on how nation-state interests are driving this activity.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.