-
Nice find. cc:
@James_inthe_box@FewAtoms busy#OpenDir 's pic.twitter.com/DS4hI7K22K
-
Nice
#opendir here! s://aeg.tmc.mybluehost.me/xx/ some#formbook in it .. (VBAY:d4f8c4575e28f9156789d3c2508e9def)@malwrhunterteam@dvk01uk@James_inthe_box@JAMESWT_MHT@malware_traffic@Racco42@makflwana@pollo290987@Antelox@bad_packets@VK_Intel@x42x5a@HazMalwarepic.twitter.com/NrkekCjJYC
-
#Phishing |#OpenDir Found on site. URL:hxxp://epicvisionltd.com/directing/www.cibc.mobi/ebm-mobile-anp/account.php Bot Generated pic.twitter.com/Jr8SMZbr5u
-
#Malware#CyberSecurity#OpenDir#InfoSec hxxp://mechanicaltools.club/download/pic.twitter.com/b1XSYbiKU1
-
finding
#opendir and#phishing kit with@urlscanio {page.server:"awex" AND page. country:us}pic.twitter.com/9Jfi5FY9o9
-
-
OSweep™ v1.6.3 is now available for public consumption!!!
OSweep™: Don't Just Search OSINT. Sweep It.
https://splunkbase.splunk.com/app/4361/
#Aisle25#AnalystArsenal#Automation#Botnet#Cyber#DFIR#Emotet#InfoSec#Malware#Opendir#OSINT#OTip#pOSINTpic.twitter.com/MPKkZcVR5z
Показать эту ветку -
Undetected
#OpenDir#Phishing targeting the distributors of many companies on s://smithsnursery.xyz/ hosted by@ContaboCom domain by@HostingerCOM /@xyz.@dave_daves@dvk01uk@malwrhunterteam@JAMESWT_MHT@Spam404Online@JCyberSec_@ActorExpose@PhishingAi@FeedPhishpic.twitter.com/1tvR9KhqQv
-
#Phishing with#OpenDir Targeting@Apple hxxp://āpplè-service-support.com PDF lure located :: hxxp://xn--ppl-service-support-syb53c.com/ivoice-purchaseonline/PHistory.pdf SHA256: fdd61da610cd96b882b06e2bfc5116a5c28128cab67352d95ce48a75a09779af https://www.virustotal.com/gui/file/fdd61da610cd96b882b06e2bfc5116a5c28128cab67352d95ce48a75a09779af/detection …pic.twitter.com/S6hEtgPrmO
Показать эту ветку -
#opendir#phishing#malware 192.81.217.224/DEVICE/ 167.71.4.79/DEVlCE/ 23.254.240.124/~unkkfkex/ 206.196.104.251/~dfsdftgh/ 167.71.196.15/banks/ 138.197.148.173/banks/ 157.230.65.193/banks/ 67.205.172.54/banks/ 198.199.66.120/banks/pic.twitter.com/0HdwRfR1Vr
-
#Phishing |#OpenDir Found on site. URL:hxxp://barlacruz.com.uy/exces/office/ Bot Generated pic.twitter.com/oLe1ialzJ1
-
#Phishing |#OpenDir Found on site. URL:hxxp://www.africaredialysis.com/templates/protostar/html/layouts/-/customer_center/customer-IDPP00C641/myaccount/signin/ Bot Generated pic.twitter.com/3kZDZcE9GV
-
New payload targeting
#Linksys routers detected: http://185.244.25.155/lx/apep.mpsl (
)
https://www.virustotal.com/gui/file/c264a77e9fcf590571eb107f40bfa534aa27c86cecb876c6796405d77017b77f/details …
http://185.244.25.155/lx/ #opendir Type: Mirai-like#malware Exploit source IP: Multiple – all from
Target Port: 8080/tcp
#threatintelpic.twitter.com/eeiZ12NTMc
-
#ursnif#opendir courtesy of@FewAtoms at: http://digital.audiobookjunkie[.]com/html c2: http://api.fiho[.]at/index.htm hash 98ccec622617f2e096677b0d475d5cb5 on@mal_share pic.twitter.com/eZhqby9Hhy
-
#Phishing |#OpenDir Found on site. URL:hxxps://accounys10.com/rem10485/office365/outlook/login.php Bot Generated pic.twitter.com/sigdbhoEK4
-
#opendir with#formbook (and a duck) at: http://joeing.duckdns[.]org/joe hash: d34e053047bb9aba7e529d817f370578 1b3730bed31233270e7d5888ce29ddb3 on@mal_share pic.twitter.com/6XggHO5oTL
-
#Phishing Site of 网易企业邮箱 http://qiye.163.com !
#China hxxp[://]pluscodeerrrropp[.]sytes[.]net/ave/ol/ http://urlscan.io : https://urlscan.io/result/ded3cf06-2a44-439c-99a7-cbb088825ac1/ … It's interesting FQDN... pluscodeerrrropp? This host is#opendir, but I can't find PhishKit. pic.twitter.com/1f5VWObjsI
-
New payload targeting
#Huawei routers detected: http://178.62.27.133/bins/frosty.mips (
)
http://178.62.27.133/bins/ #opendir Type: Mirai-like#malware https://www.virustotal.com/gui/file/ec79efa8700a26431c17a7296940b2c7296d2112c7f2be650b162c7a436d25b4/detection … C2 IP: 68.183.151.62 (DigitalOcean
)
C2 port: 8372/tcp
Vulnerability: CVE-2017-17215
#threatintelpic.twitter.com/SYZYqZBjuf
Загрузка может занять некоторое время.
Вероятно, серверы Твиттера перегружены или в их работе произошел кратковременный сбой. Повторите попытку или посетите страницу Статус Твиттера, чтобы узнать более подробную информацию.
