Tweets
- Tweets, current page.
- Tweets & replies
- Media
You blocked @imp0rtp3
Are you sure you want to view these Tweets? Viewing Tweets won't unblock @imp0rtp3
-
Pinned Tweet
Really excited to finally publish my malware research of SoWaT - APT31's router implant.https://imp0rtp3.wordpress.com/2021/11/25/sowat/ …
Show this threadThanks. Twitter will use this info to make your timeline better. UndoUndo -
imp0rtp3 RetweetedThanks. Twitter will use this info to make your timeline better. UndoUndo
-
imp0rtp3 Retweeted
Log4Shell Detector v0.1 Python based scanner that tries to detect even the most obfuscated versions of the exploit code - first version: I did a few tests, not more - please provide pull requests with improvements https://github.com/Neo23x0/log4shell-detector …pic.twitter.com/sfwSc9Joj3
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Thanks. Twitter will use this info to make your timeline better. UndoUndo
-
Thanks to
@BillyLeonard &@neelmehta for mentioning and attributing the sample and@sekoia_io for their excellent APT31 report:)Show this threadThanks. Twitter will use this info to make your timeline better. UndoUndo -
Added a
#YARA rule for capstone.js.#Yobi will alert if any website tries to load it. https://github.com/imp0rtp3/js-yara-rules/blob/main/yara/SUSP_JSframework_capstone.yar …@Arkbird_SOLG@malwrhunterteam@c3rb3ru5d3d53c@malwrhunterteamhttps://twitter.com/ShaneHuntley/status/1458865740476403733 …Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Thanks. Twitter will use this info to make your timeline better. UndoUndo
-
imp0rtp3 Retweeted
#APT31,#Zirconium,#JudgmentPanda... whatever its name, http://SEKOIA.IO 's#CTI team had an in-depth look at this
intrusion set.
Discover our latest research findings on the infrastructure and implants used by APT31: https://bit.ly/3wBiqfl
#ThreatIntel#CyberSecurityThanks. Twitter will use this info to make your timeline better. UndoUndo -
imp0rtp3 Retweeted
@SCMagazine published an article@_IdanCohen (our CEO and co-founder) wrote about a state-sponsored surveillance JS framework found by researchers@jaimeblascob,@imp0rtp3, and@felixaime. Read more => https://hubs.ly/H0-mRcz0Thanks. Twitter will use this info to make your timeline better. UndoUndo -
One would think that before declaring to invest $20 Billion on cybersecurity Microsoft could sign their own executables, which are literally shipped with every Windows image.https://twitter.com/cyb3rops/status/1453689355084705794 …
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
imp0rtp3 Retweeted
I had a dream. In that dream all Windows security components had digital signatures. Then I woke up.pic.twitter.com/pb6SOolQdh
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
imp0rtp3 Retweeted
Nice research by
@HrckaVladislav . We track this as FinickyFrogfish and is used by TA444
(DPRK actor using CageyChameleon). Throughout 2019 and 2020 this implant was used to manage various TA444 C2s. In at least one case it was deployed via brute-forcing RDP.https://twitter.com/ESETresearch/status/1453297707792191499 …Show this threadThanks. Twitter will use this info to make your timeline better. UndoUndo -
imp0rtp3 Retweeted
We have good news — after years OneDrive is finally hosting no malware listed on
@abuse_ch, and for the first time in history Microsoft have fallen off the top ten malware hosters. All the Bazaloader, BazaISO and Qakbot TR payloads are gone. Keep it up MS. Customers are safer.pic.twitter.com/Z126Md3ncO
Show this threadThanks. Twitter will use this info to make your timeline better. UndoUndo -
imp0rtp3 Retweeted
I think a lot about detection as being part of a spectrum (
#detectrum™) and that is typically a defensive centric view of logic designed to find evil and resulting tech/data/time/threat density. A diff way to think about it might be to think about a range of adversary control.pic.twitter.com/3mU6h0qWOH
Show this threadThanks. Twitter will use this info to make your timeline better. UndoUndo -
imp0rtp3 Retweeted
In ~80% of the APT cases in the years 2012 to 2019 (when I got out of IR) we found evidence in Antivirus logs of the affected systems (password dumpers, web shells, malicious scripts, malware) It isn't a tool problem. It's an attention problem.
Show this threadThanks. Twitter will use this info to make your timeline better. UndoUndo -
Really nice research by
@proofpoint. It's great to see more companies addressing the societal and economical context and connecting it to the TTPs.https://twitter.com/selenalarson/status/1447919880477585413 …Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Great move by
@abuse_ch, I hope it will catch on to more#infosec companies.https://twitter.com/abuse_ch/status/1446451803911081987 …
Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Really interesting to see the shift of Sofacy from custom made high quality arsenal like
#Drovorub,#XAgent and#Lojax to "service-reset-password-moderate-digital[.]rf[.]gd"https://twitter.com/billyleonard/status/1446226367008313344 …Thanks. Twitter will use this info to make your timeline better. UndoUndo -
Some very nice Linux malware there...
@Arkbird_SOLGhttps://twitter.com/ESETresearch/status/1446361068528414727 …Thanks. Twitter will use this info to make your timeline better. UndoUndo -
If you wonder what's the problem with the
#infosec industry,@malwrhunterteam describes it here vividly:https://twitter.com/malwrhunterteam/status/1442938434578878467 …Thanks. Twitter will use this info to make your timeline better. UndoUndo
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
New publication on

Today, we started to notify domain registrars and registries about domains that have been setup by threat actors for the sole purpose of distributing malware 