@RamineEto Profile picture

Le Maestro

@RamineEto

Cyber Threat Hunter 🎯 | CTI Enthusiast 🌐 | Malware Analyst 🛡️ | uncovering cyber threats 🔍

Joined April 2009
Similar User
Mizter Pan photo

@mizter_platipus

AlphaMale 💪🏽 photo

@alphamale7747

Mallick20 (9)⚽️ photo

@Preciou27367507

Epieoni🇨🇲 photo

@epieoni1

Le Maestro Reposted

Using @Huntio to hunt for 🇰🇵Lazarus/APT38 clusters is an effective way to understand which crypto-related companies are targeted by this threat actor. For example, we've observed a DPRK threat actor using the host 104.168.165.165 to create fake Hack VC subdomains, such as.…

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

Le Maestro Reposted

Today, TrustedSec is releasing #Specula (our previously internal framework) into the world, which will transform the Outlook email client into a beaconing C2 agent. @oddvarmoe and @freefirex2 walk through how to use Specula in our latest blog! hubs.la/Q02JfFFN0


Le Maestro Reposted

Interesting Thread on a massive dump from a Chinese 🇨🇳 Ministry of Public Security (MPS) private industry contractor called iSoon (aka Anxun) Leak contains: - Spyware - Espionage Ops - “Twitter Monitoring Platform” - And a lot more 🔥 This is a crazy NTC Vulkan-level leak ⚠️

This post is unavailable.

Buckle up, folks! 🚀 2024 might just witness the biggest leak on Chinese threat intelligence gathering #Cyber #ThreatIntel #CTI

#threatintel someone just leaked a bunch of internal Chinese government documents on GitHub github.com/I-S00N/I-S00N/



I think it's time for any enterprise still using this should think again, because #ivanti just loves giving Ivanti Pulse Secure Found Using 11-Year-Old Linux Version and Outdated Libraries thehackernews.com/2024/02/ivanti… via @TheHackersNews


Le Maestro Reposted

Interesting find! As @BushidoToken says, last scanned 08-2023. You can use the title "LockBit BLOG" to identify an additional recent scan result: LockBit Blog IP: 165.227.85[.]87 hosted on Digital Ocean, US. Last scan date: 2024-02-06. 🧵

Tweet Image 1

Just came across #Lockbit #ransomware #dataleak site whose IP exposed during my Research! 5.182.5.126 ASN:49505 Same IP has a historic conn. with waralbum./ru associated with #BuhTrap #Banking #Trojan in 2016! #OSINT #security #infosec #malware #databreach #threatintel #CISA

Tweet Image 1


Le Maestro Reposted

Version 10 of CyberChef is now live! Developed by GCHQ's very own software engineers, explore the latest features of the cyber Swiss Army knife ⬇️ github.com/gchq

Tweet Image 1

Le Maestro Reposted

CyberChef v10 is here! Explore the latest features of the cyber Swiss Army knife, developed by our very own software engineers and see what you can rustle up ⬇️ github.com/gchq

Tweet Image 1

Le Maestro Reposted

I'm currently taking the CyberChef for Security Analysts course from @NetworkDefense The course instructor, @mattnotmax has a repository of CyberChef recipes. github.com/mattnotmax/cyb…


Le Maestro Reposted

Microsoft continues to track and disrupt activity attributed to a Russian state-sponsored actor we track as Star Blizzard (SEABORGIUM), who has improved their evasion capabilities since 2022 while remaining focused on email credential theft. Get TTPs: msft.it/6014iR1f8


It has all the hallmarks of #Lazarus APT; its favorite target is cryptocurrency exchanges.

The threat actor that Microsoft tracks as Sapphire Sleet, known for cryptocurrency theft via social engineering, has in the past few weeks created new websites masquerading as skills assessment portals, marking a shift in the persistent actor’s tactics.



Le Maestro Reposted

#DarkLoader ▪ "daim.asi": 6b093fa5742346d843f64426c01b5dd9b0e6d9e7a12d0a87059ddfc98484e5e1 ▪ "\darkloader\vl_loader_vs2022_project\Release\vl_loader_vs2022_project.pdb" C2 + Payloads: darkloader[.]top closehub[.]ru [+] bazaar.abuse.ch/sample/6b093fa…

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

Le Maestro Reposted

Microsoft has observed nation-state threat actor Storm-0062 exploiting CVE-2023-22515 in the wild since September 14, 2023. CVE-2023-22515 was disclosed on October 4, 2023. Storm-0062 is tracked by others as DarkShadow or Oro0lxy.


Le Maestro Reposted

(1/7) When it comes to selecting cyber threat intelligence feeds, what criteria are you looking for? Check out the following #CTI tools we recommend! 👇 Learn more about each tool's strengths and benefits, evaluated by our experts: maltego.com/blog/threat-in…

Tweet Image 1

On September 21st, 2023 Telekom Security CTI Team observed the threat actor #TA577, also known as "TR", launching a new high-volume malware distribution campaign spreading #DarkGate malware. 🧵 1/4



Le Maestro Reposted

We finally have more info about how exactly Microsoft was hacked by Chinese threat actors. It’s a doozy, so strap in. Back in June, hacking group Storm-0558 accessed the cloud-based Outlook email systems for 25 organizations, including at least two US government agencies. We…


Le Maestro Reposted

Today, #FBI Director Christopher Wray announced a Bureau-led operation that crippled a long-running botnet. Just in the past year, this botnet infected approximately 700,000 computers. Learn how the FBI restored control to victims: fbi.gov/news/stories/f…


Le Maestro Reposted

#NorthKorea's Lazarus Group is back again, this time with two new remote access trojans. The attacker continues to use the same infrastructure, but is changing up their eventual payloads. More here: cs.co/6018PoxLp


Le Maestro Reposted

More #DarkGate .MSI files with 0 detections C2: 107.181.161.200:9999 "Wrapped using MSI Wrapper from www[.]exemsi[.]com" Sample: bazaar.abuse.ch/sample/eb7ef73… Related: twitter.com/Gi7w0rm/status…

Tweet Image 1

Interesting #opendir: hxxps://83.217.9[.]18/ lnk -> smth + decoy.pdf (US Bancruptcy)-> cmd calls to hxxp://107.181.161.200:443 tria.ge/230821-bb4qysa… FromEnergyBadx64.msi -> backdoored Chrome install with vbs script: tria.ge/230821-bcdwxsa… virustotal.com/gui/file/b1c0c…

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4


Le Maestro Reposted

🔍 Intrusion Analysis Thread from our private reports | DarkGate, Cobalt Strike, and BianLian: 1/ 🚨 Overview: We observed a suspicious MSI file executed, leading to the deployment of DarkGate, Cobalt Strike, and BianLian malware. Let us dive deeper.


United States Trends
Loading...

Something went wrong.


Something went wrong.