Public entries tagged #threatintel

🔙 🚪 Researchers found a new backdoor called , likely generated with , used in an Interlock ransomware attack to steal data.

Slopoly is a simple client that beacons to a C2 server, runs commands, and keeps persistence.

X-Force links the attack to a financially motivated group known as Hive0163 and says AI tools are speeding custom malware development.

ibm.com/think/x-force/slopoly-

Continue reading →

There are a lot of articles and discussions concerning the Handala Hack Team, and especially the recent attack on Stryker.

Multiple articles have been published regarding this threat actor and I have put together a "Threat Actor Profile" for Handala. It's as always reasonably well attributed to origin sources and hopefully provides a good overview of the actor based on available OSINT research.

Please reach out if you believe there are mistakes in the article that should be corrected.

cstromblad.com/posts/threat-ac

Continue reading →

Dutch intelligence agencies warn of a phishing campaign targeting Signal and WhatsApp accounts of government officials and military personnel.

Attackers impersonate support channels to obtain verification codes and hijack accounts.

technadu.com/russian-cybercrim

Continue reading →

Reports link the Coruna iPhone exploit framework to Trenchant, the offensive cyber division of U.S. contractor L3Harris.

Originally built for intelligence operations, the toolkit allegedly leaked and was later used by Russian and China-linked threat actors.

technadu.com/us-contractor-tre

Continue reading →

A researcher infiltrated phishing panels targeting European banks after analyzing a phishing email impersonating Argenta.
Weak IP-based auth and plaintext logs exposed attacker infrastructure.
Tools like Burp Suite helped access the panel and disrupt campaigns.
Phishing kits remain dangerously accessible.

Source: inti.io/p/how-i-infiltrated-ph

Follow TechNadu for infosec updates.

Continue reading →

RE: mastodon.social/@campuscodi/11

Security firm Bitdefender has an in-depth report on the latest TTPs and ‘s used by an APT group, shared by Catalin below. You may not be targeted by this group, but they use the very common technique of Living off Trusted Services. One highlighted in this report is Discord. I strongly agree with Bitdefender’s advice of controlling or blocking access to Discord. Another service mentioned is the file-sharing service tmpfiles.org — limit or block access to that too.

Continue reading →

New report from Palo Alto’s Unit42 on sophisticated attacks with long dwell times by one or more Chinese threat groups. There is a lot going on in this article and much of it likely doesn’t apply to my organization, but I try to learn from reports like this at least one thing that I can bring to my organization to improve our security posture. In this case I learned about DumpIt — a new-to-me free multiplatform forensics tool. I’m going to add that to an upcoming threat hunt and will build detections for it as well.

unit42.paloaltonetworks.com/cl

Continue reading →

Wow, now I'm getting malware URLs via reverb.com - way to hand over a long-time threat intel person the IoC's

nothing on VT yet virustotal.com/gui/url/3086617
Zero detections:
urlvoid.com/scan/matyshkazemly
scan failed 403 forbidden: sitecheck.sucuri.net/results/w

urlquery.net/report/7840c1b4-7 redirect and is sinkholed via DNS4EU
Submitted to Pulsedive: pulsedive.com/indicator/?ioc=d

Showing a redirect to Google on checkphish (LOL)
app.checkphish.ai/public/insig

IoC:
www.matyshkazemlya [DOT] com

Message on Reverb.com:
Hey, I've been trying to buy your listing but keep getting a payment error. The site gave me a link with some info for the seller to check — www.matyshkazemlya [DOT] com Could you take a look? Mia Brown


Continue reading →

Global cybercrime roundup: AI-assisted breaches, phishing platforms targeting 100K orgs, and crypto theft incidents - but coordinated law enforcement operations are dismantling major criminal infrastructure.

technadu.com/cybercrime-operat

Is international cooperation finally shifting the balance against cybercrime?

Continue reading →

Subscribe to #threatintel entries via RSS feed