@PrakkiSathwik & I released our research on UNG0002, targeting many Asian geographic regions. We found multiple overlaps like the TA try to mimic other APT/UNC groups, uses DLL-Sideloading into Rasphone, Node-Webkit,also uses ClickFix, thanks to @malwrhunterteam for also hunting.
@PrakkiSathwik & I released our research on UNG0002, targeting many Asian geographic regions. We found multiple overlaps like the TA try to mimic other APT/UNC groups, uses DLL-Sideloading into Rasphone, Node-Webkit,also uses ClickFix, thanks to @malwrhunterteam for also hunting. https://t.co/66JkPMwoBM
We ( @PrakkiSathwik & me) presented our research on Cobalt Whisper & UNG0002( campaigns related to it) at @FIRSTdotOrg at Copenhagen! Met some cool folks such as @Gi7w0rm , collected some conference swags from @TeamT5_Official , research & presentation to be released soon!
New Research!
seqrite.com/blog/operation…
We have found an interesting campaign targeting an entity of Chinese telecom with VELETRIX implant. The implant uses anti-sandbox, shellcode obfuscation technique via IPV4 and execution via EnumCalendarInfo leading to Vshell implant.
Just pwned Windows 11 with a kernel 0day in Pwn2Own Berlin!
Thanks to my teammates Gerrard and Thach(@hi_im_d4rkn3ss) for helping me run the exploit. Goodluck to their entries as well.
Just pwned Windows 11 with a kernel 0day in Pwn2Own Berlin!
Thanks to my teammates Gerrard and Thach(@hi_im_d4rkn3ss) for helping me run the exploit. Goodluck to their entries as well.
New Research!
"Swan Vector APT: Targeting Taiwan & Japan with varied DLL implants"
We have found an unknown threat actor, which we have attributed to East Asia, targets Taiwan and Japan with DLL implants, Pterois & Isurus.
Read it here:
seqrite.com/blog/swan-vect…
#APT36 #TransparentTribe#APT
Me and @ElementalX2 found
_dc-mx.1a31c5a0e8c5[.]ministryofdefenceindia[.]org
apollokhos[.]co[.]in
email[.]gov[.]in.departmentofspace[.]info
indiandefence[.]services
mod[.]gov[.]in.indiandefence[.]services
departmentofspace[.]info
OPERATION SINDOOR
#JusticeServed
Target 2 – Gulpur Terrorist Camp at Kotli.
Distance – 30 Km from Line of Control (POJK).
Control Center and Base of Lashkar-e-Taiba (LeT)
Used for revival of terrorism in Jammu and Kashmir.
DESTROYED AT 1.08 AM on 07 May 2025.…
Hi everyone! Recently, I uncovered a new campaign potentially tied to DPRK’s ##KonniAPT. It starts with a sneaky .lnk file disguised as a Korean document uses KakaoTalk lures to kick off a stealthy infection chain.
Check it out: muff-in.github.io/blog/Malware-C…
14 Followers 10 FollowingAd-hoc cyber threat intel from our team of active hunters at @lab539. We mainly track Adversary in The Middle infrastructure and share indicators of attack.
566 Followers 113 FollowingMalware analyst & reverse engineer 🧠
Threat intel on stealers, RATs, live campaigns 🕵️
Technical analysis. No buzzwords.
📍DM open for research collabs
2K Followers 413 FollowingThreat Intel Specialist and Incident Responder. Private account. All opinions expressed here are mine only.
https://t.co/7dQQO1JwUd
4K Followers 4K FollowingPrincipal Security Researcher - Tweets and opinions are my own and not of my employer. #fuzzing #trainings #security YouTube: https://t.co/grWZKdQlqr
283 Followers 1 FollowingA cybersecurity company specializing in web application security, protecting against supply chain attacks and client-side vulnerabilities
566 Followers 113 FollowingMalware analyst & reverse engineer 🧠
Threat intel on stealers, RATs, live campaigns 🕵️
Technical analysis. No buzzwords.
📍DM open for research collabs
14 Followers 10 FollowingAd-hoc cyber threat intel from our team of active hunters at @lab539. We mainly track Adversary in The Middle infrastructure and share indicators of attack.
3K Followers 3K Followingthreaty threats @ StrikeReady -- helping build research workflows into the product. pretty good at bash scripts and strings. disclosures on my linkedin below
16K Followers 29 FollowingTechnical Twitter of QiAnXin Technology, leading Chinese security vendor. It is operated by RedDrip Team which focuses on malware, APT and threat intelligence.
2K Followers 73 FollowingУрядова команда реагування на комп’ютерні надзвичайні події України CERT-UA (Computer Emergency Response Team of Ukraine CERT-UA )
17K Followers 0 Followingsecret club is a not-for-profit reverse-engineering group; publishing new research on popular software.
No ads, no cookies, just research.
19K Followers 293 Following#OSINT treasure hunter, investigator, #CyberThreatIntel analyst. Opinions are my own. Follow me on Telegram https://t.co/i6VBbeUXgd for cyber news.
9K Followers 332 FollowingReverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
2K Followers 73 FollowingFounded by Lena Yu aka @LambdaMamba | Run by World Cyber Health (WCH) Non-Profit | Discord: https://t.co/JE25nRRco6 | Email: [email protected]
3K Followers 5K FollowingCHA is my family name. Senior Principal Threat Intelligence Researcher at AhnLab / Keybase : mstoned7 , Signal : mstoned7.21 / Tweets are my own.
145K Followers 215 FollowingWe are the Microsoft Security Response Center. To report security vulnerabilities or abuse in Microsoft products, visit https://t.co/kxEbdfMny1.
4K Followers 76 FollowingMalware Analysis
Creator of Debloat, certReport, and https://t.co/w4rAuuB7O0
Want to chat? Join the Debloat discord: https://t.co/ZcWIqa6ZA9
No recent Favorites. New Favorites will appear here.