Blind Eagle (TAG-144) is ramping up. Our Insikt Group report uncovers 5 distinct activity clusters targeting Colombian gov’t entities with evolving TTPs, RATs, and infrastructure.
Get the IoCs and mitigations:👇
bit.ly/4fUd99m
The Lumma infostealer isn’t just #malware, it’s an ecosystem.
Our latest Insikt research reveals how affiliates use new tools, MaaS platforms, and underground networks to fuel fraud and evade detection.
Full report👇
bit.ly/3Hl1nrZ#ThreatIntelligence#Cybersecurity
The "perfect" #magecart: Hacker injects 1st-party JS replacing Stripe’s #payment form with a fake one. Stolen data sent to the merchant’s own server
No 3rd-party domains, no suspicious traffic.
Real Stripe form hidden, fake shown to the shopper #WebSkimming#FormJacking#PCIDSS
WebSocket was used for exfiltration in earlier samples. In this one, EMV card data is sent over MQTT.
Direct use of pushMessageToMqtt() after NFC tag discovery confirms this behavior
#CardSecurity
WebSocket was used for exfiltration in earlier samples. In this one, EMV card data is sent over MQTT.
Direct use of pushMessageToMqtt() after NFC tag discovery confirms this behavior
#CardSecurity https://t.co/wJGMfcx59f
🚨 Android malware impersonating "security apps" from banks abuses NFC (IsoDep) to read EMV contactless cards and exfiltrate data in real time via WebSocket.
c2: 45.88.91\.119
Been debugging a lot of EMV stuff lately...
@setThreatTitle @P4nd3m1cb0y@akaclandestine
Batch + Warsaw Check + Malicious Extension = Exfiltration
A malicious batch script checks for #Warsaw security software. If Warsaw is absent, the infection process stops. If present, it loads a malicious extension, then monitors and collects data from "Banco do Brasil" accesses.
30 Followers 114 Following🔍Security researcher passionate about safeguarding the digital world. 🛡️ Guardian of digital frontiers. #CyberSecurity #InfoSec 🖥️
9K Followers 647 FollowingA leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime. Combating cybercrime since 2003
37K Followers 26 FollowingUnderground Synth Instrumental Record Label based in LA, inspired by 80s nostalgia. Check out the latest releases: https://t.co/PlJ638mmrM
10K Followers 1K FollowingCensys is the source for real-time Internet intelligence and actionable threat insights for governments, F500 companies, and leading threat intel providers
2.5M Followers 23K FollowingReposting Trump’s Truth Social posts (with date/time) on X + news/commentary. Unofficial. Profile Artist: @ElenaRuseva1 Not affiliated with @realdonaldtrump.
6K Followers 2K FollowingThreat Intel. stakhanovite ⛏️ and proud dad. Former @Kaspersky & @CERT_FR. Principal CTI researcher at @sekoia_io, focused on state-sponsored / hybrid stuff.
15K Followers 521 FollowingRE and More by Alexey Kleymenov (https://t.co/s1pWjL46AW). Private classes and group workshops in malware analysis and reverse engineering. #infosec #malware
60K Followers 1K FollowingSecurity information portal, testing and certification body.
Organisers of the annual Virus Bulletin conference. @[email protected]
4K Followers 147 FollowingA #SOCplatform boosted by #AI and #threatintelligence, combining #SIEM, #SOAR, #Automation in a single solution. Used by End-users, MSSP and APIs
1K Followers 422 FollowingThreat Intel Researcher.
Opinions are mine.
Special thanks to @censysio , @ValidinLLC & @ReversingLabs for making my research easier.
4K Followers 481 FollowingCybercrime & Hacktivism @RecordedFuture | @Georgetown, @AmericanU Alum. | @CuratedIntel Member | #ChiefsKingdom | Same handle on the other sites.
2K Followers 16 FollowingExperts in ecommerce security. Helping merchants in times of peril. Tracking large scale digital skimming since 2015. PGP key 9D0D094CD2C7E669