Zscaler's Nikolaos Pantazopoulos analyses the functionality of Raspberry Robin (also known as Roshtyak), including its execution layers, obfuscation methods and network communication process, along with its latest exploits. zscaler.com/blogs/security…
Join me, @switchingtoguns, @a_de_pasquale, and our team as a Sr. Threat Researcher focusing on phishing detection. Use your skills in pattern-based detection, regex, HTML/HTTP, and current phishing landscape, to combat phishing threats for SAA customers
splunk.com/en_us/careers/…
Ya Qbot is back, it sucks. But look what happened with Emotet when it came back. Was a half assed attempt at running a botnet which eventually disappeared without any LE. Lets make it so that becomes the case with Qbot as well.
An embedded configuration EPOCH timestamp indicates the payload was generated on December 11. The campaign code was tchk06. Most notably, the delivered Qakbot payload was configured with the previously unseen version 0x500.
Observed Qakbot C2:
45[.]138.74.191
65[.]108.218.24
Microsoft has identified new Qakbot phishing campaigns following the August 2023 law enforcement disruption operation. The campaign began on December 11, was low in volume, and targeted the hospitality industry. Targets received a PDF from a user masquerading as an IRS employee.
So proud to be a part of this collective effort at Microsoft. Badasses at Microsoft Threat Intelligence supporting significant Digital Crimes Unit legal disruptions. This is just the beginning, so many more targets, so much more we are doing and will do #staytuned
So proud to be a part of this collective effort at Microsoft. Badasses at Microsoft Threat Intelligence supporting significant Digital Crimes Unit legal disruptions. This is just the beginning, so many more targets, so much more we are doing and will do #staytuned
Malware delivered via teams, you should have a look at this. No log, no protection, except if you configure team to only allow trusted orgs to discuss with yours. But you can’t see if it’s already in use because you don’t have logs…
truesec.com/hub/blog/darkg…
do you HATE miscreants? do you LOVE writing detections, hunting thru INSANE amounts of data, and protecting a LOT of orgs?
@Microsoft is hiring Detection Engineering/Threat Hunting roles for email security. work with some of the smartest folks in the game: jobs.careers.microsoft.com/global/en/job/…
Microsoft has identified a phishing campaign conducted by Storm-0978 targeting defense and government entities in Europe and North America. The campaign involved the abuse of CVE-2023-36884 to deliver a payload with similarities to the RomCom backdoor. msft.it/6015g0O8x
36K Followers 7K FollowingWeird security voyeur. Vibe merchant. CISO of your 🩷 Official USPS fan account. 🎉 Host of THE Microsoft Threat Intelligence Podcast. I like crime actors.
60K Followers 1K FollowingSecurity information portal, testing and certification body.
Organisers of the annual Virus Bulletin conference. @[email protected]
89K Followers 910 FollowingProgrammer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
8K Followers 530 FollowingThreat Intel researcher! Technical tweets only; not reflective of employer's views. No endorsement of political groups/entities.
38K Followers 3K FollowingTech Director / Threat Intelligence at Microsoft. Previously, Director of Incident Response & Intel Research at Mandiant. Former Chief Technical Analyst at CISA
38K Followers 3K FollowingTech Director / Threat Intelligence at Microsoft. Previously, Director of Incident Response & Intel Research at Mandiant. Former Chief Technical Analyst at CISA
14K Followers 1K FollowingAuthor/Operator of @ScumBots. Blue Team by day, Blue Team by night. Opinions, typos, and bad grammar do not represent my employer. He/Him
547 Followers 986 FollowingMicrosoft Digital Crimes Unit. Former cyber and national security attorney @FBI. Tweet on DC and PSU sports, law, and the human condition. Views my own, obvies
507 Followers 992 FollowingDFIR | EDR | Security Automation | Threat Intel | Detection Engineering |Tweets are my own, and not associated with my employer
5K Followers 312 FollowingThreat intel researcher focused on infrastructure hunting. Views are my own and not my employer's. Others: @[email protected] @kyleehmke.bsky.social
753 Followers 976 FollowingApplied Intelligence and Threat Research
#Vet
#DataAddict
#Truth
#WildDreams
#NoTrustPress
Don't touch my drums
Opinions are always my own
2K Followers 499 Following👨💻 Engineer, passionate about IT security
🔬 Daytime: Researcher @SophosXOps
🧪 Nightime: write-ups on experiments @ https://t.co/JD9nTOciQE
🙋 Opinions are my own
2K Followers 800 FollowingEngineer | Investigator @meta, PhD in Applied Data Analytics x Criminology. #animalrights advocate. Founded @threatminer. Calisthenic hobbyist. Views are my own
2K Followers 166 FollowingReverse engineer / malware analyst. On the hunt for domain generation algorithms. Current side project: https://t.co/Cv3COq0ZmR
15K Followers 160 FollowingSenior Security Engineer @Amazon. Ex Assistant Professor. Opinions are mine; not my employer's. DM is open.
Author of xlmdeobfuscator and https://t.co/eh1fMHMADE
10K Followers 1K Following#infosec #cybersecurity #SIEM #malware #incidentresponse #threathunting #phishing #YARArules I find #APTs, #malware, and #credharvesters 🐕 in a world of 🐟
5K Followers 2K FollowingA Civil Engineer married with Mrs IDA Pro. Sons are WinDbg and OllyDbg. We live in a VM. We eat bread and malware, APT on Sunday
761 Followers 2K FollowingFuroner: Dit d'aquella persona apassionada per la informàtica i que té un viu interès per a aprendre i posar a prova les seves habilitats en aquest àmbit.
No recent Favorites. New Favorites will appear here.