#nim

2026-02-11

A Peek Into Muddled Libra's Operational Playbook

Unit 42 discovered a rogue virtual machine used by the cybercrime group Muddled Libra during an incident response investigation. The VM provided insights into the group's operational methods, including reconnaissance, tool downloads, persistence establishment, certificate theft, and interactions with the target's infrastructure. Muddled Libra created the VM after gaining unauthorized access to the target's VMware vSphere environment. The group's tactics involve minimal malware use, preferring to leverage the target's assets. Their attack chain included creating a VM, downloading tools, establishing C2, using stolen certificates, and attempting data exfiltration. The article details the group's activities, tools used, and troubleshooting efforts during the attack.

Pulse ID: 698bf5e82779d93b1135d3f3
Pulse Link: otx.alienvault.com/pulse/698bf
Pulse Author: AlienVault
Created: 2026-02-11 03:22:16

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberCrime #CyberSecurity #ICS #InfoSec #Mac #Malware #Nim #OTX #OpenThreatExchange #RAT #Unit42 #VMware #bot #AlienVault

2026-02-07

New Saturday, the new weekly development report from my #opensource projects is ready to read. A roguelike game and a #Nim binding to Nuklear GUI library were on the table as usual. More information: www.laeran.pl.eu.org/blog/devblog... As always, happy weekend, everyone. ๐Ÿ˜€

2026-02-05

Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework

Cisco Talos uncovered 'DKnife', a sophisticated gateway-monitoring and adversary-in-the-middle (AitM) framework comprising seven Linux-based implants. Used since 2019, DKnife performs deep-packet inspection, traffic manipulation, and malware delivery via routers and edge devices. It targets various devices, including PCs, mobile devices, and IoT, delivering ShadowPad and DarkNimbus backdoors. The framework primarily targets Chinese-speaking users, with evidence suggesting China-nexus threat actors as operators. DKnife's capabilities include DNS hijacking, Android application update hijacking, Windows binary hijacking, anti-virus traffic disruption, and user activity monitoring. A link to the WizardNet campaign was also discovered, indicating a shared development or operational lineage.

Pulse ID: 6984fa9b481e11f8426b9eb0
Pulse Link: otx.alienvault.com/pulse/6984f
Pulse Author: AlienVault
Created: 2026-02-05 20:16:27

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#AdversaryInTheMiddle #AitM #Android #BackDoor #China #Chinese #Cisco #CyberSecurity #DNS #Edge #InfoSec #IoT #Linux #Malware #Nim #OTX #OpenThreatExchange #RAT #ShadowPad #Talos #Windows #bot #AlienVault

Zimo (@Zimo41650079726)

์‚ฌ์šฉ์ž๋Š” OpenrouterAI์™€ NIM์„ ๋น„๊ตํ•˜๋ฉฐ ์ผ๋ณธ์–ด ์„ฑ๋Šฅ ํ‰๊ฐ€๋ฅผ ๊ณต์œ ํ•ฉ๋‹ˆ๋‹ค. NIM์ด ์‘๋‹ต์˜ ์ผ๊ด€์„ฑ ๋ฐ ์˜์–ดยท์ค‘๊ตญ์–ด ํ˜ผ์ž…์ด ์ ์–ด ์ผ๋ณธ์–ด์— ๋” ๊ฐ•ํ–ˆ๊ณ , OpenrouterAI๋Š” ์งˆ๋ฌธ์— ๋” ๊นŠ๊ฒŒ ๋“ค์–ด๊ฐ”๋‹ค๊ณ  ํ‰๊ฐ€ํ•ฉ๋‹ˆ๋‹ค. ์ž‘์„ฑ์ž๋Š” ์–‘์žํ™”(quantization)๊ฐ€ ๋ชจ๋ธ์˜ ์ •๋ ฌ(alignment)์„ ์†์ƒ์‹œ์ผฐ์„ ๊ฐ€๋Šฅ์„ฑ๋„ ์ œ๊ธฐํ•ฉ๋‹ˆ๋‹ค.

x.com/Zimo41650079726/status/2

#openrouterai #nim #quantization #alignment #multilingual

2026-02-03

#nim toolings and libraries docs really need to be updated fr

2026-02-02

i spent the whole day to learn #nim tooling ๐Ÿ˜†

2026-01-31

And weekly wakie: the new, shiny and short, weekly development report from my #opensource projects is ready to read. A roguelike game and #Nim binding to Nuklear GUI library got some attention this week. More info: www.laeran.pl.eu.org/blog/devblog... Happy weekend everyone. ๐Ÿ˜Ž

2026-01-24

New saturday, new weekly development report from my #opensource projects is ready to read. As usual, a roguelike game and #Nim binding to Nuklear GUI library got some changes this week. More info: www.laeran.pl.eu.org/blog/devblog... Happy weekend, everyone. โ˜•

4zv4l4zv4l
2026-01-21

@rvyhvn I really enjoyed few years ago, made my biggest project using it.
Have you taken a look at () ? Itโ€™s my current fav language, I just wish that it could compile to binary (so that I can share to people now having Raku installed).

2026-01-19

PDFSIDER Malware - Exploitation of DLL Side-Loading for AV and EDR Evasion

PDFSIDER is a newly identified malware variant that utilizes DLL side-loading to deploy a covert backdoor with encrypted command-and-control capabilities. It exploits vulnerabilities in legitimate software like PDF24 Creator to bypass endpoint detection mechanisms. The malware operates primarily in memory, minimizing disk artifacts, and employs advanced anti-VM technology to evade sandboxes and analysis labs. PDFSIDER features a robust cryptographic implementation using the Botan library for secure communications. It gathers system information and provides attackers with an interactive, hidden command shell for remote execution. The malware's characteristics align with APT tradecraft, suggesting its use in cyber-espionage operations. Distribution occurs through spear-phishing emails containing ZIP archives with legitimate-looking executables.

Pulse ID: 696d289a872523c04861cbfa
Pulse Link: otx.alienvault.com/pulse/696d2
Pulse Author: AlienVault
Created: 2026-01-18 18:38:18

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #CyberSecurity #EDR #Email #Endpoint #Espionage #ICS #InfoSec #Malware #Nim #OTX #OpenThreatExchange #PDF #Phishing #RAT #SMS #SpearPhishing #ZIP #bot #cyberespionage #AlienVault

2026-01-19

Targeted espionage leveraging geopolitical themes

A targeted malware campaign against U.S. government entities has been observed, utilizing a politically themed ZIP archive containing a loader executable and a malicious DLL. The DLL functions as a backdoor named LOTUSLITE, communicating with a hard-coded command-and-control server. The campaign demonstrates minimal technical sophistication but shows deliberate victim selection and use of geopolitical lures. Attribution analysis suggests moderate-confidence overlap with Mustang Panda tradecraft, including delivery style, loader-DLL separation, and infrastructure usage. The backdoor supports basic remote tasking and data exfiltration, indicating an espionage-focused capability. This activity reflects a trend of targeted spear phishing using geopolitical themes and reliable execution techniques like DLL sideloading.

Pulse ID: 6968d7976784ef21a6276d75
Pulse Link: otx.alienvault.com/pulse/6968d
Pulse Author: AlienVault
Created: 2026-01-15 12:03:35

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #CyberSecurity #Espionage #Government #InfoSec #Malware #Nim #OTX #OpenThreatExchange #Phishing #RAT #SideLoading #SpearPhishing #ZIP #bot #AlienVault

2026-01-17

Here we are again, with the new, usual, weekly development report from my #opensource projects. As always, a roguelike game and #Nim binding to Nuklear GUI library got some attention. More information about changes: www.laeran.pl.eu.org/blog/devblog... Happy weekend everyone, as always too. ๐Ÿ˜‰

2026-01-10

And weekly wakie with the new development report from my #opensource projects. As always, a roguelike game and #Nim binding for Nuklear GUI library got some changes. More information: www.laeran.pl.eu.org/blog/devblog... And standard, happy weekend, everyone. ๐Ÿ˜ƒ

2026-01-03

New weekend, new month and happy new year. ๐Ÿ˜œ Time for new development report from my #opensource projects. As usual, a roguelike game and #Nim binding to Nuklear GUI library were on the table. More details: www.laeran.pl.eu.org/blog/devblog... Happy new weekend, everyone. ๐Ÿ˜‰

Happy new year everyone! ๐ŸŽ„ Iโ€™ve just released MiniECS, a minimalist ECS module for Nim. Enjoy! ๐Ÿš€

github.com/erayzesen/miniecs

#Nimlang #Nim #gamedev #ecs

2025-12-27

It is time, for the last (this year) weekly development report from my #opensource projects. As usual, a roguelike game and #Nim binding to Nuklear GUI library got some attention this week. More information: www.laeran.pl.eu.org/blog/devblog... And happy last weekend of the year, everyone. ๐Ÿ˜Ž

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst