#theatintel

Threat IntelligenceThreatIntel@cyberespresso.eu
2025-09-04

(seqrite.com) Noisy Bear APT: Multi-Stage Campaign Targeting Kazakhstan Energy Sector with DOWNSHELL PowerShell Loaders

seqrite.com/blog/operation-bar

#TheatIntel #Cybersecurity #Infosec
@threatintel@a.gup.pe @cybersecurity

1/2

Fafner [_KeyZee_]F_kZ_@infosec.exchange
2024-05-04

Should we continue to let DLS website visible on the public instance of RansomLook.io ?
Should we continue to let full access to the API too ?
#ransomware #theatIntel

Volexity :verified:volexity@infosec.exchange
2023-09-22

@volexity's #theatintel team works with some of the most targeted groups in the world. Today, at the LABScon conference, we are sharing details of a long-running campaign by EvilBamboo. We have also just published details on our blog: volexity.com/blog/2023/09/22/e.

Our analysis has uncovered evidence of the attacker building online communities on various social media & messaging platforms, creating fake personas on social media sites, and using other #socialengineering techniques in order to distribute #Android malware, including #BADBAZAAR. Additionally, there is strong evidence of #iOS device targeting and likely exploitation using IRONSQUIRREL.

#dfir #security

2023-07-25

A few months ago I posted about a DNS malware C2 we had discovered— Decoy Dog — that was based on Pupy, had been undetected for over a year, and had some inexplicable behavior. We hoped the community would easily find the infected devices based on the info we provided. No suck luck. Since then we have used DNS to learn and an astonishing amount about the operations. Once we realized Decoy Dog was more advanced than Pupy, and we saw how the actors responded to our original relesases, we went back to the binaries. Today we released an indepth technical analysis of Decoy Dog, a Pupy research data set, and a new Yara rule. This is the exec summary. Link to the full technical paper and other tidbits in the comments. #dns #theatintel #malware #decoydog #rat #c2 #infoblox #datascience #threatresearch blogs.infoblox.com/cyber-threa

2022-12-05

What kind of scam is this? DM received on birdsite.

hxxps://btcusdt365.com

#scam #theatIntel #phishing #IoC

DM with a website seemingly related with cryptocurrency, a username, password and 664k USDT balance. Message reads "help me manage, thanks"

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst