Simon Kenin's Avatar

Simon Kenin

@k3yp0d

Threat Hunter at SentinelOne | curatedintel.org Member | k3yp0d.blogspot.com | Opinions are of my own voices inside my own head | memes and music are welcome

373
Followers
151
Following
162
Posts
10.07.2023
Joined
Posts Following

Latest posts by Simon Kenin @k3yp0d

Preview
How We Caught Lazarus's IT Workers Scheme Live on Camera See how Lazarus Group's IT workers scheme was exposed on a live camera using real-time monitoring inside ANY.RUNโ€™s sandbox.

If you are hiring full remote, you must read this.
DPRK IT workers is a much bigger problem than you think, those are today's spies that infiltrate multiple organizations simultaneously without the risk of being caught.

any.run/cybersecurit...

09.12.2025 10:28 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
4.3 Million Browsers Infected: Inside ShadyPanda's 7-Year Malware Campaign | Koi Blog

2/2
410f5add77c00714d1e214495c406dc2
6dadafaa55728ef8bd27a0e802dfeebb
ref: www.koi.ai/blog/4-milli...

09.12.2025 10:04 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

1/2
ShadyPanda extension samples:
e9975e39b87a0369dba21dcc7a4dcd56
b4a828b6ea8f0faaf9a2cdbc5b7a8241
5c56346e09de3aef10d8df6b292df9b3
491518101c265a7a79040ea148bc7ae7
6619beef592118fa90dc67b103eb6d58
58a6c9a2125858e828191e51d9f30e4f

09.12.2025 10:04 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
MuddyWater: Snakes by the riverbank MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook.

#ESETresearch discovered a new #MuddyWater campaign targeting critical infrastructure in ๐Ÿ‡ฎ๐Ÿ‡ฑ Israel and ๐Ÿ‡ช๐Ÿ‡ฌ Egypt, using a new backdoor โ€“ MuddyViper โ€“ and a variety of post-compromise tools www.welivesecurity.com/en/eset-rese... 1/7

02.12.2025 11:42 ๐Ÿ‘ 7 ๐Ÿ” 6 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

UNC5203

26.11.2025 11:01 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
SpearSpecter Unmasking Iranโ€™s IRGC Cyber Operations Targeting High-Profile Individuals The SpearSpecter campaign linked to Iranโ€™s IRGC / APT42 used social engineering and the TAMECAT backdoor to infiltrate high-v...

govextra.gov.il/national-dig...
credit where credit is due, part 2

18.11.2025 21:48 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
ืฉื ื˜ื•ื‘ ื”ืื‘ื™ 2 | ื”ืกืจื˜ ื”ืžืœื โญ
ืฉื ื˜ื•ื‘ ื”ืื‘ื™ 2 | ื”ืกืจื˜ ื”ืžืœื โญ YouTube video by ื›ืืŸ | ื“ื™ื’ื™ื˜ืœ - ืชืื’ื™ื“ ื”ืฉื™ื“ื•ืจ ื”ื™ืฉืจืืœื™

www.youtube.com/watch?v=4iYA...

18.11.2025 21:44 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Frontline Intelligence: Analysis of UNC1549 TTPs, Custom Tools, and Malware Targeting the Aerospace and Defense Ecosystem | Google Cloud Blog Tactics, techniques and procedures we discovered during incident response investigations into UNC1549 activity.

cloud.google.com/blog/topics/...

18.11.2025 21:43 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Handala attempts a supply chain hack via ReutOne During the week, Handalaโ€Šโ€”โ€Ša group painfully in love with Israel, tried a forward supply chain attack.

4/4
VIBE attribution to Handala because of similarities in TTPs and similarities to their HEAVYGRAM malware.
Ref: doublepulsar.com/handala-atte...

I don't need to reverse this shit to know... ๐Ÿคก

16.11.2025 15:36 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

3/4
securityscanner.exe
7f4ded56abaacb2bf4649665ac259c7c
25f27131e8de91f8d6fdf9bfa1901577f992ce33
2afcac3231235b5cea0fc702d705ec76afec424a9cec820749b83b6299d1fe1b

This file is not signed by Check Point... it connects to Telegram and Dropbox for exfiltration and probably more...

16.11.2025 15:36 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

2/4
The PDF masquerades the download link to be a Check Point security tool.
The password for the RAR however is related to a cloud provider called cloudstar, but the small print say the service is provided by G.N.S.
cellcom.co.il/production/B...

16.11.2025 15:36 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

1/4
O_o
help.pdf
02e3a2cc825b7ac3e1bad50d4088a74f
2d49a02c6e77d7ebcff87e62ab14d826f4281cba
e422c2f25fbb4951f069c6ba24e9b917e95edb9019c10d34de4309f480c342df

PDF in Hebrew contains a link to a password protected RAR archive hosted in @dropbox.com

16.11.2025 15:36 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Analysis https://docspace-mpv1y2.onlyoffice.com/rooms/share?folder=1634939&searchArea=3&key=YWgzSkorMWJIMHFlcFpSd2VXQ25FRjR5aUFid2dNeG90MDhXc1lSY0dHRT0_IjgzMmIzNGMzLTJlODktNDQwNC05YzNhLTQ1NjQw... Interactive malware hunting service. Live testing of most type of threats in any environments. No installation and no waiting necessary.

5/5

Sample: app.any.run/tasks/530fdd...

07.11.2025 21:34 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

4/5
This onlyoffice subdomain is also mentioned by Proofpoint, but the shared key and content are different.
Test Projects.zip -> 8e7771ed1126b79c9a6a1093b2598282221cad8524c061943185272fbe58142d
This file is listed in the IOCs of the CP blog and might have been reused

07.11.2025 21:34 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

3/5
However, Check Point did not mention OnlyOffice.
The missing link is available at any.run

07.11.2025 21:34 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Nimbus Manticore Deploys New Malware Targeting Europe - Check Point Research Nimbus Manticore continuously attacks defense, manufacturing, telecommunications, and aviation targets aligned with the IRGC

2/5
Part of this activity was reported by Check Point research.checkpoint.com/2025/nimbus-...

07.11.2025 21:34 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
two men are standing next to each other in a room . ALT: two men are standing next to each other in a room .

1/5
IRGC + MOIS
Very interesting analysis from @proofpoint.com @saffronsec.bsky.social
www.proofpoint.com/us/blog/thre...

07.11.2025 21:34 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image
05.11.2025 19:31 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
a close up of a cat 's face with its mouth open ALT: a close up of a cat 's face with its mouth open

4/4
Iranian Kittens go O_o

28.10.2025 17:23 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

3/4
Additional "Hacktivism" hosted on PRQ[.]SE:
x.com/k3yp0d/statu...

28.10.2025 17:23 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

2/4 Evidence
www.secureworks.com/blog/abraham...

28.10.2025 17:23 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

1/4
Hacktivism demystified.
Leak:
github.com/KittenBuster...

28.10.2025 17:23 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

5/5
Samples:
app.any.run/tasks/191467...
app.any.run/tasks/3a1761...
app.any.run/tasks/3a1761...
app.any.run/tasks/e3ac5b...
app.any.run/tasks/1f26a7...
app.any.run/tasks/6693a8...
app.any.run/tasks/e4cd4f...

25.10.2025 09:19 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image Post image Post image

4/5
JS downloads NetSupport RAT and drops decoy PDF
Example C2 139.28.38.39

25.10.2025 09:19 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image Post image

3/5

Example zip 0f6f4c1821b71ea73213b3b290b7e23b
Vchasno_doc_22.10.2025_0029.zip
Zip contains either just a JS payload or benign files with additional archives which contains the JS payload

25.10.2025 09:19 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image Post image Post image

2/5
Example PDF ebb7c92f4d38510f8efab00eb8e2d9ad
ะŸะปะฐั‚ั–ะถะฝะต_ะดะพั€ัƒั‡ะตะฝะฝั_22.10.2025_00684096792.pdf
PDF contains link to 2nd payload.
2nd stage payload is distributed among different hosting providers:
Dropbox
MS OneDrive
4sync

25.10.2025 09:19 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

1/5
๐Ÿ‡บ๐Ÿ‡ฆ
Ongoing campaign targeting Ukrainians:
EML->PDF->URL->ZIP->JS->NetSupport RAT

Email 55ffcf6f4df8ab3f11a405794aa5f4d8

25.10.2025 09:19 ๐Ÿ‘ 0 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Catch One
Catch One YouTube video by Juche - Topic

www.youtube.com/watch?v=mSJr...

In the labyrinth of circuits and wires
An electronic maze where the signal fires
Neon pathways gleam with cold and light
In the realm of data, we take our flight

16.10.2025 21:02 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

4/4
Another example of PDQ + ScreenConnect
bsky.app/profile/k3yp...

05.10.2025 12:44 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

3/4
ScreenConnect C2: gripsmonga[.]sbs / 144.172.95.60
Hosted at: RouterHosting / Cloudzy ๐Ÿคข๐Ÿคฎ๐Ÿคข

05.10.2025 12:44 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0