If you are hiring full remote, you must read this.
DPRK IT workers is a much bigger problem than you think, those are today's spies that infiltrate multiple organizations simultaneously without the risk of being caught.
any.run/cybersecurit...
If you are hiring full remote, you must read this.
DPRK IT workers is a much bigger problem than you think, those are today's spies that infiltrate multiple organizations simultaneously without the risk of being caught.
any.run/cybersecurit...
2/2
410f5add77c00714d1e214495c406dc2
6dadafaa55728ef8bd27a0e802dfeebb
ref: www.koi.ai/blog/4-milli...
1/2
ShadyPanda extension samples:
e9975e39b87a0369dba21dcc7a4dcd56
b4a828b6ea8f0faaf9a2cdbc5b7a8241
5c56346e09de3aef10d8df6b292df9b3
491518101c265a7a79040ea148bc7ae7
6619beef592118fa90dc67b103eb6d58
58a6c9a2125858e828191e51d9f30e4f
#ESETresearch discovered a new #MuddyWater campaign targeting critical infrastructure in ๐ฎ๐ฑ Israel and ๐ช๐ฌ Egypt, using a new backdoor โ MuddyViper โ and a variety of post-compromise tools www.welivesecurity.com/en/eset-rese... 1/7
UNC5203
govextra.gov.il/national-dig...
credit where credit is due, part 2
4/4
VIBE attribution to Handala because of similarities in TTPs and similarities to their HEAVYGRAM malware.
Ref: doublepulsar.com/handala-atte...
I don't need to reverse this shit to know... ๐คก
3/4
securityscanner.exe
7f4ded56abaacb2bf4649665ac259c7c
25f27131e8de91f8d6fdf9bfa1901577f992ce33
2afcac3231235b5cea0fc702d705ec76afec424a9cec820749b83b6299d1fe1b
This file is not signed by Check Point... it connects to Telegram and Dropbox for exfiltration and probably more...
2/4
The PDF masquerades the download link to be a Check Point security tool.
The password for the RAR however is related to a cloud provider called cloudstar, but the small print say the service is provided by G.N.S.
cellcom.co.il/production/B...
1/4
O_o
help.pdf
02e3a2cc825b7ac3e1bad50d4088a74f
2d49a02c6e77d7ebcff87e62ab14d826f4281cba
e422c2f25fbb4951f069c6ba24e9b917e95edb9019c10d34de4309f480c342df
PDF in Hebrew contains a link to a password protected RAR archive hosted in @dropbox.com
4/5
This onlyoffice subdomain is also mentioned by Proofpoint, but the shared key and content are different.
Test Projects.zip -> 8e7771ed1126b79c9a6a1093b2598282221cad8524c061943185272fbe58142d
This file is listed in the IOCs of the CP blog and might have been reused
3/5
However, Check Point did not mention OnlyOffice.
The missing link is available at any.run
2/5
Part of this activity was reported by Check Point research.checkpoint.com/2025/nimbus-...
1/5
IRGC + MOIS
Very interesting analysis from @proofpoint.com @saffronsec.bsky.social
www.proofpoint.com/us/blog/thre...
3/4
Additional "Hacktivism" hosted on PRQ[.]SE:
x.com/k3yp0d/statu...
2/4 Evidence
www.secureworks.com/blog/abraham...
1/4
Hacktivism demystified.
Leak:
github.com/KittenBuster...
5/5
Samples:
app.any.run/tasks/191467...
app.any.run/tasks/3a1761...
app.any.run/tasks/3a1761...
app.any.run/tasks/e3ac5b...
app.any.run/tasks/1f26a7...
app.any.run/tasks/6693a8...
app.any.run/tasks/e4cd4f...
4/5
JS downloads NetSupport RAT and drops decoy PDF
Example C2 139.28.38.39
3/5
Example zip 0f6f4c1821b71ea73213b3b290b7e23b
Vchasno_doc_22.10.2025_0029.zip
Zip contains either just a JS payload or benign files with additional archives which contains the JS payload
2/5
Example PDF ebb7c92f4d38510f8efab00eb8e2d9ad
ะะปะฐััะถะฝะต_ะดะพัััะตะฝะฝั_22.10.2025_00684096792.pdf
PDF contains link to 2nd payload.
2nd stage payload is distributed among different hosting providers:
Dropbox
MS OneDrive
4sync
1/5
๐บ๐ฆ
Ongoing campaign targeting Ukrainians:
EML->PDF->URL->ZIP->JS->NetSupport RAT
Email 55ffcf6f4df8ab3f11a405794aa5f4d8
www.youtube.com/watch?v=mSJr...
In the labyrinth of circuits and wires
An electronic maze where the signal fires
Neon pathways gleam with cold and light
In the realm of data, we take our flight
4/4
Another example of PDQ + ScreenConnect
bsky.app/profile/k3yp...
3/4
ScreenConnect C2: gripsmonga[.]sbs / 144.172.95.60
Hosted at: RouterHosting / Cloudzy ๐คข๐คฎ๐คข