Sekoia.io's Avatar

Sekoia.io

@sekoia.io

A #SOCplatform boosted by #AI and #threatintelligence, combining #SIEM, #SOAR, #Automation in a single solution. Used by End-users, MSSP and APIs

450
Followers
38
Following
113
Posts
25.10.2023
Joined
Posts Following

Latest posts by Sekoia.io @sekoia.io

πŸ” Custom Obfuscation: Leverages non-standard Base64 encoding with randomized shifts to evade automated detection.
πŸ–ΌοΈ Steganography: Hides payloads within innocuous-looking icon images retrieved from the C2.

12.02.2026 09:34 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

🎭 Advanced Evasion: Packed with TextShell for enhanced obfuscation (custom LZMA); utilizes API "hammering" and anti-debug traps to bypass detection and delay manual analysis.

12.02.2026 09:34 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

In this deep-dive analysis, our Threat Detection & Research (TDR) team uncovers a sophisticated, multi-stage infection designed to bypass security controls. Key findings:

πŸ“¦ Deceptive Distribution: Spreads via fake sites impersonating IT tools like PuTTY or WinSCP.

12.02.2026 09:34 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

#OysterLoader (aka #Broomstick or #Cleanup) is not just another downloader. Often serving as a precursor to #Rhysida #ransomware campaigns or distributing commodity malware such as #Vidar, this threat has evolved significantly as we enter 2026.

blog.sekoia.io/oysterloader...

#Reverse

12.02.2026 09:34 πŸ‘ 2 πŸ” 3 πŸ’¬ 2 πŸ“Œ 0

As usual, IoCs are available in our Community GitHub repository:

github.com/SEKOIA-IO/Co...

29.01.2026 09:10 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

The attacker is abusing the open-source URL shortener YOURLS as a Traffic Distribution System (TDS), filtering visitors by device type and protecting their infrastructure.

To our knowledge, this is the first time cybercriminals have used YOURLS as a TDS.

29.01.2026 09:10 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

We named the framework "IClickFix" after its characteristic HTML the tag "ic-tracker-js".

In November 2025, we unveiled IClickFix via an internal tool detecting watering hole attacks and YARA rules tuned to identify ClickFix pages.

29.01.2026 09:10 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

#TDR analysts deep dived into a widespread malicious JavaScript framework injected into 3,800+ WordPress sites to distribute #NetSupport RAT via the #ClickFix social engineering tactic.

blog.sekoia.io/meet-iclickf...

29.01.2026 09:10 πŸ‘ 2 πŸ” 2 πŸ’¬ 2 πŸ“Œ 1

This research highlights how defensive kernel mechanisms can be repurposed to strengthen behavioural detection on Linux endpoints.

14.01.2026 14:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

The blog post dives into how #Landlock, originally designed as a security hardening mechanism, can also become a powerful source of telemetry for detection engineering on #Linux systems.

14.01.2026 14:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

🐧 Leveraging #Landlock Telemetry for #Linux Detection Engineering

Sekoia #TDR explores how Linux Landlock telemetry can be leveraged to build high-fidelity, low-noise detections by observing sandbox policy violations.

blog.sekoia.io/leveraging-l...

14.01.2026 14:39 πŸ‘ 1 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Post image

In the third part of our series β€œAdvent of Configuration Extraction”, we dissect #SNOWLIGHT, a lightweight ELF downloader designed to retrieve and execute a remote payload on #Linux systems.

buff.ly/Crz8rDh

15.12.2025 13:54 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

In the second part, we unwrap #QuasarRAT, a popular .NET remote access trojan, and show how to extract its encrypted configuration out of the binary.

buff.ly/agWWCnp

15.12.2025 13:54 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

The first part introduces #Assemblyline, the analysis pipeline used by #TDR and more specifically, the configextractor service.

buff.ly/mpEzALh

15.12.2025 13:54 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

The series outlines the methodology we employ at Sekoia’s Threat Detection & Research (#TDR) team to automate the extraction of #malware configuration data, from initial analysis to the production of usable intelligence.

15.12.2025 13:54 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

πŸŽ… Check out the first three episodes of our special Advent of Configuration Extraction
Part 1: buff.ly/mpEzALh
Part 2: buff.ly/agWWCnp
Part3: buff.ly/Crz8rDh

πŸŽ„ Last part following Monday! πŸŽ„

15.12.2025 13:54 πŸ‘ 0 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

🌐 Infrastructure patterns: Redirectors hosted on compromised websites, domains registered via Namecheap/Regway, and access routed through Big Mama Proxy.

04.12.2025 08:26 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

πŸ•ΈοΈ AiTM phishing kit: A homemade ProtonMail kit enabled credential theft and 2FA relay through injected JavaScript and attacker-controlled APIs.

04.12.2025 08:26 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

πŸ“„ Fake PDFs & redirectors: Decoy PDFs (sometimes disguised ZIP files) redirected victims through compromised websites to Calisto’s phishing kit.

04.12.2025 08:26 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Key takeaways:
🎯 Trusted-contact impersonation: Calisto used ProtonMail accounts to send missing or faulty attachments, prompting victims to request a resend containing the malicious link.

04.12.2025 08:26 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

πŸ‡·πŸ‡Ί French NGO Reporters Without Borders targeted by #Calisto in recent campaign

Sekoia #TDR analysed a recent #Calisto (aka #ColdRiver #Star Blizzard) spear-phishing campaign aimed at Reporters sans frontières and other #Ukraine-supporting organisations.

blog.sekoia.io/ngo-reporter...

04.12.2025 08:26 πŸ‘ 5 πŸ” 4 πŸ’¬ 1 πŸ“Œ 0
Post image Post image Post image Post image

Histoire et dissection du π‘šπ‘Žπ‘™π‘€π‘Žπ‘Ÿπ‘’ ou chargeur malveillant πŸ‡·πŸ‡Ί #Latrodectus par Pierre Le Bourhis @sekoia.io Γ  #UYBHYS25
@uybhys.bsky.social

08.11.2025 15:35 πŸ‘ 4 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Post image

Our blog post provides an overview of the services facilitating this modus operandi and the market for infostealer logs tied to booking platforms, including underground activities around Booking[.]com data on Russian-speaking cybercrime forums.

06.11.2025 10:27 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

In this report, we analysed a widespread, persistent campaign distributing the PureRAT malware via the #ClickFix social engineering tactic and emails impersonating Booking[.]com.

We also detailed the fraud scheme targeting hotel customers.

06.11.2025 10:27 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Attackers target hotel establishments to harvest credentials that grant access to booking platforms.

Those credentials are used to launch personalised fraud campaigns against hotel guests, impersonating billing services and tricking them into paying twice for their reservation.

06.11.2025 10:27 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

#TDR analysts dig into a modus operandi targeting the hospitality industry and the related cybercrime ecosystem that facilitates #phishing and #fraud campaigns.

blog.sekoia.io/phishing-cam...

06.11.2025 10:27 πŸ‘ 5 πŸ” 3 πŸ’¬ 1 πŸ“Œ 0
Post image

Discover how #TransparentTribe (#APT36) uses a disguised DESKTOP dropper to deploy #DeskRAT, a Golang RAT, on BOSS Linux endpoints in India.

Our Sekoia #TDR report breaks down the full infection chain and stealthy WebSocket C2 communications .

Read more πŸ‘‰ blog.sekoia.io/transparentt...

23.10.2025 07:49 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

By correlating #Office365 events with Entra ID sign-in logs, we’ve mapped each bit in the UserAuthenticationMethod field to its corresponding authentication factorβ€”Password Hash Sync, Windows Hello for Business, Passkeys, SMS sign-in, and more.

21.10.2025 09:14 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Our latest technical deep-dive unravels the mystery behind the opaque numeric codes (16, 272, 33554432, etc.) you see in #Microsoft365 audit logs.

blog.sekoia.io/userauthenti...

21.10.2025 09:14 πŸ‘ 1 πŸ” 0 πŸ’¬ 2 πŸ“Œ 0

πŸ»β„οΈ These exploitations led to the deployment of an undocumented TLS backdoor we dubbed the β€œPolarEdge Backdoor.”
πŸ”¬ This follow-up provides a detailed analysis of the backdoor, including the anti-analysis techniques it employs.

14.10.2025 13:35 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0