Sources & Methods's Avatar

Sources & Methods

@sourcesmethods.com

Blog and monthly digest of Cyber Threat Intelligence (CTI) information sources, tools, articles, events, and helpful tips sourcesmethods.com by @mattreduce.com

65
Followers
61
Following
20
Posts
17.11.2024
Joined
Posts Following

Latest posts by Sources & Methods @sourcesmethods.com

Video thumbnail

Our monthly open source challenges just got an upgrade... With hidden codes - a corrupted archive and a mysterious figure pulling the strings. Get started at challenge.bellingcat.com

08.12.2025 12:58 ๐Ÿ‘ 75 ๐Ÿ” 13 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 2
Post image

We recently released the Synapse @Feedly Power-Up! Ingest Feedly TI API feeds into Synapse, model articles as media:news, link indicators, and automate daily/hourly pulls to speed up reporting + enrichment. Learn more: synapse.docs.vertex.link/projects/rap...

08.12.2025 16:33 ๐Ÿ‘ 5 ๐Ÿ” 3 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
A sign above a bar reads "Counter Intelligence"

A sign above a bar reads "Counter Intelligence"

What are they up to at Matt's in the Market in Seattle? ๐Ÿ‘€

05.12.2025 21:31 ๐Ÿ‘ 3 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

You can now scan for #react2shell in Burp Suite! To enable, install the Extensibility Helper bapp, go to the bambda tab and search for react2shell. Shout-out to Assetnote for sharing a quality detection technique!

04.12.2025 15:05 ๐Ÿ‘ 15 ๐Ÿ” 3 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182) | Amazon Web Services Within hours of the public disclosure of CVE-2025-55182 (React2Shell) on December 3, 2025, Amazon threat intelligence teams observed active exploitation attempts by multiple China state-nexus threat g...

China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182) #React2Shell aws.amazon.com/blogs/securi...

05.12.2025 20:33 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
GitHub - singe/domain-probe: A utility to find identically configured domains and web-servers based on a pattern. Used to find phishing kits. A utility to find identically configured domains and web-servers based on a pattern. Used to find phishing kits. - singe/domain-probe

Made this last night, itโ€™s useful for finding a large number of domains hosting phishing kits or malware based on a consistent pattern github.com/singe/domain-pโ€ฆ Might be useful for some of you.

20.11.2025 06:22 ๐Ÿ‘ 6 ๐Ÿ” 4 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
A man involved in the DPRK's fraudulent IT worker scheme appears in a recorded Zoom call. The recording is projected on a large screen, on stage at the CYBERWARCON conference.

A man involved in the DPRK's fraudulent IT worker scheme appears in a recorded Zoom call. The recording is projected on a large screen, on stage at the CYBERWARCON conference.

20.11.2025 06:36 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

If the talks at @cyberwarcon.bsky.social today are any indication, while you may think threat actor adoption of generative AI improves sophistication and eliminates telling mistakes in phishing and info ops, that future is not evenly distributed!

19.11.2025 22:17 ๐Ÿ‘ 5 ๐Ÿ” 3 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Ah @cyberwarcon.bsky.social the only conference for intel ops research authored by the terminally online

19.11.2025 14:46 ๐Ÿ‘ 73 ๐Ÿ” 13 ๐Ÿ’ฌ 3 ๐Ÿ“Œ 6
Preview
Meet ShinySp1d3r: New Ransomware-as-a-Service created by ShinyHunters An in-development build of the upcoming ShinySp1d3r ransomware-as-a-service platform has surfaced, offering a preview of the upcoming extortion operation.

Itโ€™s rare that we see an actual NEW ransomware family, so it will be interesting to see how this develops.

via @lawrenceabrams.bsky.social & @bleepingcomputer.com

19.11.2025 17:20 ๐Ÿ‘ 8 ๐Ÿ” 3 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Introducing Query-Based Blocklists: Fully Configurable, Real-Time Threat Blocking in the GreyNoise Platform GreyNoise customers can turn any GreyNoise query in the platform directly into a real-time blocklist for their firewall, SOAR, or other enforcement points.

Attackers move fast, so your blocklists should too. GreyNoise now lets you convert any query into a real-time blocklist that updates automatically as attacker infrastructure changes. Start using it today on the GreyNoise platform.

19.11.2025 17:31 ๐Ÿ‘ 3 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image Post image

Great talk by @pylos.co on possible futures for Volt Typhoon and why the cluster's strategic goal means the activity will evolve and at times be disrupted but not stop any time soon

19.11.2025 16:54 ๐Ÿ‘ 3 ๐Ÿ” 3 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Now I can say I've seen a DPRK IT Worker (recorded) on a video call, thanks to Caleb Marquis and Eric Kerr! Next up is @pylos.co on Volt Typhoon.

19.11.2025 16:16 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Kicked off @cyberwarcon.bsky.social with @dmitri.silverado.org apologizing for 15yrs of threat actor naming chaos and proposing a new scheme, and plenty of Russia-related content (with top-tier memes)

19.11.2025 15:39 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Good morning, @cyberwarcon.bsky.social! โ˜•๏ธ

19.11.2025 13:33 ๐Ÿ‘ 4 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image Post image Post image

We've hired Colonel Shawn Smagh to up our @greynoise.io intel reporting game and we've started producing weekly intelligence briefs. This week's is a banger.

18.11.2025 19:38 ๐Ÿ‘ 8 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Game on! The @cyberwarcon.bsky.social Synapse challenge is live! ๐Ÿ’š๐Ÿ’š๐Ÿ’š

18.11.2025 22:13 ๐Ÿ‘ 10 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

Coming up at 12:40 EST for #IanGillespie presenting "From Memecoins to Missiles: How North Korea Launders Stolen Crypto into Real World Riches"

#BSidesPyongyang25 #BSPY25

https://www.twitch.tv/bsidespyongyang
https://www.youtube.com/@BSidesPyongyang

18.11.2025 17:30 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
BSidesPyongyang - Twitch BSides Pyongyang 2025

Watching @bsidespyongyang.bsky.social on the way to @cyberwarcon.bsky.social twitch.tv/BSidesPyongy...

18.11.2025 17:15 ๐Ÿ‘ 0 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image Post image Post image Post image

Have questions about submitting to the #SOCON2026 CFP? Weโ€™ve got answers.

The CFP closes soon โ€” submit your proposal by Nov 15 to participate in the only conference dedicated to advancing Attack Path Management.

๐Ÿ“ Submit: ghst.ly/socon26-cfp

12.11.2025 20:36 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Video thumbnail

Obsidian Importer now lets you generate Markdown files from a CSV.

It converts thousands records in seconds and automatically generates a Base that you can use to explore and edit the data.

12.11.2025 20:24 ๐Ÿ‘ 160 ๐Ÿ” 20 ๐Ÿ’ฌ 9 ๐Ÿ“Œ 8
Preview
Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480 | Google Cloud Blog An unauthenticated access vulnerability in Gladinet's Triofox platform, exploited by the threat actor UNC6485.

cloud.google.com/blog/topics/...

google cloud / mandiant blogged about a cool investigation that I got to pitch in on & had a small verse to contribute in the broader context of it. these are the things that remind me how much I enjoy what I do.

10.11.2025 17:25 ๐Ÿ‘ 4 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
MITRE ATT&CKcon - ATT&CKcon 6.0 | MITRE ATT&CKยฎ

It was recorded, and slides are now being shared....

Slides and videos from ATT&CKcon 6.0 are now posted in an easy to find way. Check out attack.mitre.org/resources/at... to check out our great talks (and Couch Talks) from October, or even check out past ATT&CKcons from that same page.

07.11.2025 18:13 ๐Ÿ‘ 7 ๐Ÿ” 6 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

There's an open role for a Staff CTI Analyst on my team here
@huntress.com
๐Ÿ“ข๐Ÿ’ซ

โœจDo you love doing correlations between different incidents, sometimes digging into them, or doing malware analysis?

โœจDo you like doing data analysis, and using this to make threat reports? ๐Ÿ‘‡

07.11.2025 18:37 ๐Ÿ‘ 7 ๐Ÿ” 5 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
The Global Threat of DPRK IT Workers - 38 North: Informed Analysis of North Korea The Democratic Peopleโ€™s Republic of Koreaโ€™s (North Korea or DPRK) is most often associated with ...

"The DPRK IT worker threat is more than a fraud or sanctions evasion issue; it exposes systemic weaknesses in how identity is verified and managed across the global economy." Chandana Seshadri looks at DPRK IT worker typologies & identifies a path forward.

09.10.2025 17:25 ๐Ÿ‘ 4 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Home | Bellingcat's Online Investigation Toolkit A toolkit for open source researchers

Our new and improved Bellingcat Toolkit is one-year-old today! If you haven't used it yet its a one-stop shop for discovering useful open source tools, maintained by an amazing group of volunteers. You can find use cases, guidance and honest reviews for each tool. bellingcat.gitbook.io/toolkit

24.09.2025 12:13 ๐Ÿ‘ 151 ๐Ÿ” 70 ๐Ÿ’ฌ 5 ๐Ÿ“Œ 4
Preview
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors | Google Cloud Blog BRICKSTORM is a stealthy backdoor used by suspected China-nexus actors for long-term espionage.

We are releasing details on BRICKSTORM malware activity, a China-based threat hitting US tech to potentially target downstream customers and hunt for data on vulnerabilities in products. This actor is stealthy, and we've provided a tool to hunt for them. cloud.google.com/blog/topics/...

24.09.2025 14:31 ๐Ÿ‘ 21 ๐Ÿ” 13 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 5
Preview
RedNovember Targets Government, Defense, and Technology Organizations RedNovember, a likely Chinese state-sponsored cyber-espionage group, has targeted global government, defense, and tech sectors using advanced tools like Pantegana and Cobalt Strike. Discover the lates...

First public report at Recorded Future by yours truly is out! RedNovember (formerly TAG-100, a.k.a. Storm-2077) is a Chinese state-sponsored threat group focused on intelligence collection, especially on flashpoint issues of strategic interest to China. www.recordedfuture.com/research/red...

24.09.2025 18:57 ๐Ÿ‘ 22 ๐Ÿ” 14 ๐Ÿ’ฌ 2 ๐Ÿ“Œ 0
Post image

CFP closes this Friday, September 26th at 11:59pm EST!

If you'd like to speak at CYBERWARCON this year, get your talk submission in ASAP to be considered!

Submit your talk here >> www.cyberwarcon.com/cfp2025

#CYBERWARCON #CFP

23.09.2025 18:15 ๐Ÿ‘ 14 ๐Ÿ” 9 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 1

It is a good time to learn how to find accurate information online. Weโ€™re offering virtual training sessions over the month of October, teaching you Bellingcatโ€™s investigative techniquesโ€ฆ

21.09.2025 15:48 ๐Ÿ‘ 342 ๐Ÿ” 122 ๐Ÿ’ฌ 4 ๐Ÿ“Œ 5