Ole Villadsen
@olevilladsen.bsky.social
š¤ 222
š„ 200
š 7
Threat researcher @ Proofpoint. Formerly IBM X-Force, CMU, US Government, US Navy. Views are my own.
Threat actors are teaming up with organized crime to target truckers ā stealing identities, placing fraudulent bids on freight, and making off with the cargo. Their entry point? Emails with links delivering Remote Monitoring and Management (RMM) tools. Together with
@selenalarson.bsky.social
:
loading . . .
Remote access, real cargo: cybercriminals targeting trucking and logistics | Proofpoint US
Key findingsĀ Cybercriminals are compromising trucking and freight companies in elaborate attack chains to steal cargo freight.Ā Cargo theft is a multi-million-dollar criminal
https://www.proofpoint.com/us/blog/threat-insight/remote-access-real-cargo-cybercriminals-targeting-trucking-and-logistics
6 days ago
1
29
23
reposted by
Ole Villadsen
ThreatInsight
4 months ago
šØ Job seekers, watch out! šØ Proofpoint found threat actors targeting job seekers to distribute remote management tools that can lead to data or financial theft, or potentially to install follow-on malware like ransomware.
1
3
3
reposted by
Ole Villadsen
ThreatInsight
6 months ago
Today, Proofpoint joins the cybersecurity community and the U.S. and international law enforcement in celebrating the disruption of
#DanaBot
, a malware-as-a-service used by sophisticated cybercriminals since 2018.
brnw.ch/21wSRiZ
loading . . .
A Brief History of DanaBot, Longtime Ecrime Juggernaut Disrupted by Operation Endgame | Proofpoint US
Key Findings: Proofpoint first identified and named DanaBot in May 2018. Initially developed as a banking trojan, DanaBot was also used as an information stealer and loader for follow-on
https://brnw.ch/21wSRiZ
1
5
2
reposted by
Ole Villadsen
Kostas
8 months ago
Thanks for the shoutout and for recognizing our work at DFIR Report in tracking these threats! šRead the article here:
www.proofpoint.com/us/blog/thre...
loading . . .
Remote Monitoring and Management (RMM) Tooling Increasingly an Attackerās First Choice | Proofpoint US
Key findingsĀ Ā Ā More threat actors are using legitimate remote monitoring and management (RMM) tools as a first-stage payload in email campaigns.Ā RMMs can be used for
https://www.proofpoint.com/us/blog/threat-insight/remote-monitoring-and-management-rmm-tooling-increasingly-attackers-first-choice
0
9
1
reposted by
Ole Villadsen
ThreatInsight
8 months ago
New cyber threat research from Proofpoint highlights how attackers are adapting to law enforcement disruptions, leveraging trusted software to evade detection and compromise systems. This blog details our team's findings:
www.proofpoint.com/us/blog/thre...
.
#malware
#ransomware
#dataloss
loading . . .
Remote Monitoring and Management (RMM) Tooling Increasingly an Attackerās First Choice | Proofpoint US
Key findingsĀ Ā Ā More threat actors are using legitimate remote monitoring and management (RMM) tools as a first-stage payload in email campaigns.Ā RMMs can be used for
https://brnw.ch/21wRfRu
0
5
1
reposted by
Ole Villadsen
Nick Attfield
11 months ago
Dropping some new research on TA397/Bitter šØ Hidden in Plain Sight | TA397ās New Attack Chain Delivers Espionage RATs Report:
www.proofpoint.com/us/blog/thre...
loading . . .
Hidden in Plain Sight: TA397ās New Attack Chain Delivers Espionage RATs | Proofpoint US
Key findingsĀ Proofpoint observed advanced persistent threat (APT) TA397 targeting a Turkish defense sector organization with a lure about public infrastructure projects in Madagascar.Ā Ā The attack...
https://www.proofpoint.com/us/blog/threat-insight/hidden-plain-sight-ta397s-new-attack-chain-delivers-espionage-rats
2
16
14
reposted by
Ole Villadsen
ThreatInsight
11 months ago
In December 11 and 12, 2024, a spearphishing campaign targeted at least 20 Autonomous System (AS) owners, predominantly Internet Service Providers (ISPs), and purported to come from the Network Operations Center (NOC) of a prominent European ISP. š§µā¤µļø
add a skeleton here at some point
1
17
16
reposted by
Ole Villadsen
Brad
11 months ago
2024-12-04 (Wednesday):
#AgentTesla
variant using
#FTP
for data exfiltration. A sanitized copy of the email distributing the malware, a
#pcap
from an infection run, the associated malware samples, and a list of indicators are available at
www.malware-traffic-analysis.net/2024/12/04/i...
1
6
4
reposted by
Ole Villadsen
11 months ago
#BumbleBee
malspam using Cisco AnyConnect as a lure. It contains a PDF with a link to a fake AnyConnect installer that opens AnyConnect on the Microsoft App Store to mask the BumbleBee infection š„ Payload delivery URLs: š
urlhaus.abuse.ch/host/95.164....
Payload: š
bazaar.abuse.ch/sample/b8794...
0
5
2
reposted by
Ole Villadsen
Cryptolaemus
11 months ago
#BruteRatel
-
#Latrodectus
- url > .js > .msi > .dll wscript.exe Document-v15-51-07.js msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\fes.msi rundll32.exe C:\Users\Admin\AppData\Roaming\avutil.dll, DLLMain (1/3)š IOC's
github.com/pr0xylife/La...
1
20
9
reposted by
Ole Villadsen
blackorbird
12 months ago
I really like the freedom of BlueSky's API and hope it can be maintained. I will use the API to push more IOCs.
0
1
1
reposted by
Ole Villadsen
Greg Lesnewich
12 months ago
T-Minus 37 days til the next season of
#100DaysofYARA
kicks off!! Whoās excited and what will you be working on? I canāt believe it but Iām excited to write rules for JavaScript š¬šµāš« But also get to show off the new macho module from the one and only
@jacoblatonis.me
0
6
3
reposted by
Ole Villadsen
Brad
12 months ago
2024-11-22 (Friday)
#XLoader
/
#Formbook
: I've been fired by my non-existent HR department. At least I got a "salary-receipt.exe"
bazaar.abuse.ch/sample/003b5...
Tria.ge
and Any.Run don't identify the malware, but Joe Sandbox does:
www.joesandbox.com/analysis/156...
Also runs in my lab just fine
2
17
10
Welcome Brad!
@malware-traffic.bsky.social
12 months ago
1
2
0
reposted by
Ole Villadsen
Joe Roosen
12 months ago
Very interesting story which in my opinion that shows how the Chinese surveillance state is even "knocking off" on itself when it comes to IP/Data. This is some great research from SpyCloud Labs! Very proud of the Labs Research Team!
www.wired.com/story/chines...
loading . . .
Chinaās Surveillance State Is Selling Citizen Data as a Side Hustle
Chinese black market operators are openly recruiting government agency insiders, paying them for access to surveillance data and then reselling it onlineāno questions asked.
https://www.wired.com/story/chineses-surveillance-state-is-selling-citizens-data-as-a-side-hustle/
0
8
2
For visibility - x0rz now on Blue Sky, so happy :)
add a skeleton here at some point
12 months ago
1
0
0
reposted by
Ole Villadsen
Tommy Madjar
12 months ago
New blog drop with
@selenalarson.bsky.social
and the rest of the team. This one covers a lot of threats using the
#ClickFix
technique to lure targets to infect themselves by pasting malicious CMD/PS code. My "fave" is the chumbox
#malvertising
on major tech sites.
www.proofpoint.com/us/blog/thre...
0
11
6
reposted by
Ole Villadsen
NOELREPORTS
12 months ago
Reuters also confirms the story about Biden allowing Ukraine to use US arms to strike inside Russia, citing three sources familiar with the matter. Ukraine plans to conduct its first long-range attacks in the coming days.
www.reuters.com/world/biden-...
29
811
109
reposted by
Ole Villadsen
Nathan McNulty
12 months ago
Almost embarrassed to post this, but I've always used Fiddler or Burp for capturing things like this... I didn't have admin rights and was trying to capture network traffic from a pop-up, so Dev Tools wasn't working Apparently this is built into Chrome/Edge! So cool :) edge://net-export/
15
187
48
Two great easy-to-use tools to find new follows - both worked great.
add a skeleton here at some point
12 months ago
0
2
0
reposted by
Ole Villadsen
Myrtus
12 months ago
Smokeloader keeps crawling its way back into the limelight. If you want a primer on it, I gave a public talk on it 2 years ago
www.youtube.com/watch?v=O69e...
loading . . .
Smokeloader: The Pandoraās box of tricks, payloads and anti-analysis - BSides Portland 2022
YouTube video by BSides Portland
https://www.youtube.com/watch?v=O69eMQ7NS8w
1
24
9
reposted by
Ole Villadsen
Christopher Glyer
over 2 years ago
IMO: Storm-0875 (overlaps UNC3944/Scattered Spider) is the most dangerous financial threat actor right now Some recent developments: 1. Now deploying ransomware (had been extorting orgs before) 2. In last few months targeting large/well known enterprises (not just telcos/help desk/crypto orgs)
1
8
7
you reached the end!!
feeds!
log in