Rony
@r0ny.bsky.social
📤 111
📥 106
📝 38
Threat Intelligence Analyst
reposted by
Rony
Max 'Libra' Kersten
5 months ago
Ghidra, scripting, LLM, automagic automation. That should grab the attention for this thread. If you want to read the complete blog, you can do so here:
www.trellix.com/blogs/resear...
1/n
1
9
5
reposted by
Rony
6 months ago
Many many folks in this effort over the years. Thankful for everyone and hope its of use.
1
17
8
reposted by
Rony
Natto Thoughts
6 months ago
The Natto Team continues finding stories of Chinese hackers fascinating as they reveal the motivations behind cyber operations and the evolution of China's information security industry.
nattothoughts.substack.com/p/stories-of...
loading . . .
From the World of “Hacker X Files” to the Whitewashed Business Sphere
Jiang Jintao’s journey from hacker to infosec entrepreneur illustrates the blend of ambition, skill, and changes in China's cybersecurity industry
https://nattothoughts.substack.com/p/stories-of-a-chinese-hacker-from
0
5
7
reposted by
Rony
Cipher Tech Solutions
6 months ago
The May release for ACCE includes updates and support including
#AurotunStealer
#rutserv
#PupkinStealer
#PE32Ransomware
#Interlock
www.ciphertechsolutions.com/acce-release...
loading . . .
ACCE Release Notes v2.9.20250508 – Cipher Tech Solutions, Inc.
https://www.ciphertechsolutions.com/acce-release-notes-v2-9-20250508/
0
1
1
France just called out GRU Unit 20728 (166th Research Information Centre), posted up in Rostov-on-Don, for cyberattacks. Kremlin got new ops on the board.
www.diplomatie.gouv.fr/en/country-f...
@wylienewmark.bsky.social
loading . . .
Russia – Attribution of cyber attacks on France to the Russian military intelligence service (APT28) (29.04.25)
France condemns in the strongest terms the use by Russia's military intelligence service (GRU) of the APT28 attack group, at the origin of several (…)
https://www.diplomatie.gouv.fr/en/country-files/russia/news/2025/article/russia-attribution-of-cyber-attacks-on-france-to-the-russian-military
7 months ago
0
7
3
reposted by
Rony
Andrew Morris
7 months ago
Yall are beyond not ready about the shit we're cooking up with
@censys.bsky.social
and
@greynoise.io
powers combined
censys.com/blog/hunting...
loading . . .
Hunting Botnets With CursorAI, GreyNoise, Censys, and Censeye
Threat hunting is made easier and simpler by combining the power of Censys, GreyNoise, CursorAI, and Censeye.
https://censys.com/blog/hunting-botnets-with-cursorai-greynoise-censys-and-censeye
0
25
8
I'm always a big fan of
@agreenberg.bsky.social
's writing, but I don't see a clear reason to believe these six stories are connected to "lesser-known hacker groups."
add a skeleton here at some point
7 months ago
0
0
0
S02E01: Smoked Customers
operation-endgame.com
loading . . .
8 months ago
0
0
0
It's here! S02E01: Smoked customers
add a skeleton here at some point
8 months ago
0
0
0
Tick Tock ⏰
add a skeleton here at some point
8 months ago
0
1
1
reposted by
Rony
Binary Ninja
8 months ago
Kyle's talk at Insomni'Hack is live!
youtu.be/I0PoE0IdtmE?...
Check it out if you're interested in a slice of modern program analysis and try the latest version of Tanto as well, in the plugin manager or at
github.com/Vector35/tanto
loading . . .
"A Slice Of" Modern Program Analysis - Kyle Martin
https://youtu.be/I0PoE0IdtmE?si=Olk6IeDZRzC-QUiJ
0
11
6
Cool stuff. Kudos to whoever at Censys wrote this. I researched the ORB network myself but lack access to historical data. Thanks for providing historical visibility.
censys.com/junos-and-re...
add a skeleton here at some point
8 months ago
0
5
5
Bring Back RiskIQ!
8 months ago
0
2
0
🚨 ALEART 🚨
#UAT-5918
is the new
#Winnti
! 😂
8 months ago
0
1
0
The R&D team at JuniperNetworks released a detailed 35-page malware analysis report "The RedPenguin Malware Incident", covering the
#TINYSHELL
components used by
#UNC3886
, including the C2 protocol structure.
supportportal.juniper.net/sfc/servlet.shepherd/document/download/069Dp00000FzdmIIAR
loading . . .
https://supportportal.juniper.net/sfc/servlet.shepherd/document/download/069Dp00000FzdmIIAR
8 months ago
0
3
2
APT27 & i-soon hackers charged by DOJ—12 caught as the cats are out of the bag now. Yet APT27’s infra still purrs. Let’s see how they claw back from this!
www.justice.gov/opa/pr/justi...
loading . . .
Justice Department Charges 12 Chinese Contract Hackers and Law Enforcement Officers in Global Computer Intrusion Campaigns
The Justice Department, FBI, Naval Criminal Investigative Service, and Departments of State and the Treasury announced today their coordinated efforts to disrupt and deter the malicious cyber activiti...
https://www.justice.gov/opa/pr/justice-department-charges-12-chinese-contract-hackers-and-law-enforcement-officers-global
9 months ago
0
3
1
Epic collab, UNC4899 🤝 UNC5267 FBI official advisory on Bybit crypto theft
www.ic3.gov/PSA/2025/PSA...
loading . . .
Internet Crime Complaint Center (IC3) | North Korea Responsible for $1.5 Billion Bybit Hack
https://www.ic3.gov/PSA/2025/PSA250226
9 months ago
0
2
0
reposted by
Rony
Rikmer
9 months ago
@shodanhq.bsky.social
Awesome! Shodan History is back in the UI. Nice!!! Thank you. But I have a question regarding
trends.shodan.io
. all trends I do are stopping at October 2024. Why? Please make them to the current data again. I love it and need it. :)
loading . . .
Shodan
Shodan Trends - Discover how the Internet has changed over time.
https://trends.shodan.io
0
3
4
reposted by
Rony
Dan Black
9 months ago
Today, Google Threat Intelligence is alerting the community to increasing efforts from several Russia state-aligned threat actors (GRU, FSB, etc.) to compromise Signal Messenger accounts.
cloud.google.com/blog/topics/...
loading . . .
Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger | Google Cloud Blog
Russia state-aligned threat actors target Signal Messenger accounts used by individuals of interest to Russia's intelligence services.
https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger
3
168
134
reposted by
Rony
geech
9 months ago
This latest blog from Cyfirma on Cl0p/Cleo exploitation is utter garbage, ignore it. LLM YARA rule (not even valid syntax), massively inflated statistics, and misleading IOCs and analysis.
www.cyfirma.com/research/cl0...
loading . . .
CL0P Ransomware : Latest Attacks - CYFIRMA
INTRODUCTION The Cl0p group has been active since early 2019, leveraging vulnerabilities and exploits to encrypt files for ransom. The...
https://www.cyfirma.com/research/cl0p-ransomware-latest-attacks/
1
5
2
Excited to receive the
@abuse-ch.bsky.social
&
@spamhaus.bsky.social
swag! 🎁 Thank you for sending this amazing package. It means a lot to be recognized as a Top Contributor in the fight against cybercrime. Looking forward to continuing our battle together! 💪
#StrengthINUnity
9 months ago
2
7
1
reposted by
Rony
IntelCorgi
10 months ago
I miss the free version of riskIQ
0
5
2
reposted by
Rony
10 months ago
A BIG thank you to our top contributors🎖️for sharing valuable technical cyber threat intelligence on our platforms over the past year. 🙏 Your efforts had a significant impact on cyber security, making the internet a safer place👏💪🛡️ A nice surprise is coming your way! 🎁 👀👇
0
5
1
#CMS8000
backdoor Hardcoded IP: 202.114.4[.]119 (h/t
@craiu.bsky.social
) registered to Tsinghua University 👀 VT link:
www.virustotal.com/gui/file/4e4...
📝
www.cisa.gov/sites/defaul...
loading . . .
https://www.cisa.gov/sites/default/files/2025-01/fact-sheet-contec-cms8000-contains-a-backdoor-508c.pdf
10 months ago
0
2
0
The blog feels like a retro FLARE blog from the good old FireEye days! Shout out to Nino Isakovic,
@qutluch.bsky.social
and
@lukejenx.bsky.social
cloud.google.com/blog/topics/...
loading . . .
ScatterBrain: Unmasking the Shadow of PoisonPlug's Obfuscator | Google Cloud Blog
We been tracking multiple espionage operations conducted by China-nexus actors utilizing POISONPLUG.SHADOW malware.
https://cloud.google.com/blog/topics/threat-intelligence/scatterbrain-unmasking-poisonplug-obfuscator
10 months ago
1
12
4
reposted by
Rony
⚖️EU sanctions three Russian GRU Unit 29155 officers for cyberattacks against Estonia in 2020.
www.consilium.europa.eu/en/press/pre...
Individuals Sanctioned: 1️⃣Nikolay Alexandrovich KORCHAGIN 2️⃣Vitaly SHEVCHENKO 🆕 3️⃣Yuriy Fedorovich DENISOV 📎
eur-lex.europa.eu/legal-conten...
loading . . .
Cyber-attacks: three individuals added to EU sanctions list for malicious cyber activities against Estonia
The Council imposed restrictive measures on three individuals involved in cyber-attacks against Estonia.
https://www.consilium.europa.eu/en/press/press-releases/2025/01/27/cyber-attacks-three-individuals-added-to-eu-sanctions-list-for-malicious-cyber-activities-against-estonia/
10 months ago
0
0
1
⚖️EU sanctions three Russian GRU Unit 29155 officers for cyberattacks against Estonia in 2020.
www.consilium.europa.eu/en/press/pre...
Individuals Sanctioned: 1️⃣Nikolay Alexandrovich KORCHAGIN 2️⃣Vitaly SHEVCHENKO 🆕 3️⃣Yuriy Fedorovich DENISOV 📎
eur-lex.europa.eu/legal-conten...
loading . . .
Cyber-attacks: three individuals added to EU sanctions list for malicious cyber activities against Estonia
The Council imposed restrictive measures on three individuals involved in cyber-attacks against Estonia.
https://www.consilium.europa.eu/en/press/press-releases/2025/01/27/cyber-attacks-three-individuals-added-to-eu-sanctions-list-for-malicious-cyber-activities-against-estonia/
10 months ago
0
0
1
reposted by
Rony
Wesley Shields
11 months ago
Spent a bit of time adding some new features to “yr fmt” that I suspect will be well liked and very useful if you write a lot of rules and like consistency. I have the gist of it but am stumbling over some rust intricacies for the first time. Maybe by the end of the year I’ll have it done.
0
3
2
Just read this
@sekoia.io
's blog, and wow, it's a cool deep dive into how they use YARA internally! They go deep into metadata which you don't hear much about. Good stuff if you're into the nitty-gritty of YARA.
blog.sekoia.io/happy-yara-c...
#yara
#threatintelligence
add a skeleton here at some point
11 months ago
0
8
0
A new
#yara-x
release is out with some small improvements and bugfix.
github.com/VirusTotal/y...
loading . . .
Release v0.12.0 · VirusTotal/yara-x
The macho module now parses and exposesLC_LINKER_OPTION commands (#256). Raise warning with some patterns that have too many 2-byte atoms and are potentially slow (#264). Extract more information ...
https://github.com/VirusTotal/yara-x/releases/tag/v0.12.0
11 months ago
1
7
5
Russia’s cyber warfare evolved with
#SecretBlizzard
(APT) repurposing tools from other groups (Storm-1837 & Storm-1919) for targeted operations. The analysis details ongoing attacks on Ukraine, showcasing the group’s resource-sharing strategy and growing sophistication.
tinyurl.com/4kzn3zcv
add a skeleton here at some point
11 months ago
0
1
0
Two more suspected
#Zloader
HTTPS C2 server theartofshare./com (193.188.22.125:443) ~ 2024-11-12 checkpointone./world (147.45.79.30:443) ~ 2024-06-14
www.zscaler.com/blogs/securi...
loading . . .
Inside Zloader’s Latest Trick: DNS Tunneling
Discover how Zloader 2.9.4.0 implemented a custom DNS tunneling protocol combined with TLS encryption to evade network detection.
https://www.zscaler.com/blogs/security-research/inside-zloader-s-latest-trick-dns-tunneling
12 months ago
0
3
0
Secret Blizzard: the hand-me-down hacker collective! After using tools from Hazel Sandstorm & Storm-0473, they’re now remixing Storm-0156’s infrastructure for fresh espionage hits. Also, they've leveraged resources from at least 6 other threat actors in the past! 👀
www.microsoft.com/en-us/securi...
loading . . .
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog
Microsoft has observed Secret Blizzard compromising the infrastructure and backdoors of the Pakistan-based threat actor we track as Storm-0156 for espionage against the Afghanistan government and Indi...
https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/
12 months ago
2
0
1
See you 🔜 Boris! ⚖️
add a skeleton here at some point
12 months ago
0
0
0
reposted by
Rony
Horkos
12 months ago
Close access technical operations are never going away; there’ll always be at least edge cases requiring physical proximity to target. But given the risks involved, pursuing remote means to achieve “close”-style tactics is likely a trend that has been ongoing but only just now coming into the light.
add a skeleton here at some point
1
28
4
🚨 Microsoft’s Digital Crimes Unit takes aim at Storm-0867, the operator behind the
#Caffeine
Phishing-as-a-Service (PhaaS) platform ☕. A major crackdown on the cybercrime supply chain!
blogs.microsoft.com/on-the-issue...
📜Unsealed court order:
www.noticeofpleadings.com/fakeonnx/
loading . . .
Targeting the cybercrime supply chain
Microsoft’s Digital Crimes Unit (DCU) has seized 256 fraudulent websites linked to ‘MRxC0DER’, who sold phishing kits under the brand names ‘ONNX’ and ‘Caffeine’. This takedown disrupts a significant ...
https://blogs.microsoft.com/on-the-issues/2024/11/21/targeting-the-cybercrime-supply-chain/
about 1 year ago
0
4
2
reposted by
Rony
Kyle Eaton
about 1 year ago
Yara rule to match concatenated zip files. I like this one (biased) because of how we are able to avoid matching nested zip files. More info:
x.com/threatinsigh...
#yara
github.com/EmergingThre...
loading . . .
threatresearch/yara/zip_file.yara at master · EmergingThreats/threatresearch
I wanted to call this repo "Nuclear Football Codes". I was outvoted.. - EmergingThreats/threatresearch
https://github.com/EmergingThreats/threatresearch/blob/master/yara/zip_file.yara
2
15
8
reposted by
Rony
Horkos
about 1 year ago
ESET’s latest, a roundup on 2 years of Gamaredon/PRIMITIVE BEAR ops targeting Ukraine, is a banner example of how cyber operations are primarily used—and better suited—for intelligence collection. While the GRU is playing cyber soldier to avoid the front, FSB Center 18 is on that espionage grind.
loading . . .
Cyberespionage the Gamaredon way: Analysis of toolset used to spy on Ukraine in 2022 and 2023
ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities focused in Ukraine.
https://www.welivesecurity.com/en/eset-research/cyberespionage-gamaredon-way-analysis-toolset-used-spy-ukraine-2022-2023/
0
11
5
reposted by
Rony
Daniel Gordon
about 1 year ago
For a great discussion about a couple North Korean threat actors, check out this podcast
thecyberwire.com/podcasts/mic...
loading . . .
Citrine and Onyx Sleet: An Inside Look at North Korean Threat Actors
In this episode of the Microsoft Threat Intelligence Podcast host Sherrod DeGrippo discusses North Korean threat actors with one of our Microsoft Threat Intelligence researchers and Greg Schloemer focusing on two prominent groups: Onyx Sleet and Storm 0530. Onyx Sleet is a long-standing espionage group known for targeting defense and energy sectors, particularly in the U.S. and India. However, they’ve diversified into ransomware, using tactics like malware downloaders, zero-day vulnerabilities, and a remote access Trojan called D-Track. The conversation also touches on the use of fake certificates and the group's involvement in the software supply chain space.
https://thecyberwire.com/podcasts/microsoft-threat-intelligence/27/notes
1
2
2
you reached the end!!
feeds!
log in