3xp0rt
@3xp0rtblog
Followers
15K
Following
9K
Media
279
Statuses
3K
Malware and cybercrime | Cyber Threat Intelligence Analyst at @PRODAFT
๐บ๐ฆ Ukraine
Joined March 2020
Every December I point to one small charity thatโs worth supporting. In the past that was a UNICEF water project or a security researcher from Gambia who couldnโt even afford a computer. This year the choice is obvious. Iโve been following a small volunteer group in eastern
1
5
28
๐ Exciting Update from CATALYST! We're making it easier than ever to stay ahead of evolving cyber threats. With our new easy subscription model, you can now access TLP:AMBER reports directly on the CATALYST platform, simply complete your payment and start exploring. ๐ What
0
2
7
Proud to participate in #OperationEndgame /w @Europol. The next phase represents a significant step toward dismantling cyber crime infrastructure worldwide. https://t.co/La2GyeZgb8
0
6
53
๐จ FIN7 (Savage Ladybug) still using the same Windows SSH backdoor with only small changes since 2022. install.bat + OpenSSH toolset โ reverse SSH/SFTP for stealth & exfil. ๐Check recent IOCs: https://t.co/22WtpSC8H8
#CyberSecurity #ThreatIntelligence #Malware #IOC
0
43
136
๐ฌ Privacy claims from ransomware groups are fiction. Files are never deleted. "Private" chats are visible to members, state sponsored actors, and third party providers. ๐ธ Donโt pay ransom. ๐ก๏ธ Protect, contain, investigate. #cybersecurity #ransomware
2
9
27
๐ Patch โ Proof of Safety. Patching exposed appliances is essential, but not the finish line. Threat actors exploit, dump creds, stash them, then come back after triaging huge queues. Even after fixing, valid accounts/tokens keep the door unlocked. #threatintelligence
0
2
12
๐ต๏ธ Phantom Mantis (ArmCorp), led by LARVA-368 (hastalamuerte), tested Qilin, Embargo, LockBit, Medusa and BlackLock, then built their own RaaS: The Gentlemen. ๐ท๐บ๐ดโโ ๏ธ Takeaway: monitor threat groups, not just RaaS names. Granular intelligence wins. ๐๐ง ๐ฏ #threatintelligence
3
7
38
Threat intelligence isnโt just โnews.โ ๐ง It keeps you updated and one step ahead. So when Qilin-affiliated actors execute ransomware with EDR active ๐ธ, remember: security solutions are essential, but they need proper Threat Intelligence. Stay ready. ๐ #ThreatIntelligence
0
4
40
๐ Subtle Snail (UNC1549), an Iran-nexus espionage group ๐ฎ๐ท, is targeting European ๐ช๐บ telecom, aerospace, and defense organizations. The group uses LinkedIn HR lures and Azure-based C2. Read the full report ๐ https://t.co/NnfwLC8r4d
#ThreatIntel #Malware #APT #IOC
3
14
55
๐ We've shared an IDA Pro decryption script for Matanbuchus 3.0, capable of decrypting ChaCha20 strings & resolving APIs/modules/syscalls using MurmurHash3. Fresh IOCs also available! ๐Check it out: https://t.co/vJNEf4Mt4X
#threatintel #malware #IOC
0
13
72
๐ฎ๐ท Iran-nexus espionage group Subtle Snail (UNC1549, TA455) linked to Charming Kitten is ramping up European ops, infecting telecom organizations and exfiltrating sensitive documents. They've impacted 10 organizations in the last week. Victim notification is ongoing. Do not skip
1
23
54
Seriously? ๐คฏ Supernatural Cockroach (a.k.a. National Hazard Agency) exploiting basic default credentials on Fortinet, Palo Alto, Cisco & othersโฆand deploying ransomware. Are we still seeing this in 2025? ๐Report (subscribed users only): https://t.co/a5Byzgibfj
11
7
15
The XSS forum community is actively discussing the situation. However, it appears that moderators are removing all content where the admin (LARVA-27) is being discussed. This was confirmed in a Telegram chat by moderator LARVA-466 (Rehub). The goal is to suppress any narrative
๐จ Suspected admin of https://t.co/iAJ89D7nkV, a top Russian-speaking cybercrime forum, was arrested in Ukraine. The suspect, active for nearly 20 years, allegedly made โฌ7M facilitating cybercrime. ๐ซ๐ท๐บ๐ฆ๐ช๐บ Operation led by France with Europol support. https://t.co/JQEfYiYBjF
8
39
152
๐จ Suspected admin of https://t.co/iAJ89D7nkV, a top Russian-speaking cybercrime forum, was arrested in Ukraine. The suspect, active for nearly 20 years, allegedly made โฌ7M facilitating cybercrime. ๐ซ๐ท๐บ๐ฆ๐ช๐บ Operation led by France with Europol support. https://t.co/JQEfYiYBjF
14
155
347
Starting from Monday, we will no longer be accepting any accounts of XSS[.]is. Thank you for consistently providing accounts over the past months. We appreciate your business ! #SYSInitiative #SYS #PRODAFT #XMR
๐จ Suspected admin of https://t.co/iAJ89D7nkV, a top Russian-speaking cybercrime forum, was arrested in Ukraine. The suspect, active for nearly 20 years, allegedly made โฌ7M facilitating cybercrime. ๐ซ๐ท๐บ๐ฆ๐ช๐บ Operation led by France with Europol support. https://t.co/JQEfYiYBjF
3
6
41
๐จ LARVA-208 is back! Now targeting Web3 developers via fake AI platforms with job offers & portfolio reviews. Malware disguised as a Realtek HD Audio Driver is deployed during interviews. ๐ Read the full report: https://t.co/WTudtPG9FR ๐ IOCs: https://t.co/asnM3WeW6J
2
11
21
github.com
This repository contains indicators of compromise (IOCs) of our various investigations. - prodaft/malware-ioc
๐จMatanbuchus 3.0 is here! Threat actors are already buzzing about this completely rewritten loader. DNS/HTTPS C2, in-memory execution, reverse shell/WMI, morphing builds & a multitenant panel. Priced at $10Kโ$15K/month. Stay informed. #threatintelligence #cybersecurity
1
10
30
๐ท๐บ Russian-speaking threat group Hopeful Mantis, managing by LARVA-200 (farnetwork/efwnet), is now operating Sinobi ransomware, alongside INC Ransom & Lynx, following their previous operation of Nokoyawa. Itโs crucial to understand the connections. #threatintel #ransomware
1
7
32