3xp0rt Profile
3xp0rt

@3xp0rtblog

Followers
15K
Following
9K
Media
279
Statuses
3K

Malware and cybercrime | Cyber Threat Intelligence Analyst at @PRODAFT

๐Ÿ‡บ๐Ÿ‡ฆ Ukraine
Joined March 2020
Don't wanna be here? Send us removal request.
@malwrhunterteam
MalwareHunterTeam
21 days
3 years already... Remember @Ledtech3.
2
1
17
@cyb3rops
Florian Roth โšก๏ธ
1 month
Every December I point to one small charity thatโ€™s worth supporting. In the past that was a UNICEF water project or a security researcher from Gambia who couldnโ€™t even afford a computer. This year the choice is obvious. Iโ€™ve been following a small volunteer group in eastern
1
5
28
@PRODAFT
PRODAFT
1 month
๐Ÿš€ Exciting Update from CATALYST! We're making it easier than ever to stay ahead of evolving cyber threats. With our new easy subscription model, you can now access TLP:AMBER reports directly on the CATALYST platform, simply complete your payment and start exploring. ๐Ÿ” What
0
2
7
@PRODAFT
PRODAFT
1 month
Proud to participate in #OperationEndgame /w @Europol. The next phase represents a significant step toward dismantling cyber crime infrastructure worldwide. https://t.co/La2GyeZgb8
0
6
53
@malwrhunterteam
MalwareHunterTeam
1 month
3 years already... Remember @VK_Intel.
1
2
27
@PRODAFT
PRODAFT
1 month
๐Ÿšจ FIN7 (Savage Ladybug) still using the same Windows SSH backdoor with only small changes since 2022. install.bat + OpenSSH toolset โ†’ reverse SSH/SFTP for stealth & exfil. ๐Ÿ“‚Check recent IOCs: https://t.co/22WtpSC8H8 #CyberSecurity #ThreatIntelligence #Malware #IOC
0
43
136
@PRODAFT
PRODAFT
1 month
๐Ÿ’ฌ Privacy claims from ransomware groups are fiction. Files are never deleted. "Private" chats are visible to members, state sponsored actors, and third party providers. ๐Ÿ’ธ Donโ€™t pay ransom. ๐Ÿ›ก๏ธ Protect, contain, investigate. #cybersecurity #ransomware
2
9
27
@PRODAFT
PRODAFT
2 months
๐Ÿ” Patch โ‰  Proof of Safety. Patching exposed appliances is essential, but not the finish line. Threat actors exploit, dump creds, stash them, then come back after triaging huge queues. Even after fixing, valid accounts/tokens keep the door unlocked. #threatintelligence
0
2
12
@PRODAFT
PRODAFT
2 months
๐Ÿ•ต๏ธ Phantom Mantis (ArmCorp), led by LARVA-368 (hastalamuerte), tested Qilin, Embargo, LockBit, Medusa and BlackLock, then built their own RaaS: The Gentlemen. ๐Ÿ‡ท๐Ÿ‡บ๐Ÿดโ€โ˜ ๏ธ Takeaway: monitor threat groups, not just RaaS names. Granular intelligence wins. ๐Ÿ”๐Ÿง ๐ŸŽฏ #threatintelligence
3
7
38
@PRODAFT
PRODAFT
2 months
Threat intelligence isnโ€™t just โ€œnews.โ€ ๐Ÿง  It keeps you updated and one step ahead. So when Qilin-affiliated actors execute ransomware with EDR active ๐Ÿ“ธ, remember: security solutions are essential, but they need proper Threat Intelligence. Stay ready. ๐Ÿ” #ThreatIntelligence
0
4
40
@PRODAFT
PRODAFT
3 months
๐ŸŒ Subtle Snail (UNC1549), an Iran-nexus espionage group ๐Ÿ‡ฎ๐Ÿ‡ท, is targeting European ๐Ÿ‡ช๐Ÿ‡บ telecom, aerospace, and defense organizations. The group uses LinkedIn HR lures and Azure-based C2. Read the full report ๐Ÿ‘‰ https://t.co/NnfwLC8r4d #ThreatIntel #Malware #APT #IOC
3
14
55
@PRODAFT
PRODAFT
4 months
๐Ÿš€ We've shared an IDA Pro decryption script for Matanbuchus 3.0, capable of decrypting ChaCha20 strings & resolving APIs/modules/syscalls using MurmurHash3. Fresh IOCs also available! ๐Ÿ‘‰Check it out: https://t.co/vJNEf4Mt4X #threatintel #malware #IOC
0
13
72
@PRODAFT
PRODAFT
4 months
๐Ÿ‡ฎ๐Ÿ‡ท Iran-nexus espionage group Subtle Snail (UNC1549, TA455) linked to Charming Kitten is ramping up European ops, infecting telecom organizations and exfiltrating sensitive documents. They've impacted 10 organizations in the last week. Victim notification is ongoing. Do not skip
1
23
54
@PRODAFT
PRODAFT
5 months
Seriously? ๐Ÿคฏ Supernatural Cockroach (a.k.a. National Hazard Agency) exploiting basic default credentials on Fortinet, Palo Alto, Cisco & othersโ€ฆand deploying ransomware. Are we still seeing this in 2025? ๐Ÿ“„Report (subscribed users only): https://t.co/a5Byzgibfj
11
7
15
@3xp0rtblog
3xp0rt
5 months
The XSS forum community is actively discussing the situation. However, it appears that moderators are removing all content where the admin (LARVA-27) is being discussed. This was confirmed in a Telegram chat by moderator LARVA-466 (Rehub). The goal is to suppress any narrative
@Europol
Europol
5 months
๐Ÿšจ Suspected admin of https://t.co/iAJ89D7nkV, a top Russian-speaking cybercrime forum, was arrested in Ukraine. The suspect, active for nearly 20 years, allegedly made โ‚ฌ7M facilitating cybercrime. ๐Ÿ‡ซ๐Ÿ‡ท๐Ÿ‡บ๐Ÿ‡ฆ๐Ÿ‡ช๐Ÿ‡บ Operation led by France with Europol support. https://t.co/JQEfYiYBjF
8
39
152
@Europol
Europol
5 months
๐Ÿšจ Suspected admin of https://t.co/iAJ89D7nkV, a top Russian-speaking cybercrime forum, was arrested in Ukraine. The suspect, active for nearly 20 years, allegedly made โ‚ฌ7M facilitating cybercrime. ๐Ÿ‡ซ๐Ÿ‡ท๐Ÿ‡บ๐Ÿ‡ฆ๐Ÿ‡ช๐Ÿ‡บ Operation led by France with Europol support. https://t.co/JQEfYiYBjF
14
155
347
@PRODAFT
PRODAFT
5 months
Starting from Monday, we will no longer be accepting any accounts of XSS[.]is. Thank you for consistently providing accounts over the past months. We appreciate your business ! #SYSInitiative #SYS #PRODAFT #XMR
@Europol
Europol
5 months
๐Ÿšจ Suspected admin of https://t.co/iAJ89D7nkV, a top Russian-speaking cybercrime forum, was arrested in Ukraine. The suspect, active for nearly 20 years, allegedly made โ‚ฌ7M facilitating cybercrime. ๐Ÿ‡ซ๐Ÿ‡ท๐Ÿ‡บ๐Ÿ‡ฆ๐Ÿ‡ช๐Ÿ‡บ Operation led by France with Europol support. https://t.co/JQEfYiYBjF
3
6
41
@PRODAFT
PRODAFT
5 months
๐Ÿšจ LARVA-208 is back! Now targeting Web3 developers via fake AI platforms with job offers & portfolio reviews. Malware disguised as a Realtek HD Audio Driver is deployed during interviews. ๐Ÿ“„ Read the full report: https://t.co/WTudtPG9FR ๐Ÿ” IOCs: https://t.co/asnM3WeW6J
2
11
21
@PRODAFT
PRODAFT
5 months
โžก๏ธ Fresh IOCs on Matanbuchus 3.0: https://t.co/vJNEf4Mt4X #malware #threatintel #IOC
Tweet card summary image
github.com
This repository contains indicators of compromise (IOCs) of our various investigations. - prodaft/malware-ioc
@PRODAFT
PRODAFT
5 months
๐ŸšจMatanbuchus 3.0 is here! Threat actors are already buzzing about this completely rewritten loader. DNS/HTTPS C2, in-memory execution, reverse shell/WMI, morphing builds & a multitenant panel. Priced at $10Kโ€“$15K/month. Stay informed. #threatintelligence #cybersecurity
1
10
30
@PRODAFT
PRODAFT
5 months
๐Ÿ‡ท๐Ÿ‡บ Russian-speaking threat group Hopeful Mantis, managing by LARVA-200 (farnetwork/efwnet), is now operating Sinobi ransomware, alongside INC Ransom & Lynx, following their previous operation of Nokoyawa. Itโ€™s crucial to understand the connections. #threatintel #ransomware
1
7
32