Anti_Expl0it Profile Banner
William MacArthur Profile
William MacArthur

@Anti_Expl0it

Followers
2K
Following
2K
Media
24
Statuses
173

Director of Threat Research & Intelligence @InQuest: All views expressed are from my own brain. “Sharing is caring”

57696c6c794d6163
Joined September 2016
Don't wanna be here? Send us removal request.
@InQuest
InQuest
2 years
In an era of sophisticated ⚠️ cyber-attacks, 📝 documenting attack sequences is crucial for proactive🛡️ prevention. 🔗 Read our blog by @anti_Expl0it for a view on threat sequencing and its significance ➡️ https://t.co/JnLYEh3cEj #ThreatSequencing #ThreatIntel #Cybersecurity
Tweet card summary image
opswat.com
Our Network Detection and Response is purpose-built to help your SOC team operate at peak efficiency. Talk to an expert about MetaDefender NDR today.
0
1
2
@InQuest
InQuest
3 years
InQuest and @Threatlabz have analyzed #MysticStealer, a new malware family that extracts data from various sources, including web browsers and cryptocurrency wallets, through its obfuscation techniques ➡️ https://t.co/HizIFN6JSL #Malware #CyberSecurity #Cryptocurrency
0
2
4
@Anti_Expl0it
William MacArthur
3 years
This is super exciting both personally and professionally. 🦄
@InQuest
InQuest
3 years
📣 We are honored to welcome Chief Intelligence Officer, Darren Spruell ➡️ https://t.co/tvjmAWTEa8 As a long-time collaborator in intelligence-sharing 🧠 communities, Darren has led efforts to maintain data-sharing 🤝relationships in critical industries. #intelligence #FDR
0
2
7
@pedramamini
Pedram Amini
3 years
New @InQuest blog post covering the recent rise of Microsoft OneNote as a malware carrier: https://t.co/xv42zk97Qf We cover the timeline, campaigns, and tools. You can find downloadable samples and YARA detection logic at: https://t.co/TPfcXLOh5U https://t.co/EFlERv5jcJ
2
17
43
@InQuest
InQuest
3 years
The holidays are here. Be careful what gifts you open! https://t.co/5Vzf0AtH7O #ransomware #threatintel
1
6
11
@InQuest
InQuest
4 years
📌 Watch our intro video, access our open research portal: https://t.co/RiizgVygv3 Follow our Blog: https://t.co/pEskgV9DF4 See our open-source work: https://t.co/i4Bbuvag9u Connect on LinkedIn: https://t.co/15IwmH7xKg…… Tweets with 🤖 are InQuest Labs automation.
0
4
10
@InQuest
InQuest
3 years
Some field notes on an active and successful Phishing campaign that leverages a low-detection document-based lure, to pivot through various hosting providers. Samples, IOCs, and more: https://t.co/iaYCpTYXMV #phishing #malware #malwareanalysis
0
3
3
@pedramamini
Pedram Amini
4 years
I'm very excited to share that after countless sleepless nights we're having a break-out year at @InQuest and are looking to double in size in the near term. We're seeking senior talent in both research & development as well as sales & marketing: https://t.co/YnS4cjl9ge
Tweet card summary image
opswat.com
Our Network Detection and Response is purpose-built to help your SOC team operate at peak efficiency. Talk to an expert about MetaDefender NDR today.
3
9
31
@InQuest
InQuest
4 years
We've just added a notion of "collections" to the file corpus (DFI) of https://t.co/drAloDkYJv. Included today are files from InQuest Macro Clustering (~10k), the Enron leak (~16k), and those from the dataset used in the "Invoice #31415 attached" research paper (~15k).
0
2
10
@BleepinComputer
BleepingComputer
4 years
Historic Hotel of America leads to modern malware for their guests. Why securing your inbox with more than just anti-malware engines is needed to prevent cybercrime attacks. Sponsored by @InQuest #cybersecurity #emotet #phishing https://t.co/M7hsoU9UoG
Tweet card summary image
bleepingcomputer.com
Historic Hotel of America serving up modern malware to their guests. Why securing your inbox with more than just anti-malware engines is needed to prevent cybercrime attacks.
0
7
18
@InQuest
InQuest
4 years
Looks like #Qbot is back in action. Green Lure seen at least, where is the blue :P https://t.co/dW59hMfu6l 5.254.118.]198 91.194.11.]15 146.70.87.]163 @James_inthe_box @Cryptolaemus1 @Anti_Expl0it @Autow00t
2
9
27
@InQuest
InQuest
4 years
2
5
11
@InQuest
InQuest
4 years
As a follow up to the previous graphic outlining threats affecting #Ukraine, here is a high level blog on observed threats. Big thanks to the #infosec community for making this possible, #SlavaUkraini @Anti_Expl0it @Autow00t @juanandres_gs @flakpaket https://t.co/n9IKK9KXNj
0
16
27
@InQuest
InQuest
4 years
Interesting Doughnut 0 VT Score for a "Test?" Doc leading to #Metasploit https://t.co/XfKBOTb2mS FYI: We heard some others seeing some waves of this week. @James_inthe_box @Anti_Expl0it @executemalware @Autow00t
2
1
10
@InQuest
InQuest
4 years
#Hancitor run looks like using Efax Lure - Password is 44 https://t.co/npHq9NBtjn @James_inthe_box @Anti_Expl0it @Cryptolaemus1
4
9
24
@InQuest
InQuest
4 years
An update our previous graphic we shared on the cyber-front of the #ukraine conflict. This content was collected from various sources and collaborations within the #infosec community. Special thanks to all involved. @Anti_Expl0it @Autow00t @juanandres_gs @flakpaket
0
33
52
@InQuest
InQuest
4 years
We are sharing this visual for tracking threat actors/groups related to the current #ukraine conflict. The content was collected from various sources within the #infosec community. Special thanks to all involved. @Anti_Expl0it @Autow00t @juanandres_gs
1
121
241
@InQuest
InQuest
4 years
This is an odd one here with extreme uri length + directory traversal flavor a+ .dotm file suffix. AS37963 - ALIBABA (US) TECHNOLOGY. Note https://t.co/ZJubCbd7al @James_inthe_box @JRoosen @Anti_Expl0it @dms1899
2
6
15
@InQuest
InQuest
4 years
Seeing a lot of low score #Dridex docs right now... lots of various lures again. https://t.co/Vx8RfXnaqq @JRoosen @Anti_Expl0it @James_inthe_box @Autow00t
1
8
21