
CERT Orange Cyberdefense
@CERTCyberdef
Followers
10K
Following
191
Media
39
Statuses
211
First Private CERT in Europe. Tweets are about vulnerability and cyber threats. Corporate account: @OrangeCyberDef / @OrangeCyberFR GPG KeyID: 0xBD54B276
Worldwide
Joined April 2009
🧀🎣Since early September 2025, the Orange Cyberdefense CSIRT and CyberSOC teams have detected phishing campaigns impersonating Meta, AppSheet and PayPal, leading to malware delivery. Our team tracks this activity under the alias "Metappenzeller" #CTI #ThreatIntel #Metappenzeller
1
10
10
🔗Related IOCs could be found on GitHub:
github.com
IOCs for World Watch investigations. Contribute to cert-orangecyberdefense/cti development by creating an account on GitHub.
0
0
2
☣ The main lure deploys a full Python environment and runs a Python script responsible for fetching the next stage from a remote C2. Then it opens a decoy file in Word. C2 are now inactive but have been tied to Pure malware family
1
0
2
This Breast Cancer Awareness Month, look into Atossa Therapeutics. We’re advancing an (Z)-endoxifen (investigational) program to address important unmet needs in breast health. Review our science, our team, & our balance sheet. Then decide for yourself. Nasdaq: ATOS
0
153
966
✉ The campaigns are initiated from the legitimate noreply[@]appsheet[.]com address and deliver various payloads, with lures targeting corporate sales, marketing, and legal teams. We advise hunting for emails from this sender
1
0
1
✨AppSheet is a Google platform that enables no-code development of mobile, tablet, and web applications. Knowbe4, RavenMail, and MalwareHunterTeam have also previously mentioned such campaigns. https://t.co/BANyGDfPAH
https://t.co/LSp6JR5L5C
blog.knowbe4.com
Since March 2025, the KnowBe4 Threat Labs team has observed a surge in phishing attacks that exploit Google’s AppSheet platform to launch a highly targeted...
1
0
1
Hello @ShortDotDomains There is an error on your online abuse form. "Something went wrong. Please try again." when submitting. Could you check please ? Thank you
0
0
0
🤖 "Les cybercriminels ont intégré l’IA au même titre aujourd’hui que l’ensemble des utilisateurs" @RodrigueLeBayon à la tête du @CERTCyberdef
https://t.co/FropibKXOX
lanouvellerepublique.fr
Les hackers exploitent l’IA pour mener à bien leurs piratages, notamment en utilisant les robots conversationnels. Récupérer des données confidentielles devient ainsi plus facile, y compris pour les...
2
6
8
🧀 Update on MintsLoader: a thread 🔽 MintsLoader is a JavaScript/PowerShell loader that was first detailed by OCD in 2024. A new version has been around at least since early-June 2025. #cti #ThreatIntel #mintsloader
1
4
9
🆕 Just released a blogpost on a #Sorillus RAT campaign our @CERTCyberdef observed in March. Likely 🇧🇷 threat actors, use of numerous tunneling services like ngrok[.]app, ngrok[.]dev, ngrok[.]pro, localto[.]net, ply[.]gg, campaign still active… ➡️ https://t.co/oHoufcOcfF
1
3
5
Hello @vercel @vercel_support We are struggling to report phishing websites hosted on https://t.co/D7IigoTlDd since weeks. Except automatic response, no takedown realised. Can you check or contact us for more info ? Thanks
vercel.com
Vercel gives developers the frameworks, workflows, and infrastructure to build a faster, more personalized web.
0
0
3
#CVE-2025-32432 #0day #CraftCMS discovered by @CERTCyberdef 💥Unauthenticated Remote Code Execution. No CVSS yet, we suggest to give it a 10 📌40,000 IP addresses representing over 37,000 domain names exposed, 12,168 unique domains vulnerable Blog: https://t.co/sEClo3RSS5
2
6
9
And thanks to @onyphe for their partnership, with their helpful asset database allowing us to perform scans of the vulnerable and compromised Craft CMS instances 6/6
0
2
3
As well as Yii advisory for further details for #CVE-2024-58136 5/6 https://t.co/MZILdXtuTM
yiiframework.com
1
1
2
You can check Craft blog post https://t.co/pz7VSV6D0o And their security advisory for further information related to #CVE-2025-32432 4/6 https://t.co/9YnT0WRPKx
github.com
### Impact This is an additional fix for https://github.com/craftcms/cms/security/advisories/GHSA-4w8r-3xrw-v25g This is a high-impact, low-complexity attack vector. To mitigate the issue, us...
1
1
1
The blog post explains the situation including full technical analysis, a way to detect/block exploitation attempts, exploit statistics as well as Indicators of Compromise 3/6
1
1
1
Today Craft announces a RCE vulnerability affecting CMS - known as #CVE-2025-32432. This vulnerability has been reported by Orange Cyberdefense a month ago after our CSIRT investigated a case where two 0-day vulnerabilities have been exploited 1/6 https://t.co/ndHdjHFyYj
1
8
14
This campaign relied on #emailbombing, with the threat actors using Teams chats to contact their victims. This social engineering trick was first observed by @rapid7 and @MsftSecIntel in April 2024. The adversaries then leveraged RMM tools to initiate the rest of the chain.
0
1
3
💡Our colleagues from Orange Cyberdefense CyberSOC 🇩🇪 just published insights on several December 2024 intrusions leveraging #socialengineering tactics to distribute #DarkGate, #BlackBasta, as well as a custom credential harvester. ➡️ https://t.co/9yV2cdgYTa
1
3
12
📖 Dozens of websites are implicated in this scheme, including @AlienVault OTX or @goodreads Other abused websites include: - @TIDAL music streaming platform where messages are displayed in the playlist description. - @AnimePlanet manga platform, in the review section.
0
1
3