Christiaan Beek
@ChristiaanBeek
Followers
10K
Following
6K
Media
1K
Statuses
13K
Saved by His Grace • sr dir Threat Analytics @Rapid7 - opinions are my own• Speaker•Former @Foundstone @Intel @Kon_Marine https://t.co/2MSYGTBKuq
In a data galaxy far far away
Joined March 2009
We now have a (draft) @metasploit exploit module in the pull queue for the recent Microsoft SharePoint Server unauthenticated RCE zero-day (CVE-2025-53770), based on the in-the-wild exploit published a few days ago. Check it out here: https://t.co/J4EG2Wk5f5
8
147
501
In the first half of 2025, Rapid7 Labs tracked 96 unique ransomware groups — a 41% increase over the same period in 2024. This isn’t just a number; it’s a wake-up call ⏰:
rapid7.com
Q2 2025 Ransomware Trends Analysis: Boom and Bust
0
3
4
🚨 Scattered Spider is a financially motivated cybercriminal group notorious for targeting large enterprises – often by exploiting IT help desks via social engineering. In a new blog, Rapid7 outlines known TTPs, provides defensive recommendations & more: https://t.co/L8NwBV8WDg
0
7
15
My talk “Why is #Ransomware Still a Thing in 2025?” has been accepted for #RSAC this year! Looking forward to examining the key challenges and share some interesting observations.
1
1
8
The 2024 #Ransomware landscape @rapid7 :
rapid7.com
The 2024 Ransomware Landscape: Looking back on another painful year | Rapid7 Blog
1
1
2
Dear followers, I will start to switch more to Bsky for posts:
0
1
1
The #malware side of the Rapid7 house published an analysis of one of the payloads our MDR folks have seen dropped in the #Cleo exploitation campaign — a modular Java backdoor that facilitates follow-on attacker behavior. Props to @ChristiaanBeek + team!
rapid7.com
Modular Java Backdoor Dropped in Cleo Exploitation Campaign | Rapid7 Blog
0
11
25
An experimental #Yara rule for Memory detection of the Modular RAT can be downloaded here:
github.com
Repo for yara-rules. Contribute to cbeek-r7/Yara development by creating an account on GitHub.
0
2
6
📷 The Java classes provide a modular multi-stage system (Java-RAT) designed to communicate with a C2, has file-transfer and management functionality, can execute commands and applies packet level encryption/decryption.
1
2
7
While we (@rapid7 ) researched the exploitation of the Cleo File transfer software CVE-2024-50623: https://t.co/csVj6vBEFP... I also took a stab on analyzing the Java classes that appeared in the final payload, a zip with 9 files aka Java classes in it. 🧵
2
21
77
Phobos #Ransomware Administrator Extradited from South Korea to Face Cybercrime Charges.
justice.gov
The Justice Department unsealed criminal charges today against Evgenii Ptitsyn, 42, a Russian national, for allegedly administering the sale, distribution, and operation of Phobos ransomware. Ptits...
0
0
0
🐚🐐 Full Rapid7 analysis for #FortiManager CVE-2024-47575 — just a chill Wednesday for @stephenfewer
We have just published our AttackerKB @rapid7 Analysis for CVE-2024-47575, the recent FortiManager 0day, aka FortiJump 🔥 Read our full technical analysis; detailing firmware decryption, protocol analysis, and unauthenticated RCE 🚀
1
6
25
Why Cybercriminals are not necessarily embracing #AI
hackernoon.com
The rapid advancement of AI has offered powerful tools for adversarial attacks. Would threat actors invest and use more advanced AI applications?
0
1
2
0
0
0
AttackerKB has a technical assessment of the CUPS exploit chain, along with additional observations and IOCs c/o @stephenfewer (big thanks also to @the_emmons!)
attackerkb.com
On September 26, 2024, technical details of a four-vulnerability exploit chain affecting the Common UNIX Printing System (CUPS) were disclosed. The four vulner…
0
13
60
Rapid7 Labs’ #ransomware radar report 👇
📈 Just dropped: the Ransomware Radar report. A fresh perspective on the global ransomware threat—and we mean fresh. All data was compiled from analyzing attacker activity and techniques over 18 months, ending June 30, 2024. 🔎 Download the report here: https://t.co/Tyu30Vbwgc
0
0
2
📈 Just dropped: the Ransomware Radar report. A fresh perspective on the global ransomware threat—and we mean fresh. All data was compiled from analyzing attacker activity and techniques over 18 months, ending June 30, 2024. 🔎 Download the report here: https://t.co/Tyu30Vbwgc
0
2
4