JAMESWT_WT Profile Banner
JAMESWT Profile
JAMESWT

@JAMESWT_WT

Followers
37K
Following
87K
Media
10K
Statuses
55K

#Independent #Malware #Hunter #CyberSecurity #InfoSec https://t.co/KCFBJcHHcW https://t.co/WODUKncjFy

Joined August 2015
Don't wanna be here? Send us removal request.
@JAMESWT_WT
JAMESWT
1 day
1/2 #booking #fakecaptcha #clickfix>#netsupport ⏬ Aggiornamento Vi chiediamo di rispondere entro 24 ore 👇 ⛔️accountspagemain-com uri.html vpv.html 👇 ⛔️77.90.60.32 123.txt y.GRE (netsupport) 👇 Gateway ⛔️rentalsmcx.]com:443 ⛔️185.39.19.]95:443 cc @k3dg3 @500mk500 @skocherhan
2
3
25
@abuse_ch
abuse.ch
15 hours
CHICXULUB IMPACT 💥 Botnet C2 URLs: 📡 https://turbokent .name/api/initialize 📡 https://turbokent .name/api/status Sponsoring domain registrar: NICENIC 🇭🇰 Malware sample 📄: https://t.co/sBv1ubNZc9
0
6
19
@anyrun_app
ANY.RUN
2 days
🎉 As 2025 wraps up, we want to give a shout-out to the researchers and analysts who helped push the cybersecurity community forward with their work. These voices are definitely worth following to keep up with new threats and fresh research in 2026. Here’s our list, in no
6
7
50
@anyrun_app
ANY.RUN
22 hours
👨‍💻 2025 kept analysts busy. 1.2M threats uncovered, 194K TI Lookup searches, 5.7M+ analyses and 400,000+ hours spent in the #ANYRUN Sandbox. Thank you for trusting us and strengthening security together 🌐 Let’s rewind 2025 and see what’s next: https://t.co/M0CbuiaDIE
1
3
16
@JAMESWT_WT
JAMESWT
17 hours
@RedDrip7
RedDrip Team
1 day
Seem like targeted #malware that downloads jpg and extracts powershell code, which downloads next-stage powershell code. 62620d4c521ae2e04e9a7d5c8b4aebe5 ("2026년_1차_보안교육_프로그램_안내.doc") 83ff6f9a615e00c039aaa02675a09a50 ("hlsoffice_aam.dll")
0
4
12
@AgidCert
Cert AgID
3 days
Sintesi riepilogativa delle campagne malevole nella settimana del 13 – 19 dicembre 2025 💣 #IoC 966 🦠 #Malware 14 (famiglie) 🐟 #Phishing 30 (brand) ℹ️ Ulteriori approfondimenti 👇 🔗 https://t.co/JQiRfemr3J
0
2
5
@suyog41
Yogesh Londhe
2 days
MemAlpha Stealer d23e234ed9e7ffdb7b019976ad524acf • Hardware & network profiling • Screenshot capture • Keystroke logging • Browser data & cookies theft • Telegram & Steam data • Crypto wallet harvesting • Exfil via Telegram #MemAlphaStealer #Stealer #IOC
1
3
8
@AgidCert
Cert AgID
19 hours
Vulnerabilità critica in #n8n. Rischio elevato per istanze esposte in rete CVE-2025-68613 ▪️La vulnerabilità ▪️L’attacco ▪️L’impatto ▪️Superficie di esposizione in Italia ▪️Mitigazioni e raccomandazioni ℹ️ Approfondimenti 👇 🔗 https://t.co/yK6sYEkB4Y
0
2
4
@JAMESWT_WT
JAMESWT
18 hours
0
1
6
@SquiblydooBlog
Squiblydoo
4 days
OathboundLegends_Installer.exe signed by "SZVERES MARKETING SRL" 911 MB, too big for VirusTotal It's an infostealer. The traffer team DMs folk asking them to moderate a their community, and asks them to play the game.
3
9
32
@struppigel
Karsten Hahn
1 day
Multiple users are reporting messages like this one. Seems someone has hacked a malware C2 https://t.co/bklonSXyy0
12
170
7K
@RexorVc0
Aaron Jornet
2 days
#TA #BlindEagle APT-C-36 #Hijackloader #PureRat #Threat #Malware 📍🇨🇴 💥🇪🇨🇨🇱🇵🇦🌎 ⛓️ #Phishing > SVG > Download > Fake doc (EXE) + DLLs > EXE load DLL > Inject code > #Hijackloader > Persistence > 2nd Inject > TeraNa.exe > #PureRAT > #C2 🔗360 Threat Intelligence:
4
19
90
@D3LabIT
D3Lab
22 hours
🚨 Attenzione ad nuova campagna #Scam che sfrutta false promozioni @Conad e i punti fedeltà in scadenza. Non è phishing: l’obiettivo è attivare abbonamenti ricorrenti tramite circuiti di pagamento leciti. 🧵 Analisi completa: https://t.co/5MFTheWg8R #OnlineFraud
Tweet card summary image
d3lab.net
Una nuova campagna di scam sfrutta il brand Conad e i punti fedeltà in scadenza per indurre gli utenti a sottoscrivere inconsapevolmente abbonamenti a pagamento. In questo articolo analizziamo come...
0
1
5
@JAMESWT_WT
JAMESWT
23 hours
👇Samples Collection Updated ✅ https://t.co/fZ6Cmn41DS
@JAMESWT_WT
JAMESWT
23 hours
0
3
12
@JAMESWT_WT
JAMESWT
23 hours
0
1
4
@ransomnews
ransomNews
2 days
🚨 nuova rivendicazione #ransomware Italia 🚨 🏴‍☠️ gruppo #Qilin 🧬 Callipo Group SRL | Pizzo (VV) 🎯 settore: alimentare 🔗 https://t.co/QCMX1iqTYQ 🗓️ 22 dicembre 2025 👉🏻 his target has been already claimed by #Medusa threat actor, on December 19th 📄 sample: - ▪️ dati
@ransomnews
ransomNews
7 days
🚨 nuova rivendicazione #ransomware Italia 🚨 🏴‍☠️ gruppo #Medusa 🧬 Callipo Group SRL | Pizzo (VV) 🎯 settore: alimentare 🔗 https://t.co/QCMX1iqTYQ 🗓️ 17 dicembre 2025 📄 sample: sì ▪️ dati esfiltrati dichiarati: - ▪️ dati esfiltrati pubblicati: - ⏲️ scadenza: 08 gennaio 2026
0
2
6