
Max Rogers
@MaxRogers5
Followers
3K
Following
7K
Media
132
Statuses
2K
Sr. Director of SOC at Huntress. Ex-Mandiant/FireEye. Bringing security to the Fortune 5,000,000.
Charlotte, NC
Joined January 2012
🚨 Widespread SonicWall SSLVPN Compromises Detected Starting 10/4, and as recently as 10/10, Huntress observed a surge in SonicWall SSLVPN compromises. Threat actors are rapidly authenticating across devices—suggesting valid cred. use, not brute force.
huntress.com
Huntress has observed a spike in compromises of SonicWall SSLVPN devices across multiple customer environments.
2
24
60
Detailing a 0-day on a Friday, I hope you're not impacted (I'm sorry!) 🤞 Whilst investigating an incident our Hunt and Response function identified a 0-day being exploited in the wild on Gladinet products. We've withheld full details until a patch is made available. Details 👇
🚨 We’ve observed in-the-wild exploitation of a flaw (CVE-2025-11371) in Gladinet CentreStack and Triofox. Get the details here: https://t.co/eNNJnQVjjj
1
13
33
🚨 @HuntressLabs identified active exploitation of a Local File Inclusion vulnerability affecting Gladinet CentreStack and Triofox systems. A temporary workaround is available while a patch is in development: https://t.co/u0wgp91H0o
huntress.com
Huntress has observed in-the-wild exploitation of a Local File Inclusion vulnerability in Gladinet CentreStack and Triofox products.
0
6
17
Our new research is now live, and it's full of juicy insights. From a log poisoning vulnerability, to an RMM you've likely never heard of, and a list of victim locations that span the globe! 👀 👇
2
17
88
1
1
10
4⃣ By repurposing a legitimate monitoring tool, the actor gained persistent access and a stable C2 channel. The Nezha agent was then used to deploy the final payload: a variant of Ghost RAT, a backdoor long associated with China-nexus threat groups.
1
1
6
3⃣ From there, the actor used the AntSword management tool to interact with their web shell. This is a common TTP, but what came next was new to us. They used AntSword to download and install the Nezha agent, an open-source server monitoring tool, onto the victim.
1
1
6
2⃣The initial access was creative. The actor exploited a misconfigured, public-facing phpMyAdmin panel. They then used a log poisoning technique to write a one-liner PHP web shell (China Chopper) to disk, bypassing authentication and gaining initial command execution.
1
2
10
1⃣ The @Huntress team uncovered a campaign by a likely China-nexus threat actor. The most novel finding is use of a publicly available tool called Nezha as a post-exploitation C2 agent. This is the first public reporting of the tool I've seen.
huntress.com
Beginning in mid-2025, Huntress discovered a new tool being used to facilitate webserver intrusions known as Nezha, which up until now hasn’t been publicly reported on. This was used in tandem with...
5
46
171
Small update for Community Reports in the Ransomware Tool Matrix - I have included Mermaid ERDs in the template to summarise reports too, looks pretty nice IMO 👇 Thanks again to @SecurityAura & @polygonben for being the first to submit, great stuff both!
0
17
80
Vibe coded apps will have the most 🔥 FIRE readme to ever exist only to have 2% of the desired functionality and every button returns a 404.
0
0
11
If you’re returning from Mastodon or Bluesky and looking for solid infosec content on X This “Cyber” list is a curated feed of high-signal accounts - Pin it to get a timeline tab (see screenshots) - Or follow the members directly - Regularly updated https://t.co/lZcrXsHXhi
11
85
466
Very glad to see the first Community Report shared by @SecurityAura about Akira's tools! https://t.co/U13CXtkKVi
🆕 I have now created a new Community Report system ( https://t.co/hOxt0H7Z7p) If anyone wants to share what tools they have observed, fill one of these out and add to the folder when you next come across tools used in a ransomware attack. ( https://t.co/PWjd3c3qEm) Thank you 🙇♂️
1
7
51
I want to spotlight one of our most genuine and humble analysts in the Huntress SOC. Give @dipotwb a follow 🚀
3
4
25
We installed Huntress *one time* and this....
A threat actor installed Huntress. ... a hysterical mistake on their part, giving us first-hand insight to their tooling, workflow & routine. Phishing infra, stealer logs, Telegram+dark web sites, AI... Hilarious goldmine of cybercrime deets with a front row seat:
2
8
188
Cheers to @TheDFIRReport team for all the guidance and mentorship. This was a really interesting case to work!
🌟New report out today!🌟 Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs Analysis and reporting completed by @r3nzsec, @EncapsulateJ, @rkonicekr, & Adam Rowe Audio: Available on Spotify, Apple, YouTube and more! Report:⬇️
1
5
27
Me explaining Salesloft Drift-Salesforce-Cloudflare-downstream customers at my family bbq later
New podcast is out! https://t.co/nTlS9Fh9s8
1
3
21
We are thrilled to announce that @_JohnHammond will be the keynote speaker at @BSidesNYC on October 18, 2025! We look forward to John sharing his insights.
3
13
79
A look at a newer ransomware variant that we've seen here at @HuntressLabs Thanks to Harlan Carvey and @LindseyOD123 and awesome analysis by @birchb0y and @RussianPanda9xx of the binary! https://t.co/pRutOq0KYe
huntress.com
Huntress found a previously unseen ransomware variant called Obscura on a victim company’s domain controller.
3
18
68