MaxRogers5 Profile Banner
Max Rogers Profile
Max Rogers

@MaxRogers5

Followers
3K
Following
7K
Media
132
Statuses
2K

Sr. Director of SOC at Huntress. Ex-Mandiant/FireEye. Bringing security to the Fortune 5,000,000.

Charlotte, NC
Joined January 2012
Don't wanna be here? Send us removal request.
@MaxRogers5
Max Rogers
5 months
You can find me here:
1
0
3
@HuntressLabs
Huntress
8 days
🚨 Widespread SonicWall SSLVPN Compromises Detected Starting 10/4, and as recently as 10/10, Huntress observed a surge in SonicWall SSLVPN compromises. Threat actors are rapidly authenticating across devices—suggesting valid cred. use, not brute force.
Tweet card summary image
huntress.com
Huntress has observed a spike in compromises of SonicWall SSLVPN devices across multiple customer environments.
2
24
60
@CyberRaiju
Jai Minton
9 days
Detailing a 0-day on a Friday, I hope you're not impacted (I'm sorry!) 🤞 Whilst investigating an incident our Hunt and Response function identified a 0-day being exploited in the wild on Gladinet products. We've withheld full details until a patch is made available. Details 👇
@HuntressLabs
Huntress
9 days
🚨 We’ve observed in-the-wild exploitation of a flaw (CVE-2025-11371) in Gladinet CentreStack and Triofox. Get the details here: https://t.co/eNNJnQVjjj
1
13
33
@MaxRogers5
Max Rogers
9 days
🚨 @HuntressLabs identified active exploitation of a Local File Inclusion vulnerability affecting Gladinet CentreStack and Triofox systems. A temporary workaround is available while a patch is in development: https://t.co/u0wgp91H0o
Tweet card summary image
huntress.com
Huntress has observed in-the-wild exploitation of a Local File Inclusion vulnerability in Gladinet CentreStack and Triofox products.
0
6
17
@CyberRaiju
Jai Minton
10 days
Our new research is now live, and it's full of juicy insights. From a log poisoning vulnerability, to an RMM you've likely never heard of, and a list of victim locations that span the globe! 👀 👇
2
17
88
@MaxRogers5
Max Rogers
11 days
Great job @CyberRaiju, @darkrym11, and @birchb0y on the analysis and write up 🔥
1
1
10
@MaxRogers5
Max Rogers
11 days
4⃣ By repurposing a legitimate monitoring tool, the actor gained persistent access and a stable C2 channel. The Nezha agent was then used to deploy the final payload: a variant of Ghost RAT, a backdoor long associated with China-nexus threat groups.
1
1
6
@MaxRogers5
Max Rogers
11 days
3⃣ From there, the actor used the AntSword management tool to interact with their web shell. This is a common TTP, but what came next was new to us. They used AntSword to download and install the Nezha agent, an open-source server monitoring tool, onto the victim.
1
1
6
@MaxRogers5
Max Rogers
11 days
2⃣The initial access was creative. The actor exploited a misconfigured, public-facing phpMyAdmin panel. They then used a log poisoning technique to write a one-liner PHP web shell (China Chopper) to disk, bypassing authentication and gaining initial command execution.
1
2
10
@MaxRogers5
Max Rogers
11 days
1⃣ The @Huntress team uncovered a campaign by a likely China-nexus threat actor. The most novel finding is use of a publicly available tool called Nezha as a post-exploitation C2 agent. This is the first public reporting of the tool I've seen.
Tweet card summary image
huntress.com
Beginning in mid-2025, Huntress discovered a new tool being used to facilitate webserver intrusions known as Nezha, which up until now hasn’t been publicly reported on. This was used in tandem with...
5
46
171
@BushidoToken
Will
29 days
Small update for Community Reports in the Ransomware Tool Matrix - I have included Mermaid ERDs in the template to summarise reports too, looks pretty nice IMO 👇 Thanks again to @SecurityAura & @polygonben for being the first to submit, great stuff both!
@BushidoToken
Will
1 month
New Blog! Ransomware Tool Matrix Update: Community Reports https://t.co/QYMcKk7HK6
0
17
80
@MaxRogers5
Max Rogers
1 month
Vibe coded apps will have the most 🔥 FIRE readme to ever exist only to have 2% of the desired functionality and every button returns a 404.
0
0
11
@cyb3rops
Florian Roth ⚡️
1 month
If you’re returning from Mastodon or Bluesky and looking for solid infosec content on X This “Cyber” list is a curated feed of high-signal accounts - Pin it to get a timeline tab (see screenshots) - Or follow the members directly - Regularly updated https://t.co/lZcrXsHXhi
11
85
466
@BushidoToken
Will
1 month
Very glad to see the first Community Report shared by @SecurityAura about Akira's tools! https://t.co/U13CXtkKVi
@BushidoToken
Will
1 month
🆕 I have now created a new Community Report system ( https://t.co/hOxt0H7Z7p) If anyone wants to share what tools they have observed, fill one of these out and add to the folder when you next come across tools used in a ransomware attack. ( https://t.co/PWjd3c3qEm) Thank you 🙇‍♂️
1
7
51
@MaxRogers5
Max Rogers
1 month
I want to spotlight one of our most genuine and humble analysts in the Huntress SOC. Give @dipotwb a follow 🚀
3
4
25
@uwu_underground
UwU Underground
1 month
We installed Huntress *one time* and this....
@_JohnHammond
John Hammond
1 month
A threat actor installed Huntress. ... a hysterical mistake on their part, giving us first-hand insight to their tooling, workflow & routine. Phishing infra, stealer logs, Telegram+dark web sites, AI... Hilarious goldmine of cybercrime deets with a front row seat:
2
8
188
@EncapsulateJ
EncapsulateJay
1 month
Cheers to @TheDFIRReport team for all the guidance and mentorship. This was a really interesting case to work!
@TheDFIRReport
The DFIR Report
1 month
🌟New report out today!🌟 Blurring the Lines: Intrusion Shows Connection With Three Major Ransomware Gangs Analysis and reporting completed by @r3nzsec, @EncapsulateJ, @rkonicekr, & Adam Rowe Audio: Available on Spotify, Apple, YouTube and more! Report:⬇️
1
5
27
@LindseyOD123
Lindsey O-Donnell-Welch
1 month
Me explaining Salesloft Drift-Salesforce-Cloudflare-downstream customers at my family bbq later
@DecipherSec
Decipher
1 month
New podcast is out! https://t.co/nTlS9Fh9s8
1
3
21
@BSidesNYC
#BSidesNYC
1 month
We are thrilled to announce that @_JohnHammond will be the keynote speaker at @BSidesNYC on October 18, 2025! We look forward to John sharing his insights.
3
13
79
@gleeda
Jamie Levy🦉
2 months
A look at a newer ransomware variant that we've seen here at @HuntressLabs Thanks to Harlan Carvey and @LindseyOD123 and awesome analysis by @birchb0y and @RussianPanda9xx of the binary! https://t.co/pRutOq0KYe
Tweet card summary image
huntress.com
Huntress found a previously unseen ransomware variant called Obscura on a victim company’s domain controller.
3
18
68