Yashraj Solanki
@RustyNoob619
Followers
1K
Following
3K
Media
232
Statuses
676
Cyber Threat Intelligence Analyst @bridewellsec (All tweets are my views) C2 Hunting | Malware Noob | ICS Addict
England
Joined March 2023
As far as pivoting is concerned in CTI, you can pretty much do it all between @virustotal, @censysio & @urlscanio π§ I have taken all Artifact types and their features from the Awesome Pivot Atlas maintained by @AmitaiCo & mapped it against sources & where to find them Links β¬οΈ
22
79
362
If any of you awesome bunch are attending @DEATHCon2025 in Edinburgh, feel free to hit me up :) Here is a sneak peak into what is planned for my YARA workshop π§
Super excited to say that I will be doing my first ever solo workshop at @DEATHCon2025. It will be on writing YARA for malware attribution (I know this is a scary word) π§ There are plenty of other cool workshops on all things Detection Engineering & Threat Hunting Mo Deets β¬οΈ
0
0
3
Forgot to mention, the primary on this investigation is Ellis Stannard who has pretty much nailed it π More IoCs Here:
0
0
0
=> Potential attribution to π°π΅ Nexus actors => Novel technique called "Cross-Chain TxDataHiding" => Interesting C2 mechanism being leveraged => Mature adversary OPSEC Stay frosty for more IoCs, YARA, reversing payloads and C2 infra in the upcoming parts π§
1
0
0
Always noice collabing with other researchers and first of the many to come. This is easily one of the most complex infection chains I have looked at! More deets will follow in this multi-part series, so stay tuned for some more intel π§ Key Pointers β¬οΈ https://t.co/7lElpRLZg4
ransom-isac.org
Join the global fight against ransomware. Access high-quality threat intelligence and connect with defenders worldwide.
1
0
3
If you are tracking adversary infrastructure, it does not necessarily need to be malicious in nature. You can still track it for the purpose of clustering, provided it is specific enough to do so, just saying π§
0
0
2
You do not wanna miss out on this one, if you are interested in advancing your malware analysis skills, just grab it, I have got mine π Cannot think of a better course for the value and price point, looking forward to the YARA & Automation bits Awesome stuff @struppigel π§
My intermediate level malware analysis course is there. 60% off for the next two weeks. https://t.co/q16H43ihoF
1
3
43
@cyb3rops @virustotal Retro Hunt Complete ==> +12 Samples Identified, all added to the IOCs link above π§ With Respect to attribution, feels like a Cybercrime, possibly π°π΅ Cluster behind it. But hey, feelings have no place in attribution. Take is as low confidence assessment at best for time being π
0
0
3
@cyb3rops @virustotal Updated the rule description on GitHubπ
1
0
2
Have created a YARA rule for the compromised NPM malicious packages based on sample shared by @cyb3rops π§ Ran a quick retro hunt on @virustotal and identified 29 samples (still running) Link to Rule => https://t.co/065t9ItfMi Will Update IOCs Here => https://t.co/bFJt6YKsXP
We tested one of the compromised samples. - 0 detections on VirusTotal - Detected by THOR with three different YARA rules Sample: https://t.co/bwDv4i4zL4
1
23
70
On a non-cyber front, I just did my first 10K running event, the timing is shizzle (1:02:38) but not too bad π§
0
0
2
Just a random yet obvious thought, u cannot analyse APT operations without understanding geopolitical & socioeconomic factors that help link adversary to victimology. I say this because a lot of us are more focused on tactical intel where sometimes we ignore strategic elements π§
3
3
44
Hoping to seeing some of you awesome bunch at @BSidesBournemth tomorrow for C2 tracking and more importantly grabbing some tequila shotsπ§
0
0
0
I literally don't listen to podcasts of any sorts. But this one is super interesting and I am absolutely hooked onto it... If you are in threat intelligence, you do not wanna miss out on this, just too goodπ§
NEW Three Buddy Problem podcast is live! https://t.co/Ha65c7gpcO
2
4
19
Super excited for this one! @knappresearchlb and I are gonna be doing our first ever public workshop in 2 weeks at @BSidesBournemth on C2 hunting & rumor has it that the winner of CTF gets a pretty neat CTI coin Should be a fun one, hoping to meet some of you awesome bunch π§
0
0
8
@DEATHCon2025 I will also be in Edinburgh on 8th & 9th of Nov if anyone wants to link up :) Also, @knappresearchlb will be doing a CTF style workshop on Adversary Infrastructure Hunting (rumor has it that winner gets a sick custom coin) π Tickets are now live at
0
1
3
Super excited to say that I will be doing my first ever solo workshop at @DEATHCon2025. It will be on writing YARA for malware attribution (I know this is a scary word) π§ There are plenty of other cool workshops on all things Detection Engineering & Threat Hunting Mo Deets β¬οΈ
Get excited to learn from @RustyNoob619 in a hands-on workshop at #DEATHCon2025 called "Intel-Driven YARA for Attribution" Learn how to go from intel reports to great YARA rules for #detectionengineering and finding more samples. Check out the workshops:
2
3
19
#RandomThoughts In my opinion, one of the biggest challenges in the modern realm of CTI is retaining conventional intelligence while bolstering workflows using automation, GenAI and other machine learning components which are likely to introduce unknown biases in the process π§
1
0
4
Apologies for the Mandatory Details Entry, call it my bias if you may but it is worth it π
0
0
3
Our team has just released the 2025 CTI Report. The key focus has been on tracking adversary infrastructure and is packed with our threat research insights alongside an in-depth view into the changing information stealers & ransomware ecosystems π§ Link:
bridewell.com
1
24
98
Saturday morning and I'm bit bored so why don't I look for #Phishing #CryptoScam websites for the #lol π€£π€ͺusing free tools? 1β£ πΈ@urlscanio (I don't have pro plan). Searching possible websites 2β£πΈAt the first glance one suspect web found 3β£235 similar websites found
1
5
23