SaurabhSha15 Profile Banner
Saurabh Sharma Profile
Saurabh Sharma

@SaurabhSha15

Followers
331
Following
244
Media
10
Statuses
256

Threat Researcher & Reverse Engineer & Good To Be GReAT.

India
Joined August 2016
Don't wanna be here? Send us removal request.
@SaurabhSha15
Saurabh Sharma
2 months
RT @bzvr_: 🚨 Less than 10 days until the SAS CTF 2025 Quals kick off! 🚨. Register your team now and claim the spot in the top 8 to compete….
0
14
0
@SaurabhSha15
Saurabh Sharma
3 months
RT @oct0xor: We (me + @2igosha) have discovered a new Google Chrome 0-day that is being used in targeted attacks to deliver sophisticated s….
0
101
0
@SaurabhSha15
Saurabh Sharma
4 months
RT @bzvr_: ⚡ We discovered a malicious campaign distributing a #SilentCryptoMiner disguised as a restriction bypass tool. Attackers, who po….
0
27
0
@SaurabhSha15
Saurabh Sharma
6 months
3.We also explore potential connections of the EAGERBEE backdoor with the CoughingDown threat group.
0
1
2
@SaurabhSha15
Saurabh Sharma
6 months
1. We uncovered a novel service injector designed to inject the backdoor into a running service. 2. Additionally, we discovered previously undocumented components (plugins) deployed after the backdoor’s installation to enabled a range of malicious activities.
1
1
2
@SaurabhSha15
Saurabh Sharma
6 months
EAGERBEE backdoor has been used in targeted attacks in APAC region. We (myself and @vaber_b) released a blog post about its recent activity in Middle East region, where it was being deployed at ISP and governmental entities in Middle East.
1
9
27
@SaurabhSha15
Saurabh Sharma
7 months
RT @hypen1117: My first #Lazarus report at #Kaspersky is out ! The newly discovered #CookiePlus is a plugin-based malware that has the abil….
0
70
0
@SaurabhSha15
Saurabh Sharma
8 months
RT @bzvr_: 🚨 We discovered two malicious Python packages in #PyPI repository that remained undetected for over a year. These packages mimi….
0
278
0
@SaurabhSha15
Saurabh Sharma
8 months
Special thanks to colleagues @vaber_b and @NoushinShbb for their help.
0
0
3
@SaurabhSha15
Saurabh Sharma
8 months
As per our visibility, the group has initiated limited yet targeted campaigns using QSC framework and focusing specifically on the telecommunication sector.
1
0
0
@SaurabhSha15
Saurabh Sharma
8 months
Published blogpost about CloudComputating group using newly identified QSC framework to carry out cyber espionage activities. Blog link -.#APT #CloudComputating #BackdoorDiplomacy #FakingDragon.
1
5
7
@SaurabhSha15
Saurabh Sharma
1 year
0
1
0
@SaurabhSha15
Saurabh Sharma
2 years
RT @k_sec: Sandman, Dreamland. for more on this APT, see our March 2023 private reporting "Researcher Notes - The DreamLand: new malware u….
0
4
0
@SaurabhSha15
Saurabh Sharma
2 years
RT @TheSAScon: 📱🔍 Unraveling the mysteries of "Operation Triangulation" has been a journey. Ready to discover what we've unearthed?.Pack yo….
0
5
0
@SaurabhSha15
Saurabh Sharma
2 years
RT @sh1shk0va: Great news: you have a chance to win FREE access to Suricata for Incident Response and Threat Hunting online training! Join….
0
20
0
@SaurabhSha15
Saurabh Sharma
2 years
RT @e_kaspersky: We are delighted to announce a partnership with the Indian Institute of Technology Bombay!. We will join forces to advance….
0
5
0
@SaurabhSha15
Saurabh Sharma
2 years
RT @kucher1n: Our next blogpost on #iOSTriangulation ( is finally out. Today we are ready to share details about th….
0
115
0
@SaurabhSha15
Saurabh Sharma
2 years
RT @TheSAScon: âś… CFP.âś… Trainings. #TheSAS2023 loading.
0
10
0
@SaurabhSha15
Saurabh Sharma
2 years
RT @2igosha: We have discovered a previously unknown APT campaign targeting iOS devices #APT #Kaspersky #Operation….
0
8
0
@SaurabhSha15
Saurabh Sharma
2 years
RT @TheSAScon: #TheSAS2023 return loading.
Tweet media one
0
31
0