
Dee
@ViriBack
Followers
9K
Following
6K
Media
669
Statuses
1K
#Malware C2 hunter #infosec passionate. Tweets are my own.
Canada
Joined March 2015
RT @NexusFuzzy: I found a what I think novel approach which allowed me to list some of the content of #Lumma #Infostealer Command & Control….
0
25
0
RT @Fact_Finder03: C2 panel of Mave Stealer. https[://web.]maveproj3ct[.lol/. #MAVESTEALER #PANEL #CTI #STEALER. @g0njxa @500mk500 @ViriBac….
0
4
0
RT @Fact_Finder03: #365Stealer #Panel. http[://51.210.1.239[:8443/365-Stealer/yourVictims/login[.php. @500mk500 @ViriBack .
0
4
0
RT @RacWatchin8872: #Lumma #Malware. New Lumma Panel: hxxps://lummamarkets.fun/. CC:.@banthisguy9349.@NDA0E.@BlinkzSec.@kddx0178318.@raghav….
0
10
0
RT @NullPwner: 🚨 Same Threat Actor is now delivering Windows Payload through the ~2800 compromised sites using ClickFix. It dinamycally cha….
0
9
0
237 ips in the botnet ?
We discovered a Windows bot named "Blitz" currently spread through backdoored game cheats. The bot abuses Hugging Face Spaces for C2 and hosting malicious files. The goal of this malware? Likely dropping #XMRig #coinminer on victim hosts. More info at
1
3
6
RT @PrakkiSathwik: #VektorX Bot Panel. #C2.hxxp://45.91.201.178:5173/auth/login. #Stealerium.hxxp://91.211.249.142:7816/api/bot/v1/register….
0
5
0
RT @NullPwner: 🚨 New Odyssey Stealer C2 Panel. 🎯 hxxp://5.199.166[.]102/login. This is the third C2 spin-up in a matter of days. Favicon:….
0
5
0
RT @Shadowserver: Attention! We are sharing SAP NetWeaver instances vulnerable to CVE-2025-31324 unauth upload (CVSS 10.0). 454 IPs found v….
0
30
0