ViriBack Profile Banner
Dee Profile
Dee

@ViriBack

Followers
9K
Following
6K
Media
669
Statuses
1K

#Malware C2 hunter #infosec passionate. Tweets are my own.

Canada
Joined March 2015
Don't wanna be here? Send us removal request.
@ViriBack
Dee
2 years
Over the 10k #malware C2 panels on
Tweet media one
4
16
68
@ViriBack
Dee
16 days
RT @censysio: 🔍We looked at the C2 server associated with the #Flodrix #botnet and used an internet-exposed RPC service to uncover a world-….
0
13
0
@ViriBack
Dee
18 days
RT @NexusFuzzy: I found a what I think novel approach which allowed me to list some of the content of #Lumma #Infostealer Command & Control….
0
25
0
@ViriBack
Dee
19 days
RT @Fact_Finder03: C2 panel of Mave Stealer. https[://web.]maveproj3ct[.lol/. #MAVESTEALER #PANEL #CTI #STEALER. @g0njxa @500mk500 @ViriBac….
0
4
0
@ViriBack
Dee
24 days
RT @1ZRR4H: 🚩 Website impersonating AnyDesk on anydeske[.]icu, downloads a .NET loader which then launches a stealer, both unknown to me 🤔….
0
36
0
@ViriBack
Dee
24 days
Tweet media one
0
3
0
@ViriBack
Dee
1 month
RT @Fact_Finder03: #365Stealer #Panel. http[://51.210.1.239[:8443/365-Stealer/yourVictims/login[.php. @500mk500 @ViriBack .
0
4
0
@ViriBack
Dee
1 month
What in the AdapatixC2 this is ? ;)
Tweet media one
1
2
14
@ViriBack
Dee
1 month
url: 85.234.100[.]245/C2WebServer/login/html/. Title: Login Botnet Server
Tweet media one
Tweet media two
3
2
28
@ViriBack
Dee
2 months
RT @g0njxa: After the announcement of seizure of some of the Lumma Stealer panel domains, new ones were opened shortly in the following hou….
0
8
0
@ViriBack
Dee
2 months
RT @RacWatchin8872: #Lumma #Malware. New Lumma Panel: hxxps://lummamarkets.fun/. CC:.@banthisguy9349.@NDA0E.@BlinkzSec.@kddx0178318.@raghav….
0
10
0
@ViriBack
Dee
2 months
RT @solostalking: Katz Stealer .https[://katz-stealer[.com/login. @ViriBack @500mk500
Tweet media one
0
5
0
@ViriBack
Dee
2 months
RT @solostalking: Stealer 4.11 wtf.193[.124.117.178[:8080. @500mk500 @ViriBack
Tweet media one
0
2
0
@ViriBack
Dee
2 months
RT @solostalking: MaranhĂŁo Stealer !. @500mk500 @ViriBack
Tweet media one
0
1
0
@ViriBack
Dee
2 months
RT @NullPwner: 🚨 Same Threat Actor is now delivering Windows Payload through the ~2800 compromised sites using ClickFix. It dinamycally cha….
0
9
0
@ViriBack
Dee
2 months
237 ips in the botnet ?
Tweet media one
@Unit42_Intel
Unit 42
2 months
We discovered a Windows bot named "Blitz" currently spread through backdoored game cheats. The bot abuses Hugging Face Spaces for C2 and hosting malicious files. The goal of this malware? Likely dropping #XMRig #coinminer on victim hosts. More info at
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
3
6
@ViriBack
Dee
2 months
RT @PrakkiSathwik: #VektorX Bot Panel. #C2.hxxp://45.91.201.178:5173/auth/login. #Stealerium.hxxp://91.211.249.142:7816/api/bot/v1/register….
0
5
0
@ViriBack
Dee
2 months
RT @NullPwner: 🚨 New Odyssey Stealer C2 Panel. 🎯 hxxp://5.199.166[.]102/login. This is the third C2 spin-up in a matter of days. Favicon:….
0
5
0
@ViriBack
Dee
2 months
RT @Shadowserver: Attention! We are sharing SAP NetWeaver instances vulnerable to CVE-2025-31324 unauth upload (CVSS 10.0). 454 IPs found v….
0
30
0