WorldWatch_OCD Profile Banner
World Watch (OCD) Profile
World Watch (OCD)

@WorldWatch_OCD

Followers
92
Following
139
Media
1
Statuses
45

World Watch CTI team from @CERTcyberdef (@OrangeCyberDef)

World
Joined March 2021
Don't wanna be here? Send us removal request.
@CERTCyberdef
CERT Orange Cyberdefense
27 days
🧀🎣Since early September 2025, the Orange Cyberdefense CSIRT and CyberSOC teams have detected phishing campaigns impersonating Meta, AppSheet and PayPal, leading to malware delivery. Our team tracks this activity under the alias "Metappenzeller" #CTI #ThreatIntel #Metappenzeller
1
10
10
@WorldWatch_OCD
World Watch (OCD)
4 months
The new version has removed these notable behaviours and is seen in campaign with fake invoice lures. New indicators of compromise (IoCs) are available on our GitHub: https://t.co/8vig1nADhD
github.com
IOCs for World Watch investigations. Contribute to cert-orangecyberdefense/cti development by creating an account on GitHub.
0
0
1
@WorldWatch_OCD
World Watch (OCD)
4 months
The associated infrastructure could be tracked thanks to specific patterns and campaign IDs in the C2 URLs. These detection opportunities were presented during the Botconf 2025:
1
0
0
@WorldWatch_OCD
World Watch (OCD)
4 months
⛪🔎Historically, new MintsLoader JS samples were easy to find because the obfuscation strings consistently used text from the book Andrew Melville by William Morison. https://t.co/eL9GkIMf0l
1
0
0
@WorldWatch_OCD
World Watch (OCD)
4 months
🧀 Update on MintsLoader: a thread 🔽 MintsLoader is a JavaScript/PowerShell loader that was first detailed by OCD in 2024. A new version has been around at least since early-June 2025. #cti #ThreatIntel #mintsloader
1
4
9
@Mar_Pich
Mar_Pich
4 months
🆕 Just released a blogpost on a #Sorillus RAT campaign our @CERTCyberdef observed in March. Likely 🇧🇷 threat actors, use of numerous tunneling services like ngrok[.]app, ngrok[.]dev, ngrok[.]pro, localto[.]net, ply[.]gg, campaign still active… ➡️ https://t.co/oHoufcOcfF
1
3
5
@CERTCyberdef
CERT Orange Cyberdefense
6 months
Today Craft announces a RCE vulnerability affecting CMS - known as #CVE-2025-32432. This vulnerability has been reported by Orange Cyberdefense a month ago after our CSIRT investigated a case where two 0-day vulnerabilities have been exploited 1/6 https://t.co/ndHdjHFyYj
1
8
14
@Mar_Pich
Mar_Pich
7 months
Happy to join the 2025-2026 @VirtualRoutes European Cybersecurity Fellowship 🇪🇺☺️
@VirtualRoutes
Virtual Routes
7 months
👋Say hello to the 2025-2026 European Cybersecurity Fellows! 12 months, 15 fellows from 10 countries across Europe, one goal ⏩ To make it count. Learn more about the fellows: https://t.co/vNH2CIo89h
1
0
5
@CERTCyberdef
CERT Orange Cyberdefense
7 months
🔎In recent campaigns, TAs create new #GitHub repositories populated with an AI-generated README and filled with fake backdated commits. We also observed similar distributions via inactive repositories typically forked with a new release containing #SmartLoader ultimately added.
0
1
1
@CERTCyberdef
CERT Orange Cyberdefense
8 months
🆕New version of our #ransomware mapping is out on our GitHub! ➡️ https://t.co/M9vmt1UZzj V28 (!) includes latest newcomers and recent ecosystem evolutions.🔍 As always, feedback is welcome! #cti #threatintel #blackbasta #ransomhub #lockbit
3
135
328
@CERTCyberdef
CERT Orange Cyberdefense
8 months
🧵/ Over the last months, our CyberSOC & CERT teams have been tracking a malicious cluster leveraging #WsgiDAV servers to distribute commodity #RATs, including in Europe🇪🇺. ⛓️Multistage infection chain: LNK>VBS>BAT>Powershell>ZIP>Python We track this activity as Blue Stylthon🧀
2
27
80
@thehellu
Daniel Lunghi
8 months
Orange Cyberdefense saw the same threat and named the ransomware "NailaoLocker". https://t.co/v9JjTfwdm5. They share interesting thoughts on the motivations of the ransomware deployment, although they don't have the final answer. We also saw no financial gain for the threat actor
0
2
7
@CERTCyberdef
CERT Orange Cyberdefense
8 months
🆕We publish today the result of a deep-dive investigation into a malicious campaign leveraging #ShadowPad and #PlugX to distribute a previously-undocumented ransomware, dubbed #NailaoLocker. This campaign targeted 🇪🇺 organizations during S2 2024 and is tied to Chinese TA 🇨🇳. /🧵
1
17
38
@CERTCyberdef
CERT Orange Cyberdefense
9 months
In the realm of #cybersecurity, false positives can often be viewed as mere nuisances.🔬🚩 Yet, a recent incident observed by our CSIRT highlights their potential to trigger significant alarm. Explore the insights shared by CERT! #IncidentResponse 📲 https://t.co/WmjxOejVpl
0
2
5
@CERTCyberdef
CERT Orange Cyberdefense
10 months
New variant of #Emmenhtal loader actively distributed since early December and leading to #Lumma #DarkGate and/or #SectopRAT. 🚩#Emmenhtalv2 adopts new obfuscation features and is currently not well detected by AV solutions. Initial access: fake CAPTCHA, #ClickFix, phishing.
2
8
14
@CERTCyberdef
CERT Orange Cyberdefense
11 months
While monitoring recent #Emmenhtal iterations, we observed a distinct politically-aligned cluster 🇪🇺, strongly differing from usual financially motivated Emmenhtal distribs. This cluster drops another malware we dubbed #Edam Dropper🧀 🔗
Tweet card summary image
github.com
Edam dropper. Contribute to cert-orangecyberdefense/edam development by creating an account on GitHub.
1
11
27
@WorldWatch_OCD
World Watch (OCD)
11 months
📣Shout-out to Piotr Malachiński & @Mar_Pich for this extensive mapping of over +315 state and non-state organizations spanning government, industry, and academia. +400 detailed relationships are now available (including for download), building on OSINT & #CTI literature.
@CERTCyberdef
CERT Orange Cyberdefense
11 months
📍For more than 8 months, our threat researchers from @orangecyberdef have worked on mapping 🇨🇳 China's civil-military–industrial complex when it comes to #cyberespionage operations. ⛯ Consult our newly published deep-dive report and interactive map here: https://t.co/8k9Wod5GQW
0
0
3
@CERTCyberdef
CERT Orange Cyberdefense
1 year
Several weeks ago, our #CERT analysts @Mar_Pich @vhinderer and @_alexb___ investigated a malicious ongoing campaign targeting one of our client and leveraging a little documented multistage #loader we dubbed #MintsLoader🥬🧀. https://t.co/eTiNSFkX8M ⬇️
2
13
20
@Mar_Pich
Mar_Pich
1 year
Biiiig changelog for our #ransomware cartography! 🤠New version (v27) available on our CERT GitHub: https://t.co/l6LgNIgA4s 💡Entities are clickable for our World Watch clients to read more about threat groups and malware strains. #cyberthreatintelligence #cti @orangecyberdef
3
29
108