Bohan Zhang
@bohansec
Followers
2K
Following
12K
Media
115
Statuses
4K
Threat Intelligence Analyst @esthreat ๐๐| Blue Teamer
Joined August 2014
Today marks my first day to work as a SOC analyst. Perhaps one thing I have learned over the years is to be persistent, never stop grinding, and chasing down your dream. Here is my timeline for me to achieve my dream.
12
12
163
I love reporting the same malware, day after day. Week after week. This is why I built the Cert Graveyard. I can look back and see the other 30 times I've reported the same exact malware. It also helps build detections. Easy to find and compare samples.
"Taiyuan Chenyun Trading Co., Ltd." (Certum given cert) signed "Screenshot2025122068698m.pif" sample: 14d374ea0604f70e6f39306efd948e7962fdd21cdb3e187ba461312027ebd3f5 ๐คทโโ๏ธ
0
7
21
Researchers have found two new vulnerabilities in React Server Components while attempting to exploit the patches last week. These are new issues, separate from the critical CVE last week. The patch for React2Shell remains effective for the Remote Code Execution exploit.
383
1K
6K
Ransomware groups stopped fighting your EDRโฆ they are just logging into your hypervisor ๐
A single hypervisor breach can put hundreds of virtual machines at risk. Weโve seen Akira and others shift to ESXi/Hyper-V for mass impact. โ
They use legit tools (like openssl) โ
Bypass EDR โ
Encrypt VMDKs directly ๐ @RussianPanda9xx @Purp1eW0lf
https://t.co/nWxBC2Tb65
4
29
172
TRU is tracking active exploitation of #React2Shell and released an advisory with observables/indicators. Observed activity includes system reconnaissance and attempts to exfiltrate AWS credentials. https://t.co/zpcQfKNiKE
1
2
47
With all the talk about the Next.js PoC, many people missed that the React2Shell vulnerability (CVE-2025-55182) affects the underlying RSC implementation itself. This means other popular frameworks that rely on RSC are also vulnerable. We are still analyzing the impact and ease
6
57
369
This pretty much sums up the situation: an in-memory (!) JavaScript-based (!) webshell gets implanted into a vulnerable React server with a single(!) POST request and leaves zero(!) trace in logs or on disk. Someone used that POC, successfully injected the shell and still
Itโs wild how little sticks around when someone hits a server with the #React RCE payload. All the interesting parts of the POST request live for a moment in memory, get decoded, executed (or rejected), and vanish. Nothing hits a log, nothing lands on disk. You can scan process
13
128
987
Announcing the rebrand of TRACLabs โ LummaLabs. This is where I'll be publishing my personal research. And as promised, at 200 followers, new blog is live. Took more than 24 hours but I have a job, ok, leave me alone ๐ญ Weyhro C2: because ransomware wasn't paying the bills
lumma-labs.com
Acknowledgment: Thank you @whoamix302 for sharing the sample!
7
27
136
There is critical vulnerability in React Server Components disclosed as CVE-2025-55182 that impacts React 19 and frameworks that use it. A fix has been published in React versions 19.0.1, 19.1.2, and 19.2.1. We recommend upgrading immediately. https://t.co/kue7kd0XEX
react.dev
The library for web and native user interfaces
153
1K
4K
๐ฉ 7-Zip RCE Vulnerability Exploited in the Wild https://t.co/xww051lZKn Security researchers are warning that a remote-code-execution flaw (CVE-2025-11001) in 7-Zip is now being actively exploited. The bug stems from incorrect processing of symbolic links inside ZIP
cybersecuritynews.com
Hackers have begun actively exploiting a critical remote code execution (RCE) vulnerability in the popular file archiver 7-Zip, putting millions of users at risk of malware infection and system...
5
87
265
Featuring one of the most cool interviews with a MacOS infostealer developer, because โmacOS is the safest system and has no viruses.โ Collaboration with @osint_barbie ๐๐คฉ No more spoilers today, read now a interview with Phexia: https://t.co/3GFnN3n4Jg
g0njxa.medium.com
To completely understand whatโs going on in a market that has been growing in the last years I found mandatory to know which players areโฆ
3
18
80
Everyone talks about ransomware. Almost nobody talks TO ransomware operators, so I did the job for you. [turn the subtitles on] https://t.co/O8I4pgoEkx
22
48
269
WTF, wow, @washi_dev and @elektrokilldev are cooking ๐๐๐๐๐ Lot of improvements in #dnSpyEx #dnSpy. The newly added feature showing searchable string references in module is insane good and cool ๐๐ช Its soooo cooool ๐ #dotnet #reversing
https://t.co/cr3O3f9IZc
5
25
123
๐ฆ๐น New Video: Modifying @vinopaljiri's string decrypter for a ConfuserEx2 variant โก๏ธ Defeating antis with Harmony hooks โก๏ธ AsmResolver โก๏ธ .NET string deobfuscation #MalwareAnalysisForHedgehogs
https://t.co/G1mOunwcEq
2
36
98
If youโre trying to use Wazuh for threat hunting or incident response, stop wasting your time. Wazuh is fine for compliance and system visibility, but thatโs where it ends. If you want to actually see whatโs happening on an endpoint and run proper investigations to play around
8
21
243
Scattered Spider / SLSH just launched a new Telegram channel โ and the activity shows a clear escalation in both tone and targeting. Early observations from the new channel: โขTheyโre bragging about 300+ victims individually, claiming higher earnings than Qilin & Cl0p combined.
12
42
238
๐ ๐ง๐ต๐ฒ ๐๐๐ฅ ๐๐ผ๐บ๐ฝ๐ฎ๐ฟ๐ถ๐๐ผ๐ป ๐ฆ๐ฒ๐ฟ๐๐ถ๐ฐ๐ฒ ๐ถ๐ ๐ผ๐ณ๐ณ๐ถ๐ฐ๐ถ๐ฎ๐น๐น๐ ๐น๐ถ๐๐ฒ! This is the evolution of the EDR Telemetry Project, expanding everything people valued there into a full, feature-level comparison across multiple EDR products. What it delivers: โข
edr-comparison.com
Make informed security decisions with expert EDR comparisons. Compare endpoint detection and response solutions with detailed feature analysis and side-by-side comparisons.
15
72
345