
Leonid Bezvershenko
@bzvr_
Followers
3K
Following
222
Media
39
Statuses
98
Security Researcher @ Kaspersky, GReAT | Drovosec CTF team | Tweets are my own
Joined September 2021
Beware of links from popular YouTube videos, as they may contain #malware. We found such a video (64K views, 180K subscribers) that has a link to a Tor Browser installer in the description. That installer comes with a previously unknown spyware that we dubbed #OnionPoison. [1/4]
7
90
212
Magic is here! We have discovered a previously unknown #APT that has been attacking organizations in the area affected by the conflict between Russia and Ukraine. Observed victims were compromised with previously unknown implants that we dubbed #PowerMagic and #CommonMagic. [1/4]
4
78
204
Ever wanted to take another look at #OperationTriangulation malware? Then check out VirusTotal - we have uploaded malicious modules used in this campaign.
5
75
183
Have you wanted to take your own look at the #iOSTriangulation spyware? Well, we uploaded the #TriangleDB implant to VirusTotal:
4
35
107
It's interesting that the server sends the second stage implant only if the victim's IP is from #China, so the campaign targets only Chinese-speaking users. Features of the spyware include collecting system information, stealing browser history and executing shell commands. [3/4]
1
3
19
Victims compromised with #PowerMagic have been additionally infected with the #CommonMagic modular framework. It uses OneDrive to download malicious modules and upload their execution results. We identified two modules: a screenshot taker and a USB file stealer. [3/4]
1
5
10
Observed victims downloaded a malicious ZIP archive with a lure document and a malicious LNK file that deploys the PowerShell #PowerMagic backdoor. It uses cloud storages such as OneDrive or Dropbox to receive PowerShell commands and execute them. [2/4]
1
4
9
Check out our blogpost made by @2igosha and I about these 2 malicious PyPi packages:.
We have just discovered two malicious PyPi packages masquerading as HTTP libraries: ‘ultrarequests’ and ‘pyquest’. The description of these packages is taken from the ‘requests’ package. The malicious code is in the class ‘HTTPError’ (‘exceptions[.]py’ file) [1/3]
0
7
5
Check out our latest research!.
Magic's here again! We previously reported about #CommonMagic (#RedStinger), a campaign operating in the Russo-Ukranian conflict area. It turned out that the likely threat actor behind this it has a 15-year history. More info: [1/4].@bzvr_ @2igosha.
0
1
3
The biggest and boldest conference is making a triumphant return… join us at #thesas2023 CFP is open:
0
1
2
@lorenzofb We thought the same thing: the campaign targets users who have VPN access and are trying to find on YouTube how to download Tor.
1
0
2