crep1x Profile Banner
crep1x Profile
crep1x

@crep1x

Followers
3K
Following
1K
Media
170
Statuses
737

Lead cybercrime analyst, tracking adversaries activities & infrastructure, at @sekoia_io

Joined July 2012
Don't wanna be here? Send us removal request.
@crep1x
crep1x
24 days
RT @sekoia_io: These sheets aim to assist SOC analysts in detecting and investigating #AitM #phishing compromises by offering context, tech….
0
6
0
@crep1x
crep1x
24 days
RT @sekoia_io: A few weeks ago, we published our global analysis of Adversary-in-the-Middle #phishing threats, providing actionable intelli….
0
22
0
@crep1x
crep1x
2 months
As usual, your feedback is greatly appreciated. Enjoy the read and happy hunting!.
Tweet card summary image
blog.sekoia.io
Explore the 2025 landscape of Adversary-in-the-Middle phishing threats with data, trends, and top detection insights.
1
1
6
@crep1x
crep1x
2 months
This comprehensive report gives analysts actionable intelligence on AitM phishing attacks. It reflects months of work monitoring AitM phishing campaigns, analysing a dozen of kit, tracking their infrastructures, and infiltrating the surrounding ecosystem.
1
1
3
@crep1x
crep1x
2 months
We are excited to share our latest blogpost on AitM phishing threats - covering common TTPs, the PhaaS ecosystem, the most widespread kits, and multiple detection opportunities!. w/ @gregclermont.
@sekoia_io
Sekoia.io
2 months
📝 Our latest #TDR report delivers an in-depth analysis of Adversary-in-the-Middle (#AitM) #phishing threats - targeting Microsoft 365 and Google accounts - and their ecosystem. This report shares actionable intelligence to help analysts detect and investigate AitM phishing.
Tweet media one
1
10
47
@crep1x
crep1x
2 months
RT @sekoia_io: We hope SOC, CERT and CTI teams find our global analysis of AitM phishing threats both insightful and actionable. Dive in h….
Tweet card summary image
blog.sekoia.io
Explore the 2025 landscape of Adversary-in-the-Middle phishing threats with data, trends, and top detection insights.
0
4
0
@crep1x
crep1x
2 months
RT @sekoia_io: 📝 Our latest #TDR report delivers an in-depth analysis of Adversary-in-the-Middle (#AitM) #phishing threats - targeting Micr….
0
28
0
@crep1x
crep1x
2 months
RT @sekoia_io: 🪤 Sekoia #TDR's new exclusive research uncovers the #ViciousTrap, a honeypot network deployed on compromised edge devices.….
Tweet card summary image
blog.sekoia.io
Discover ViciousTrap, a newly identified threat who turning edge devices into honeypots en masse targeting
0
5
0
@crep1x
crep1x
2 months
RT @felixaime: Excited to see this paper finally published! Meet #ViciousTrap, a threat actor compromising and turning edge devices into ho….
Tweet card summary image
blog.sekoia.io
Discover ViciousTrap, a newly identified threat who turning edge devices into honeypots en masse targeting
0
10
0
@crep1x
crep1x
3 months
RT @sekoia_io: Our new report describes one of the latest observed infection chains (delivering #AsyncRAT) relying on the #Cloudflare tunne….
0
14
0
@crep1x
crep1x
4 months
As usual, we share multiple IoCs and YARA rules in our blog post and on our community GitHub:
0
1
6
@crep1x
crep1x
4 months
By the way, @MsftSecIntel published an analysis yesterday on the same infection chain leveraging new PowerShell loader/backdoor (without associating it with Interlock?) ⬇️.
Tweet card summary image
microsoft.com
Since October 2024, Microsoft Defender Experts has observed and helped multiple customers address campaigns leveraging Node.js to deliver malware and other payloads that ultimately lead to informat...
1
1
5
@crep1x
crep1x
4 months
Check out our new blog post by the TDR team, presenting the latest TTPs used by the #Interlock ransomware group!. It includes their use of the ClickFix tactic, PyInstaller, Node.js, Cloudflare Tunnels, and new PowerShell loader/backdoor ⬇️. ✍️ @KSeznec.
@sekoia_io
Sekoia.io
4 months
Since the apparition of the #Interlock ransomware, the Sekoia #TDR team observed its operators evolving, improving their toolset (#LummaStealer #BerserkStealer), and leveraging new techniques such as #ClickFix to deploy the ransomware payload.
Tweet media one
3
8
25
@crep1x
crep1x
4 months
RT @sekoia_io: Since the apparition of the #Interlock ransomware, the Sekoia #TDR team observed its operators evolving, improving their too….
0
16
0
@crep1x
crep1x
4 months
Current decoy pages used since 18 March, changing every 3/4 weeks since the beginning of 2025:.
0
0
4
@crep1x
crep1x
4 months
Tycoon 2FA (a prominent AitM phishing kit), targeting Microsoft and Google accounts, uses a new CAPTCHA page instead of the custom Cloudflare Turnstile page. e.g. hxxps://ymi.bvyunz.]ru/3v4jfQ-cUo/.hxxps://xau.kolivax.]ru/ckYHFJN/.hxxps://ffqt.lzirleg.]es/VajlR/. ⬇️
Tweet media one
1
11
39
@crep1x
crep1x
4 months
CTI tip: monitor transactions from the Ethereum address 0x53fd54f55C93f9BCCA471cD0CcbaBC3Acbd3E4AA to identify new PowerShell commands distributed by ClearFake - and block/detect any traffic to malicious domains!. As usual, feedback is greatly appreciated!.
0
1
1
@crep1x
crep1x
4 months
Here is our in-depth analysis of the latest #ClearFake variant using the Binance Smart Chain and two new ClickFix lures. ClearFake is injected into thousands of compromised sites to distribute the #Emmental Loader, #Lumma, #Rhadamanthys, and #Vidar. ⬇️.
@sekoia_io
Sekoia.io
4 months
TDR analysts published an analysis of the new #ClearFake variant that relies on compromised websites injected with the malicious JavaScript framework, the #EtherHiding technique, and the #ClickFix social engineering tactic.
Tweet media one
1
4
24
@crep1x
crep1x
4 months
RT @sekoia_io: TDR analysts published an analysis of the new #ClearFake variant that relies on compromised websites injected with the malic….
0
32
0
@crep1x
crep1x
4 months
RT @virusbtn: Sekoia's TDR reseachers provide a technical analysis of ClearFake’s recent variant, focusing primarily on the interactions wi….
0
37
0