cyb3rops Profile Banner
Florian Roth ⚡️ Profile
Florian Roth ⚡️

@cyb3rops

Followers
211K
Following
174K
Media
6K
Statuses
36K

Head of Research @nextronsystems #DFIR #YARA #Sigma | detection engineer | creator of @thor_scanner, Aurora, Sigma, LOKI, YARA-Forge | always busy ⌚️🐇 | vi/vim

Frankfurt, Germany
Joined June 2013
Don't wanna be here? Send us removal request.
@cyb3rops
Florian Roth ⚡️
5 years
I've decided to put a screenshot showing the hex editor view of a Turla Kazuar sample behind acrylic glass on my desk to always remind me, why I am doing all this ... because I 💛 to be a pain in the neck of the bad guys https://t.co/LnoC5rwkWV
@cyb3rops
Florian Roth ⚡️
6 years
It seems that I have some fans over in Russia 🐻 #TurlaLicksAss thx to the FireEye analyst who brought this to my attention https://t.co/8qsaFLT8HL
183
311
2K
@ItsReallyNick
Nick Carr
6 years
My award for the best guardrails in an APT group's close access operation: https://t.co/rQoipMxUzD 👀 enjoy! Installs a hard-coded attacker-controlled wireless access point to a victim with a specific TP-LINK USB WiFi adapter 📶 Wonder if they got the USB stick at a conference 🔥
2
9
34
@cyb3rops
Florian Roth ⚡️
3 hours
They can run, but they can’t hide
@jamieantisocial
J⩜⃝mie Williams
1 day
ᴍᴀʟᴡᴀʀᴇ ɪɴ ᴛʜᴇ ꜱᴜʙᴛɪᴛʟᴇꜱ.
1
3
34
@irsdl
Soroush Dalili
1 day
Slides for "ToolShell Patch Bypass and the AI That Might Have Seen It Coming" at @NDC_Conferences {Manchester} 2025. https://t.co/SDMTE43kDS Bonus: WAF & workarounds bypass! #AppSec #SharePoint #TolShell
2
50
181
@RussianPanda9xx
RussianPanda 🐼 🇺🇦
11 hours
I beg you, please stop adding IPs for Telegram and other legitimate platforms to your blogs in the IOC section, it leads to this kind of noise in VT comments and pollutes threat intel feeds.
5
13
100
@wearetlpblack
TLPBLACK
3 days
Our latest blog post is up! https://t.co/n6UEOlj46M C2 IP Addresses (for hashes check our post): 39.97.229[.]220 43.247.134[.]215 45.76.155[.]14 45.157.233[.]80 46.36.37[.]85 47.84.113[.]198 192.9.245[.]121 193.34.213[.]150
tlpblack.net
Analysis of React Server Components RCE vulnerability (CVE-2025-55182) exploitation leading to cryptojacking campaigns targeting Next.JS applications
2
24
56
@SpecterOps
SpecterOps
2 days
Wanting more from today's #BHEU talk on SCOM? Check out this two part blog series! 1️⃣ @unsigned_sh0rt maps SCOM’s roles, accounts, & trust boundaries, then shows how attackers can chain insecure defaults into full management group compromise. https://t.co/Ai4TqTtc4O 🧵: 1/2
Tweet card summary image
specterops.io
TL:DR; SCOM suffers from similar insecure default configurations as its SCCM counterpart, enabling attackers to escalate privileges, harvest credentials, and ultimately compromise the entire manage...
1
43
107
@NathanMcNulty
Nathan McNulty
2 days
Be extra boss - go passwordless ;) Hello for Business and Platform SSO are pretty easy to configure, and even passkeys on mobile aren't too bad You don't have to move everyone all at one time - start a pilot, migrate in phases, start reducing password use as soon as possible :)
@techspence
spencer
2 days
My goto recommendations for protecting against weak passwords: - lithnet ad password protection - specops password policy Of course there is also Entra Password Protection. Regardless, following some foundational rules does make a difference. Strong password policies. Enforce
5
10
107
@premium
Premium
4 months
Enjoy the best experience on X.
0
754
8K
@blackorbird
blackorbird
2 days
Cracking ValleyRAT(SilverFox): From Builder Secrets to Kernel Rootkits Targeted Deletion of EDR/AV Drivers https://t.co/8hPrQofTa6 winos4.0 source code ref: https://t.co/lZMelJ0b6g https://t.co/1aOPuNI7S8
1
23
84
@cyb3rops
Florian Roth ⚡️
2 days
So the state rolls out heavy-handed age-gating and erosion of privacy rights… because some parents never figured out Google Family Link or Apple’s Screentime. There are entire ecosystems of parental-control tools that already do the job. Instead we get face or national ID checks
9
9
56
@BushidoToken
Will
2 days
Google’s new Infographic generator is pretty damn good, I asked it to make this diagram based on all DOJ & OFAC public reports on 🇰🇵 DPRK IT worker schemes. I checked its workings and it all checks out as far as I can tell.
3
26
218
@rapid7
Rapid7
3 days
🚨 Earlier this year, Rapid7 researchers discovered a stored cross-site scripting (XSS) vuln. in #Ivanti Endpoint Manager (EPM) – affecting versions 2024 SU4 and below. Now patched, CVE-2025-10573 has been assigned a CVSS score of 9.6. More in our blog: https://t.co/FtdADlLLee
2
22
58
@cyb3rops
Florian Roth ⚡️
3 days
We live in weird times where someone pops thousands of systems in hundreds of orgs just to drop a crypto miner that makes maybe $2 a day In a way we should almost thank them. Their stuff is noisy as fuck and makes people aware of exploitable services before something more
12
14
221
@1ZRR4H
Germán Fernández
3 days
This is out of control 🤦‍♂️
1
15
173
@ICEgov
U.S. Immigration and Customs Enforcement
4 months
Need a job? Join ICE today. ICE offers competitive salaries & benefits like health insurance and retirement plans.
12K
21K
123K
@nas_bench
Nasreddine Bencherchali
4 days
I have spent some time this past day to investigate NodeJS source code and how a typical process tree from a react/next.js app will look like. If you are building detections for React2Shell give this a read. as it'll help you identify the right strings to use to filter down FPs
3
27
127
@cyb3rops
Florian Roth ⚡️
3 days
Generic detection rules FTW 🙌 The post-exploitation activity @wiz_io showed yesterday makes these scripts light up like a Christmas tree🎄: bash reverse shells, crypto miner indicators, history resets, wget/curl from http to bare IPs, base64 decoding, etc If you keep your
4
46
193
@cyb3rops
Florian Roth ⚡️
4 days
You'll probably hear the term #memshell more often. It is used for shells (web shells) that get implanted into memory. the most common ones used in the exploitation of #React2shell register two API endpoints that respond to a cmd=xxx command /exec /nodesync example:
1
15
127
@1ZRR4H
Germán Fernández
4 days
🔴 Watch out, someone is "patching" (?) servers vulnerable to #React2Shell and leaving a warning message about CVE-2025-55182 in English, Chinese, Japanese, and Spanish. According to Censys, 314 servers had/have this condition at this very moment. The vast majority of domains
1
68
459
@SolanaInstitute
Solana Policy Institute
1 day
The Solana Era is here—fast, open, unstoppable. But smart policy makes it thrive. Dive into SPI's work to empower builders & investors. Visit us in the Policy Hub at Breakpoint Dec 11-13
0
3
19
@AmitaiCo
Amitai Cohen 🎗️🤟
4 days
Here's our new blogpost with a technical deepdive into exploitation we're observing in the wild of CVE-2025-55182 (aka react2shell): https://t.co/jBvMgTqjEO
3
42
99
@BushidoToken
Will
5 days
It’s always bemused me how after years of CTI sharing, we’ve still not standardised intel sharing on IP addresses… Funnily enough, Salesforce actually did the best job here IMO versus two veteran cybersecurity vendors CrowdStrike & ESET
6
22
129
@Shadowserver
The Shadowserver Foundation
5 days
Like others we are seeing attacks attempting to exploit React CVE-2025-55182 at scale, incl. botnet related activity. How successful have these attacks been? You can get a view here, where we track compromised host with Next.js attacking our sensors: https://t.co/5HLkkIHMlg
1
19
39