ffforward Profile Banner
Tommy M (TheAnalyst) Profile
Tommy M (TheAnalyst)

@ffforward

Followers
14K
Following
6K
Media
1K
Statuses
4K

Threat Researcher @proofpoint | @Cryptolaemus1

Joined May 2010
Don't wanna be here? Send us removal request.
@ffforward
Tommy M (TheAnalyst)
3 years
So I have started a new job this week, as a Threat Researcher for @proofpoint. Can you imagine working with such an awesome team that finds and shares stuff like this? 🙌👏🥳.
@threatinsight
Threat Insight
3 years
Proofpoint has identified a compromised private military email account delivering #SunSeed Lua malware. Threat research related to this activity is detailed in this blog.
32
12
241
@ffforward
Tommy M (TheAnalyst)
2 months
RT @threatinsight: New e-crime insights: TA4557, known for distributing More_eggs malware, notably expanded to an int'l audience in recent….
0
26
0
@ffforward
Tommy M (TheAnalyst)
4 months
RT @threatinsight: Proofpoint also recently observed this activity delivering #GootLoader. Google Ads for a fake document creation app (law….
0
6
0
@ffforward
Tommy M (TheAnalyst)
7 months
PDF > URL > Filtering > #ClickFix > HTA > #DOILoader /#IDATLoader > #Lumma > #NetSupport. Example PDFs: Payload URLs: All stages: Calling this #ItalianPasta b/c staging domain text for @JAMESWT_MHT 🇮🇹🍝 🤣
Tweet media one
1
18
43
@ffforward
Tommy M (TheAnalyst)
8 months
Also saw sftp.exe in a similar chain which also support ProxyCommand= which isn't in the #lolbas project. This #Emmenhtal/#PEAKLIGHT style chain did instead lead to #SectopRAT.
Tweet media one
@malmoeb
Stephan Berger
8 months
My colleague @P3rpl3xX25 and I investigated an interesting infection chain where a user downloaded an LNK file first (via the rundll32.exe WebDAV method [1]). The LNK file will run ssh.exe (C:\Windows\System32\OpenSSH\ssh.exe) with the following parameter: . "-o ProxyCommand=
Tweet media one
0
3
15
@ffforward
Tommy M (TheAnalyst)
8 months
RT @threatinsight: Proofpoint has tracked this technique since August 2024, and call it “brooxml”. Our researchers do not consider this a z….
0
65
0
@ffforward
Tommy M (TheAnalyst)
9 months
RT @threatinsight: Proofpoint researchers have identified an increase in the #socialengineering technique called #ClickFix. The technique….
0
15
0
@ffforward
Tommy M (TheAnalyst)
10 months
RT @threatinsight: Threat actors are impersonating the British postal carrier Royal Mail in an attempt to deliver Prince #ransomware. In t….
0
8
0
@ffforward
Tommy M (TheAnalyst)
10 months
New security brief out by me and @selenalarson and the rest of the @proofpoint @threatinsight team. This is a really interesting chain leading to the use of open-source Prince Ransomware used as first stage malware, likely meant to be a destructive attack.
Tweet card summary image
proofpoint.com
What happened  Proofpoint researchers identified a campaign impersonating the British postal carrier Royal Mail delivering Prince ransomware. Prince is a ransomware variant freely
1
4
15
@ffforward
Tommy M (TheAnalyst)
11 months
RT @virusbtn: Proofpoint researchers Tommy Madjar (@ffforward), Pim Trouerbach (@Myrtus0x0) & Selena Larson (@selenalarson) look into a sus….
0
12
0
@ffforward
Tommy M (TheAnalyst)
11 months
RT @greglesnewich: When the ecrime gang finds something… else . If you like weird infection chains, WebDAV, Python, custom backdoors with n….
0
32
0
@ffforward
Tommy M (TheAnalyst)
11 months
New blog dropped on #Voldemort. Very intense chain and as usual fantastic to work with such talents as @selenalarson and @Myrtus0x0 and the rest of the team. Always fantastic support from @ET_Labs and let's not forget our awesome detection team with @kk_onstantin killing this 💪.
@threatinsight
Threat Insight
11 months
Researchers from @Proofpoint uncovered an unusual campaign that attempts to deliver custom #malware dubbed #Voldemort. The name was chosen by the threat actor, who may be an advanced persistent threat (APT) with intelligence gathering objectives. Blog:
2
5
39
@ffforward
Tommy M (TheAnalyst)
1 year
RT @threatinsight: Proofpoint researchers have identified an increase in the number of campaigns delivering ScreenConnect. It’s a legitima….
0
8
0
@ffforward
Tommy M (TheAnalyst)
1 year
Note that this might have been a false flag. Around June 27 midnight UTC the #ClickFix #FakeUpdate cluster changed to a new inject with a new smart contract currently leading to s:/daslkjfhi2[.]shop/page. These guys really like thor console messages 😅
Tweet media one
Tweet media two
@ffforward
Tommy M (TheAnalyst)
1 year
In a surprising move, the BSC smart contract 0xdf20921ea432318dd5906132edbc0c20353f72d6 used in #ClickFix #FakeUpdate was updated to cause the inject to eval a function that outputs "咯,大概是结束了" to the console. Translates to "Well, I guess it's over." 🤔.
0
4
13
@ffforward
Tommy M (TheAnalyst)
1 year
In a surprising move, the BSC smart contract 0xdf20921ea432318dd5906132edbc0c20353f72d6 used in #ClickFix #FakeUpdate was updated to cause the inject to eval a function that outputs "咯,大概是结束了" to the console. Translates to "Well, I guess it's over." 🤔.
3
3
13
@ffforward
Tommy M (TheAnalyst)
1 year
RT @threatinsight: Proofpoint threat researchers have noticed that a clever #socialengineering tactic is becoming increasingly popular amon….
0
40
0
@ffforward
Tommy M (TheAnalyst)
1 year
Even though this content is up to date as of start of June, all three cluster has already slightly changed their TTPs, for example #ClearFake now also uses #EtherHiding in the PowerShell stages, and a second Fake Update cluster has started using it too 🔥.
0
1
7
@ffforward
Tommy M (TheAnalyst)
1 year
New blog out with @selenalarson and the rest of the @threatinsight team. Deep dive, but yet just a surface touch of the recent campaigns where the victim needs to run a PowerShell script to initiate the compromise. #TA571 #ClearFake #Lumma #DarkGate.
Tweet card summary image
proofpoint.com
Proofpoint observed an increase in threat actors directing users to copy and paste malicious Powershell script malware onto their computers. Learn more.
1
20
58