Explore tweets tagged as #VShell
@ElementalX2
NtAlertThread
2 months
New Research!. We have found an interesting campaign targeting an entity of Chinese telecom with VELETRIX implant. The implant uses anti-sandbox, shellcode obfuscation technique via IPV4 and execution via EnumCalendarInfo leading to Vshell implant.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
4
67
237
@Huntio
Hunt.io
1 year
#opendir 106.14.176.]208. Is hosting several suspicious ELF files communicating w/ the above IP on port 7744 and frp, likely to proxy traffic. RingQ, an open-source Windows shellcode generator, is also present. A week ago, Vshell was also detected on this IP on port 8082.
Tweet media one
Tweet media two
3
8
33
@1ZRR4H
Germán Fernández
15 days
http://148.135.120[.]162:8443/ #opendir with Go2bypass and something else 🤔. 🔸 "svchost.exe": 28e318a9ed1580a14ef9b6a71d6a0ec5031aae9d2b748b2ed70c67cfa24a85b4 (Go2bypass).🔸 "ws_linux_amd64": 6ce0e2df1698a965627bd7afa2cf58a86cdb3cc691a150b0ad0e19eaa49c0481 (VShell?).🔸
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
7
27
@Skyworship2
Wordless Esonhugh
2 years
我去 我刚还在看vshell更新的咋回事
Tweet media one
0
0
5
@rst_cloud
RST Cloud
14 days
#threatreport #LowCompleteness.Hunting China-Nexus Threat Actor | 13-07-2025.Source: Key details below ↓. 🧑‍💻Actors/Campaigns:.Earth_alux.Dragonclone. 💀Threats:.Cobalt_strike_tool, Vshell, Supershell, Havoc, Sliver_c2_tool, Brc4_tool, .🏭Industry: Telco,
Tweet media one
0
0
0
@gierek_grzegorz
GG
2 months
A Chinese-speaking threat actor quietly breached U.S. local gov systems via a critical flaw in Cityworks. They didn’t just break in , they stayed- deploying Cobalt Strike & VShell via Rust-based TetraLoader.
Tweet media one
0
0
0
@TheHackersNews
The Hacker News
2 months
⚠️ A Chinese-speaking threat actor quietly breached U.S. local gov systems via a critical flaw in Cityworks. They didn’t just break in—they stayed—deploying Cobalt Strike & VShell via Rust-based TetraLoader. Full report →
2
49
94
@Jane_0sint
Jane
4 months
VShell⚙️.▶️These variants are initialized by requesting a payload in a similar way.⏫Sending the OS version as the first client packet, the C2 address as the second packet .⏬Receiving the XOR encrypted payload with 0x99 byte.🔃Further in the communication protocols with C2 there
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
4
25
@Xanderuxsf5
Xanderux
1 month
👹 Vshell web panel . IP : 114.132.226[.]247 .AS 45090( Shenzhen Tencent Computer Systems Company Limited ). Low detection on @virustotal . more Vshell panels detected by #C2Watcher on
Tweet media one
Tweet media two
1
0
1
@AzakaSekai_
【2.0 DEBUT | 08.02】安坂星海 Azaka || VTuber
11 months
welp expect an influx of VShell samples
Tweet media one
1
0
10
@rst_cloud
RST Cloud
2 months
#threatreport #MediumCompleteness.UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware | 22-05-2025.Source: Key details below ↓. 🧑‍💻Actors/Campaigns:.Uat-6382. 💀Threats:.Antsword, Chinachopper, Cobalt_strike_tool, Vshell, Tetraloader,
Tweet media one
0
0
1
@the_yellow_fall
Gray Hats
7 days
JPCERT/CC details a sophisticated, ongoing malware campaign exploiting Ivanti Connect Secure (CVE-2025-0282, -22457) using MDifyLoader, Cobalt Strike, vshell, and Fscan for stealthy persistent access. #IvantiHack #Cybersecurity #MalwareCampaign #APTAttack.
0
3
10
@TweetThreatNews
Cybersecurity News Everyday
9 days
UNC5174, a Chinese-linked threat group, has upgraded its toolkit with open-source tools SNOWLIGHT and VShell, expanding C2 infrastructure. Recent analysis reveals 25 IoCs, including domains and IPs globally active in attacks. #UNC5174 #China.
0
1
1
@rst_cloud
RST Cloud
2 months
#threatreport #HighCompleteness.Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware | 06-06-2025.Source: Key details below ↓. 🧑‍💻Actors/Campaigns:.Dragonclone.Unc5174.Earth_lamia. 💀Threats:.Veletrix, Vshell,
Tweet media one
1
1
0
@cyberfeeddigest
cyberundergroundfeed
11 months
🚨 #C2 #Malware alert! #Vshell detected:. hxxp://38[.]207[.]178[.]156:8082/login/index . cc:@abuse_Ch . #CyberSecurity #Infosec #ThreatAlert #C2 #Malware
Tweet media one
0
1
1
@AzakaSekai_
【2.0 DEBUT | 08.02】安坂星海 Azaka || VTuber
10 months
0 detection.Cloudflare Security Authenticator.dmg.c5686b85efb3ebf2ce07dba4192195c3dac7c335a371b7bcfbf52d5fb15cb507.#vshell
Tweet media one
1
2
21
@fleur_2021
fleur⚗️🔭🕊フォロバ💯
2 months
中国語圏ハッカー のUAT-6382が、現在パッチが適用されているTrimble Cityworksのゼロデイ脆弱性を悪用し米国各地の複数の地方自治体に侵入した❗️. UAT-6382 は Cobalt Strike ビーコンと VSHell マルウェアおよび中国語で書かれた Web シェルとカスタムツールを使用した. 彼らは米国解体を目指してる
Tweet media one
1
0
14
@CircleID
CircleID
9 days
FROM SNOWLIGHT TO VSHELL: CHINESE HACKERS EVOLVE THEIR DNS ARSENAL.—.UNC5174, a Chinese state-linked group, has shifted tactics, adopting VShell for stealthier DNS-based attacks, expanding its infrastructure and indicators of compromise across borders. Learn more:
Tweet media one
0
0
1
@ganzu_0025
ガンズ
1 year
今日決着が着きます.カナトの企画 VSHell.みんなきてねヘ(°◇、°)ノ
Tweet media one
0
1
10