Explore tweets tagged as #lab52
@virusbtn
Virus Bulletin
3 years
In a post from last week, researchers at Lab52 observe an unknown actor using similar techniques to APT29 and post details about the new techniques they identified, in particular the SVG Dropper, DLL used for infection and C2 behaviour. https://t.co/7z6PNjIEO9
2
39
127
@virusbtn
Virus Bulletin
3 years
The latest article from LAB52 looks in depth at the anti-analysis techniques used by QakBot during the early stages of its execution. https://t.co/2KLnL7n9Fc
0
14
37
@LAB52io
LAB52
5 days
Check out our new paper (NOT OA)!! This Is How They Tell Me a SOC Works https://t.co/byKthQM8wC #SOC
0
1
1
@virusbtn
Virus Bulletin
2 years
Lab52 researchers analyse a new campaign detected in Colombia with several similarities to previous decoys and malware used by APT-C-36. https://t.co/cUH6xoURWh
1
28
65
@aboutsecurity
Ismael Valenzuela
2 years
Ana Nieto (@cadirneca) nos comparte el análisis de Lab52 sobre la evolución del #ransomware en #STICPANAMA
0
5
14
@LAB52io
LAB52
6 days
During the last months, we have been involved in some presentations about the GRU, mostly related to the book "Cyber GRU. Russian military intelligence in cyberspace" that we announced in July: https://t.co/yUYraMbgjL 🧵
1
2
7
@virusbtn
Virus Bulletin
6 months
LAB52 reseachers uncovered a phishing campaign deploying DeedRAT, a modular backdoor attributed to Chinese threat actors. The campaign leverages the legitimate signed binary MambaSafeModeUI.exe, part of the VIPRE AV software, vulnerable to DLL side-loading https://t.co/beTOtK43zm
0
27
53
@JF0LKINS
Jared Folkins ✞
2 years
In the news, research by Lab52 unveils efforts by the Turla group with a modified Kazuar trojan. PayPal targets stolen super-cookies threats. Axie Infinity's Jeff Zirlin and wallets face crypto-theft, highlighted by PeckShield. The LockBit group threatens with new FBI material
0
0
1
@virusbtn
Virus Bulletin
4 months
S2 Grupo's intelligence team LAB52 reports a new Outlook backdoor, named NotDoor and attributed to APT28, that watches for specific trigger words and then exfiltrates data, uploads files, and executes commands on victim hosts. https://t.co/xNyU4ajeFB
1
17
51
@CareWeDoNot
WDNC
7 months
🚨 New Lab52 alert: Russian-origin Snake Keylogger is exploiting trusted Java tools in a geopolitical-themed phishing campaign 🐍 📧 Spear-phishing emails tout oil deals, using a weaponized jsadebugd.exe DLL-sideload to inject Snake into InstallUtil.exe 🎯 Targets span
0
0
3
@780thC
780th Military Intelligence Brigade (Cyber)
5 months
LAB52 has identified a new backdoor for Outlook attributed to the persistent threat group APT28, which is linked to the Russian intelligence service and has compromised multiple companies from various sectors in NATO member countries. https://t.co/knRlR1EbDk @LAB52io
0
24
62
@780thC
780th Military Intelligence Brigade (Cyber)
6 months
LAB52, the intelligence team at S2 Group, has uncovered a new phishing campaign deploying DeedRAT—a modular backdoor attributed to Chinese threat actors | https://t.co/RCAfhUPkv5 @LAB52io
0
9
15
@greglesnewich
Greg Lesnewich
2 years
#100DaysofYARA might have gotten missed but Lab52 had a cool report on a new loader for Turla's (TA420 😎) Kazuar family lets look for it by honing in on code in the export functions used for thread suspension, loading into mem, and DLL name style https://t.co/wmydePQ6DM
1
7
25
@iiyonite
Stefan Soesanto
3 years
Lab52 has a neat organigram on Unit 26165 ( https://t.co/rfGljHkVKM)
1
0
6
@LAB52io
LAB52
6 days
Here they are!!
1
0
3
@s2grupo
S2GRUPO
3 years
Desde Lab52, la división de ciberinteligencia de S2 Grupo, traemos una completa investigación sobre #JuguetesInteligentes💥tipos de amenazas, riesgos, consejos y... te mostramos un caso real con un dron. ¡Sorprendente!😉 Ya puedes acceder aquí: https://t.co/wN31Y95Y72
0
6
6
@LAB52io
LAB52
2 months
Now!!! @ramado78 in action at #STIC2025
0
1
4
@LAB52io
LAB52
2 months
Do you want to receive access to the findings of the investigation that uncovered #EasterBunny, #APT29's sophisticated malware?
2
3
11
@blackorbird
blackorbird
3 months
DreamLoaders in #Lazarus Recent Campaign https://t.co/f0XxzAW91J
@blackorbird
blackorbird
3 months
#Lazarus Operation DreamJob targets the UAV sector DroneEXEHijackingLoader.dll /ScoringMathTea RAT https://t.co/prl2AcvWPR
0
42
131