
Simon Kenin
@k3yp0d
Followers
2K
Following
1K
Media
586
Statuses
2K
15/16. This was a long rant, but not enough. If a picture is worth a 1000 words, here is a video. @SASSnRaaS
1
2
6
RT @SentinelOne: Your cyber threat intel is part of the North Korean strategy: DPRK operators are abusing CTI platforms to see if they’ve b….
0
3
0
@anyrun_app @X why u do dis?.posted two links, second one become a thumbnail and only the first link text is visible, so confusing.
1
0
0
6/7. msks[.]pics redirect to file-eu-par-1.gofile[.]io/download/direct/47c53557-a472-4ffd-99a5-1de16ce98262/Vistra%20Global.exe.
1
0
0
5/7. CCSD 15 Staff Compensation Statement (Available on Vistra Global).pdf.d989aba36f0268f7d34d278dab90abd9.fbd891af13b5ccf4ff5b292f60492adf30a0649d.573b40d7729c315bf7593f668cd4f4b55532bd5414260e78377b689036bb4221. redirect to msks[.]pics. @D15Schools
1
0
0
4/7. tinyurl[.]com/compensationaugust and compensationstatement[.]pics.redirect to.file-eu-par-2.gofile[.]io/download/direct/47c53557-a472-4ffd-99a5-1de16ce98262/August%20Compensation%20Statement.exe.
1
0
0
2/7. tinyurl[.]com/mystatement25 -> .file-na-lax-1.gofile[.]io/download/direct/47c53557-a472-4ffd-99a5-1de16ce98262/August%20Compensation%20Statement.exe.4ae9f6bb170e8d42d8e06fb5c455426f39056a76.b201ef91679076e7c6f8393aec3b73cd3d4845158a0121c4d5de4396d310faf3.
1
0
0
4/4.There is a special place in hell for "cyber" terrorists targeting people with PTSD, right next to the place of the "cyber" terrorists targeting families of kidnapped hostages .Ref 4:
0
1
3
3/4.Ref 2: UNC2428 is also known as INCD's Black Shadow.Ref 3: @Israel_Cyber @CyberTeam360 .Thank you Tony Reshef.
1
1
3
2/4.This sample is using a different C2 than samples from April: 46.30.190.173.DNS resolve at 2025-08-19: members.nefeshhope[.]com -> 46.30.190.173.nefeshhope was a fake website to lure people with PTSD.Ref:
jpost.com
The directorate urged citizens to avoid clicking on unfamiliar links, sharing personal information with unverified sources, and to rely only on recognized organizations for psychological assistance.
1
0
3
1/4.A.ExE / main.txt.213c7af6fbbe05f9e4f4ed6ee8533a87.6bb092b33f86c0ef2e9d6d0ccb0d1a6f478d3725.f6db77be038980e9dbbf9f11e0f7ae7d2d4d3f1a53199958f1f55137dde5efd3.C:/Users/admin/Desktop/quic-reverse-http-tunnel/cmd/client/main.go.GO tunneler using the QUIC protocol linked to UNC2428.
2
2
14
16/16. Here is a cheat sheet of "Do and Don't" for threat attribution.
0
1
5