Kryptos Logic
@kryptoslogic
Followers
6K
Following
4
Media
6
Statuses
61
Los Angeles, CA
Joined May 2017
Following up on our last analysis of Trickbot's web inject module we are now publishing a deep dive into the module: https://t.co/kCJeP4vcWw
kryptoslogic.com
Overview TrickBot, a modular trojan, has been active in the malware scene since 2016. It is famously known for having a variety of modules in its attack toolkit, some of which are quite recent and...
1
3
18
Telltale now has data on the Log4j 2 (CVE-2021-44228) vulnerability, over the coming days this data will expand as we find new ways to scan for this complex attack surface. CERTs and Orgs with their assets added will see data in real time as we find it. https://t.co/Am1pbVIO4W
3
7
26
We're hiring! Come join our growing threat research team developing new and interesting capabilities to automate analysis of threats and help improve the victim discovery/notification process. https://t.co/8cxl2ONnzQ
0
6
7
We've just scanned for CVE-2021-41773 and found at least 12,000 vulnerable hosts on the internet, likely more out there. Make sure you patch! The list of vulnerable hosts has been loaded into Telltale ( https://t.co/caXU7r95M8).
0
2
5
We observed changes to AnchorDNS & an interesting new component - read more about it here: https://t.co/W18hnQsQPa
kryptoslogic.com
Overview AnchorDNS is a backdoor used by the TrickBot actors to target selected high value victims. It has been seen delivered by both TrickBot and Bazar1 malware campaigns2. AnchorDNS is particula...
0
5
6
We recently discovered some changes TrickBot made to their webinjects module, read about our finding here:
kryptoslogic.com
Overview TrickBot is an established and widespread multi-purpose trojan. Active since 2016 and modular in nature, it can accomplish a variety of goals ranging from credential theft to lateral...
0
35
130
ProxyLogon stats: 250k uniq IPs scanned, 29796 vulnerable, 97827 shells across 15150 unique IPs. This data has been loaded into Telltale ( https://t.co/caXU7rqHaI). Please patch and run Microsoft's MSERT tool to clean up any webshells
0
13
25
Out of the 237496 exchange servers we just scanned, 31454 were vulnerable to ProxyLogon/CVE-2021-26855. This list has been loaded into Telltale ( https://t.co/caXU7rqHaI). Please patch and run Microsoft's MSERT tool to clean up any webshells
0
4
14
Second run of yesterday's Special Report containing data from a later (2021-03-14 23:30:00 UTC) run of @kryptoslogic's potentially vulnerable MS #Exchange server Internet-wide scan just sent out. Increases data from 59142 to 73555 unique IPs, in 6501 to 7254 ASNS, 211 to 212 geos
Another Special Report just sent, using Internet-wide scan data to detect vulnerable MS Exchange servers from @kryptoslogic (hat tip!). Blog provides a comparison of coverage between that and our previous Special Report: https://t.co/ViaZmmsihC Report: https://t.co/dqDqxVQShJ
0
4
10
Special Report just re-run containing updated data on web shells dropped on compromised MS #Exchange servers, again courtesy of @kryptoslogic. 2021-03-15 edition covers 22731 easily found web shells exposed on 20437 unique IP addresses - all requiring urgent remediation
With many un-patched MS #Exchange Servers still being rapidly compromised, we have partnered with @kryptoslogic to provide another Special Report covering 6720 exposed webshells that could be used to deploy ransomware, etc. Please remediate urgently! https://t.co/Ya6AqhEljY
1
18
21
We just finished another scan for webshells. This time we looked at double the number of paths and found 22731 shells across 12861 unique source IPs. This list has been loaded into Telltale ( https://t.co/DSlRPzD6SZ).
0
21
61
Out of the 231084 exchange servers we just scanned, 62018 were vulnerable to ProxyLogon/CVE-2021-26855. Once again this list has been loaded into Telltale ( https://t.co/caXU7rqHaI). Please patch and run Microsoft's MSERT tool to clean up any webshells
4
52
152
Over the next few days we'll be fine tuning our scanning and gathering more data - we think there's probably a bunch more based on other people's data but this is what we have tonight. 2/2
0
0
4
We've just loaded 60k~ IPs into Telltale ( https://t.co/caXU7rqHaI) which we've found vulnerable to ProxyLogon/CVE 2021-26855 - this is being exploited in the wild - please patch and run Microsoft's MSERT tool to look for signs of compromise. We suspect there are more then 60k 1/2
1
6
19
With many un-patched MS #Exchange Servers still being rapidly compromised, we have partnered with @kryptoslogic to provide another Special Report covering 6720 exposed webshells that could be used to deploy ransomware, etc. Please remediate urgently! https://t.co/Ya6AqhEljY
1
37
56
We've just discovered 6970 exposed webshells which are publicly exposed and were placed by actors exploiting the Exchange vulnerability. These shells are being used to deploy ransomware. If you're signed up to Telltale ( https://t.co/caXU7rqHaI) you can check you're not affected
2
69
173
We came across a new Trickbot module used for network reconnaissance - read more here: https://t.co/UvUGyubGFB
kryptoslogic.com
Overview Active since 2016, TrickBot is one of the most prevalent modular banking trojans. The botnet’s modules carry out objectives such as credential harvesting, propagating via the network, web...
0
27
59
As a result of the law enforcement takedown of Emotet we're able to distribute alerts to victims via our platform: https://t.co/Am1pbVIO4W Read more about the takedown here: https://t.co/ELK7CBQhfq
europol.europa.eu
Law enforcement and judicial authorities worldwide have this week disrupted one of most significant botnets of the past decade: EMOTET. Investigators have now taken control of its infrastructure in...
0
15
56
1
8
42