kryptoslogic Profile Banner
Kryptos Logic Profile
Kryptos Logic

@kryptoslogic

Followers
6K
Following
4
Media
6
Statuses
61

Los Angeles, CA
Joined May 2017
Don't wanna be here? Send us removal request.
@kryptoslogic
Kryptos Logic
4 years
Telltale now has data on the Log4j 2 (CVE-2021-44228) vulnerability, over the coming days this data will expand as we find new ways to scan for this complex attack surface. CERTs and Orgs with their assets added will see data in real time as we find it. https://t.co/Am1pbVIO4W
3
7
26
@kryptoslogic
Kryptos Logic
4 years
We're hiring! Come join our growing threat research team developing new and interesting capabilities to automate analysis of threats and help improve the victim discovery/notification process. https://t.co/8cxl2ONnzQ
0
6
7
@kryptoslogic
Kryptos Logic
4 years
We've just scanned for CVE-2021-41773 and found at least 12,000 vulnerable hosts on the internet, likely more out there. Make sure you patch! The list of vulnerable hosts has been loaded into Telltale ( https://t.co/caXU7r95M8).
0
2
5
@kryptoslogic
Kryptos Logic
5 years
ProxyLogon stats: 250k uniq IPs scanned, 29796 vulnerable, 97827 shells across 15150 unique IPs. This data has been loaded into Telltale ( https://t.co/caXU7rqHaI). Please patch and run Microsoft's MSERT tool to clean up any webshells
0
13
25
@kryptoslogic
Kryptos Logic
5 years
Out of the 237496 exchange servers we just scanned, 31454 were vulnerable to ProxyLogon/CVE-2021-26855. This list has been loaded into Telltale ( https://t.co/caXU7rqHaI). Please patch and run Microsoft's MSERT tool to clean up any webshells
0
4
14
@Shadowserver
The Shadowserver Foundation
5 years
Second run of yesterday's Special Report containing data from a later (2021-03-14 23:30:00 UTC) run of @kryptoslogic's potentially vulnerable MS #Exchange server Internet-wide scan just sent out. Increases data from 59142 to 73555 unique IPs, in 6501 to 7254 ASNS, 211 to 212 geos
@Shadowserver
The Shadowserver Foundation
5 years
Another Special Report just sent, using Internet-wide scan data to detect vulnerable MS Exchange servers from @kryptoslogic (hat tip!). Blog provides a comparison of coverage between that and our previous Special Report: https://t.co/ViaZmmsihC Report: https://t.co/dqDqxVQShJ
0
4
10
@Shadowserver
The Shadowserver Foundation
5 years
Special Report just re-run containing updated data on web shells dropped on compromised MS #Exchange servers, again courtesy of @kryptoslogic. 2021-03-15 edition covers 22731 easily found web shells exposed on 20437 unique IP addresses - all requiring urgent remediation
@Shadowserver
The Shadowserver Foundation
5 years
With many un-patched MS #Exchange Servers still being rapidly compromised, we have partnered with @kryptoslogic to provide another Special Report covering 6720 exposed webshells that could be used to deploy ransomware, etc. Please remediate urgently! https://t.co/Ya6AqhEljY
1
18
21
@kryptoslogic
Kryptos Logic
5 years
We just finished another scan for webshells. This time we looked at double the number of paths and found 22731 shells across 12861 unique source IPs. This list has been loaded into Telltale ( https://t.co/DSlRPzD6SZ).
0
21
61
@kryptoslogic
Kryptos Logic
5 years
Out of the 231084 exchange servers we just scanned, 62018 were vulnerable to ProxyLogon/CVE-2021-26855. Once again this list has been loaded into Telltale ( https://t.co/caXU7rqHaI). Please patch and run Microsoft's MSERT tool to clean up any webshells
4
52
152
@kryptoslogic
Kryptos Logic
5 years
Over the next few days we'll be fine tuning our scanning and gathering more data - we think there's probably a bunch more based on other people's data but this is what we have tonight. 2/2
0
0
4
@kryptoslogic
Kryptos Logic
5 years
We've just loaded 60k~ IPs into Telltale ( https://t.co/caXU7rqHaI) which we've found vulnerable to ProxyLogon/CVE 2021-26855 - this is being exploited in the wild - please patch and run Microsoft's MSERT tool to look for signs of compromise. We suspect there are more then 60k 1/2
1
6
19
@Shadowserver
The Shadowserver Foundation
5 years
With many un-patched MS #Exchange Servers still being rapidly compromised, we have partnered with @kryptoslogic to provide another Special Report covering 6720 exposed webshells that could be used to deploy ransomware, etc. Please remediate urgently! https://t.co/Ya6AqhEljY
1
37
56
@kryptoslogic
Kryptos Logic
5 years
We've just discovered 6970 exposed webshells which are publicly exposed and were placed by actors exploiting the Exchange vulnerability. These shells are being used to deploy ransomware. If you're signed up to Telltale ( https://t.co/caXU7rqHaI) you can check you're not affected
2
69
173
@unpacme
UNPACME
5 years
Huge thanks to @kryptoslogic for our new #GO bindings! 🥳 https://t.co/QUJtMRvBFW
1
8
42