phage_nz Profile Banner
Chris Profile
Chris

@phage_nz

Followers
2K
Following
6K
Media
384
Statuses
1K

High Tech, Low Life | @CuratedIntel Team

-40.9006, 174.8860
Joined February 2016
Don't wanna be here? Send us removal request.
@phage_nz
Chris
7 months
RT @0xDanielLopez: TweetFeed is back again! 🔥. After some months paused, I could bring it back to life (thanks to @phage_nz). ✓ TweetFeed c….
0
106
0
@phage_nz
Chris
1 year
Am feeling very fortunate to be a part of the Alpha class for this. The authors are all top of their game and the huge amount of effort they've put into the content certainly shows. Looking forward to day 2!.
@BushidoToken
Will
1 year
First ever #FOR589 run this week! Let’s go 🔥.
0
1
12
@grok
Grok
2 days
Join millions who have switched to Grok.
110
106
901
@phage_nz
Chris
1 year
RT @inversecos: APT Emulation Labs: NOW LIVE 🎉. Solve incidents emulating APT29, APT10 and other threat groups. $45 per month access to….
0
258
0
@phage_nz
Chris
1 year
The attack surface of on-prem Exchange paired with the extensive domain privileges held by it is something that has always troubled me. I've come to figuratively consider it as "Tier 0b". There is some solid advice here on how to best manage it:
Tweet card summary image
posts.specterops.io
How MS Exchange on-premises compromises Active Directory and what organizations can do to prevent that
0
1
1
@phage_nz
Chris
1 year
I'm a huge fan of using Obsidian for everything from a knowledgebase through to a shopping list. @Bank_Security has done a great job in this post of showing how effective it can be as a CTI tool:
bank-security.medium.com
Utilize Obsidian to transform your CTI dataset and uncover unprecedented connections
0
31
116
@phage_nz
Chris
2 years
AITM phishing. PDF links to the Cloudflare protected kit through DoubleCick and Baidu redirects. Common indicators: 24x7bus[.]com eviva13[.]com httpbin[.]org adfs.heart[.]org and sign-in's observed using Surfshark and Proxy-Seller IP's.
Tweet media one
Tweet media two
Tweet media three
0
4
11
@phage_nz
Chris
2 years
RT @0xDanielLopez: 🎉 #TweetFeed is back! 🎉. After some months, I could bring it back to life again!. Easily grab IOCs shared by the #infose….
Tweet card summary image
tweetfeed.live
TweetFeed collects Indicators Of Compromise (IOCs) shared at 𝕏/Twitter.
0
39
0
@phage_nz
Chris
2 years
While the technique has been known of for a while, there's a growing trend of BEC using Dynamics 365 Customer Voice as a landing. Example: customervoice[.]microsoft[.]com -> CF worker - > evans-dixon[.]homes or oil-marketings[.]com Sample:
Tweet media one
Tweet media two
Tweet media three
0
3
6
@phage_nz
Chris
2 years
RT @MsftSecIntel: Microsoft has identified new Qakbot phishing campaigns following the August 2023 law enforcement disruption operation. Th….
0
236
0
@phage_nz
Chris
2 years
RT @BushidoToken: 🆕 Top 10 Cyber Threats of 2023! . While you're rockin' around the TTPs 🎄 Grab a mince pie 🥧 and have a look back over the….
0
79
0
@phage_nz
Chris
2 years
Pikabot. Thread hijacking > ZIP > JS+TXT > curl > DLL. Payload: hXXp://167.235.241[.]120/jogX/centr C2: 154.221.30[.]136:13724 136.244.98[.]80:13783 45.76.103[.]152:13720 154.61.75[.]156:2078 Sample:
Tweet media one
Tweet media two
0
13
47
@phage_nz
Chris
2 years
Remcos RAT. Discord > JS > PowerShell (invokes DLL to download+run another PS1) > PowerShell (invokes DLL to load Remcos payload into a new process) > InstallUtil. wtools[.]io used to host script parts. C2: salwanazeeze.duckdns[.]org:9595 Sample:
Tweet media one
Tweet media two
Tweet media three
1
16
34
@phage_nz
Chris
2 years
Image now hosted at imageupload[.]io and delivering what Triage ID's as zgRAT. Telegram exfil. Payload host: 193.42.33[.]51 Sample:
Tweet media one
Tweet media two
Tweet media three
0
0
2
@phage_nz
Chris
2 years
IcedID. Reviving old tricks. danceharddiehard[.]com > 1azure[.]com > ZIP > ISO > LNK > BAT > rundll32. C2: mistulinno[.]com (as seen in the campaign detailed by @Cryptolaemus1 this morning) Sample:
Tweet media one
Tweet media two
Tweet media three
0
26
52
@phage_nz
Chris
2 years
Similar samples from today. Telegram exfil. VBS:
Tweet media one
Tweet media two
Tweet media three
1
0
4
@phage_nz
Chris
2 years
Interesting AgentTesla sample. Discord hosted JS > PS (find+replace to form DLer) > PS > DLL (assembled from b64 embedded in hosted image) > Payload DLL (assembled from b64 hosted at 193.42.33[.]91). SMTP exfil to: woodenboxfashion[.]com Sample:
Tweet media one
Tweet media two
2
11
20
@phage_nz
Chris
2 years
IcedID. PDF > ZIP > JS > CMD > Curl > 7Z (PW protected) > DLL. ZIP: hXXps://newssarkari[.]in/directions (via ad68e[.]app[.]goo[.]gl) 7Z: hXXps://gardenconceptstudio[.]pl/wp-includes/js/tinymce/plugins/compat3x/css/5673.7z C2: minutozhart[.]online Sample:
Tweet media one
Tweet media two
Tweet media three
0
12
36
@phage_nz
Chris
2 years
RT @BushidoToken: 🆕 Pleased to share my latest blog for SANS FOR589: Cybercrime Intelligence 👾. We reviewed the latest cybercrime intrusion….
0
48
0
@phage_nz
Chris
2 years
Remcos RAT. URL (komamin[.]net) > ZIP > VBS > PS > ielowutil. Payload: 103.10.68[.]110/zimbra/gVCeM32.bin (opendir).C2: septrem.duckdns[.]org:2424 Sample:
Tweet media one
Tweet media two
Tweet media three
0
11
29