
rivitna
@rivitna2
Followers
5K
Following
2K
Media
143
Statuses
513
Chief #malware analyst, reverse engineer, #APT and #ransomware researcher, programmer. Tweets represent my personal views.
Joined March 2021
RT @GroupIB_TI: 🚨Group-IB’s Threat Intelligence team has uncovered a sophisticated ransomware operation, #HuntersInternational, emerging in….
0
32
0
Here is the new version of #PE32 #ransomware. PE32 ransomware uses AES-256 CTR and ML-KEM Kyber1024, RSA-4096 🤯.
2
6
28
RT @reecdeep: 🎯I would help #malware analysts to bypass anti-analysis measures by concealing their processes, like x64dbg or procmon. ⚔️Exc….
github.com
Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis tool from malware detection - reecdeep/hollowise
0
44
0
#PE32 is a new family of #ransomware.It's not hard to guess where this ransomware was developed. But it is noteworthy that it's developed in #Rust. Perhaps the author's name is Farza, and he himself uploaded the first versions of his ransomware to VT.
pe32s #Ransomware.md5 : 1289a867fafe321b51a93aa47afaffc9.ext : [org_filename].[victim_id].[org_ext].pe32s
1
14
58
RT @ValeryMarchive: 💡Did you know that #Hunters International provides a tool to their affiliates that allows them to leak stolen data on t….
0
11
0
Six months ago, we posted a list of all possible passwords and the code to generate them :).
ShrinkLocker used decryptors as a threat—then reversed course. Discover how this ransomware unfolded and what it means for your defenses. 🔗 #Cybersecurity #InfoSec #Ransomware.
0
2
10
My Top 10 most difficult data encryption implementations in #ransomware:.1. #TeslaRVNG / #Secles.2. #Hunters International / #Hive v6.3. #Mimic.4. #RCRU64.
github.com
Contribute to rivitna/Malware development by creating an account on GitHub.
2
4
32
RT @leak_ix: Still #cyberpanel #ransomware:. Thanks to @rivitna2 you can now also decrypt files that were encrypted with the .encryp extens….
0
10
0
You are a little late, I developed the Mallox decryptor more than a year ago, and published its final version back in March 😏.
🚨 Great news! 🚨.Our team has released a free #decryption tool for the #Mallox / #TargetCompany #ransomware variant that was active throughout 2023 and early 2024. Find the download link and full details here: #DontPayUp #GenThreatLabs.
3
2
21
RT @F_A_C_C_T_: Компания F.A.C.C.T. выпустила первое подробное исследование группировки «двойного назначения» Shadow/Twelve, активно атакую….
0
1
0