rivitna Profile
rivitna

@rivitna2

Followers
5K
Following
2K
Media
143
Statuses
513

Chief #malware analyst, reverse engineer, #APT and #ransomware researcher, programmer. Tweets represent my personal views.

Joined March 2021
Don't wanna be here? Send us removal request.
@rivitna2
rivitna
5 months
RT @GroupIB_TI: 🚨Group-IB’s Threat Intelligence team has uncovered a sophisticated ransomware operation, #HuntersInternational, emerging in….
0
32
0
@rivitna2
rivitna
5 months
Here is the new version of #PE32 #ransomware. PE32 ransomware uses AES-256 CTR and ML-KEM Kyber1024, RSA-4096 🤯.
2
6
28
@rivitna2
rivitna
6 months
RT @reecdeep: 🎯I would help #malware analysts to bypass anti-analysis measures by concealing their processes, like x64dbg or procmon. ⚔️Exc….
Tweet card summary image
github.com
Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis tool from malware detection - reecdeep/hollowise
0
44
0
@rivitna2
rivitna
7 months
Tweet media one
2
1
5
@rivitna2
rivitna
7 months
#PE32 is a new family of #ransomware.It's not hard to guess where this ransomware was developed. But it is noteworthy that it's developed in #Rust. Perhaps the author's name is Farza, and he himself uploaded the first versions of his ransomware to VT.
Tweet media one
@PaduckLee
Hyuna Lee
7 months
pe32s #Ransomware.md5 : 1289a867fafe321b51a93aa47afaffc9.ext : [org_filename].[victim_id].[org_ext].pe32s
Tweet media one
1
14
58
@rivitna2
rivitna
10 months
RT @ValeryMarchive: 💡Did you know that #Hunters International provides a tool to their affiliates that allows them to leak stolen data on t….
0
11
0
@rivitna2
rivitna
10 months
Six months ago, we posted a list of all possible passwords and the code to generate them :).
@Bitdefender_Ent
Bitdefender_Ent
10 months
ShrinkLocker used decryptors as a threat—then reversed course. Discover how this ransomware unfolded and what it means for your defenses. 🔗 #Cybersecurity #InfoSec #Ransomware.
0
2
10
@rivitna2
rivitna
10 months
My Top 10 most difficult data encryption implementations in #ransomware:.1. #TeslaRVNG / #Secles.2. #Hunters International / #Hive v6.3. #Mimic.4. #RCRU64.
Tweet card summary image
github.com
Contribute to rivitna/Malware development by creating an account on GitHub.
2
4
32
@rivitna2
rivitna
10 months
0
0
3
@rivitna2
rivitna
10 months
#WEAXOR #Ransomware.What's it?.Is this a rebranding of #Mallox ransomware?. weaxorpemwzoxg5cdvvfd77p3qczkxqii37ww4foo2n4jcft3mytbpyd[.]onion.lazylazy@tuta[.]com.help.service@anche[.]no.
Tweet media one
3
12
22
@rivitna2
rivitna
10 months
RT @leak_ix: Still #cyberpanel #ransomware:. Thanks to @rivitna2 you can now also decrypt files that were encrypted with the .encryp extens….
0
10
0
@rivitna2
rivitna
11 months
Tweet media one
1
0
2
@rivitna2
rivitna
11 months
You are a little late, I developed the Mallox decryptor more than a year ago, and published its final version back in March 😏.
@GenThreatLabs
Gen Threat Labs
11 months
🚨 Great news! 🚨.Our team has released a free #decryption tool for the #Mallox / #TargetCompany #ransomware variant that was active throughout 2023 and early 2024. Find the download link and full details here: #DontPayUp #GenThreatLabs.
3
2
21
@rivitna2
rivitna
11 months
RT @F_A_C_C_T_: Компания F.A.C.C.T. выпустила первое подробное исследование группировки «двойного назначения» Shadow/Twelve, активно атакую….
0
1
0
@rivitna2
rivitna
1 year
1
4
11
@rivitna2
rivitna
1 year
Tweet media one
1
9
33
@rivitna2
rivitna
1 year
#Hunters International #Ransomware.new ransom note.
Tweet media one
Tweet media two
0
9
47
@rivitna2
rivitna
1 year
It became clear who bought the source code of #Inc #ransomware. #Lynx ransomware.
Tweet media one
Tweet media two
Tweet media three
3
7
49
@rivitna2
rivitna
1 year
Tweet media one
1
0
19