helvede.net is one of the many independent Mastodon servers you can use to participate in the fediverse.
Velkommen til Helvede, fediversets hotteste instance! Vi er en queerfeministisk server, der shitposter i den 9. cirkel. Welcome to Hell, We’re a DK-based queerfeminist server. Read our server rules!

Server stats:

158
active users

#threatintel

21 posts18 participants1 post today
Taggart :donor:<p>FWIW, 100% of <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ClickFix</span></a> attacks I've seen have added some kind of inline comment at the end of the command string like <code>I am not a robot</code> to sell the ruse. Definitely worth a threat hunt on command line history.</p><p><a href="https://infosec.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatHunting</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a></p>
Tim (Wadhwa-)Brown :donor:<p>That SAP NetWeaver bug is pretty ouchy:</p><p><a href="https://x.com/gothburz/status/1915755189019017411" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">x.com/gothburz/status/19157551</span><span class="invisible">89019017411</span></a></p><p><a href="https://infosec.exchange/tags/sap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sap</span></a>, <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
Brian Greenberg :verified:<p>⚠️ Mobile security risk: New Android malware "SuperCard X" enables contactless payment fraud via NFC relay attacks 📱💳</p><p>Here’s how it works:<br>🔹 Victims are socially engineered through fake bank alerts (smishing + calls)<br>🔹 Tricked into installing a rogue app posing as “security software”<br>🔹 NFC data is intercepted from real debit/credit cards<br>🔹 Attackers relay stolen credentials to PoS terminals and ATMs for fraudulent cashouts</p><p>Why it matters:<br>• Attackers no longer need stolen physical cards — just proximity + deception<br>• Banking customers, payment providers, and card issuers are all at risk<br>• Google is working on Android protections — but vigilance is key now</p><p>🛡️ Tip: Always scrutinize app installs, verify messages before acting, and keep Google Play Protect enabled.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileSecurity</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/NFC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NFC</span></a> <a href="https://infosec.exchange/tags/FinancialFraud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FinancialFraud</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> </p><p><a href="https://thehackernews.com/2025/04/supercard-x-android-malware-enables.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/04/supe</span><span class="invisible">rcard-x-android-malware-enables.html</span></a></p>
Ian Campbell<p>So you like domain intel.</p><p>What if we presented 2024 findings and went deep into the analytical methods?</p><p>What if we provided some awesome scatterplots showing intel-relevant convergences?</p><p>What if I said....Shannon Entropy?</p><p>And if we gave you topic-based heatmaps?</p><p>Well, get in here, then. Our first annual Domain Intelligence Report is out. </p><p><a href="https://masto.deoan.org/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://masto.deoan.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://masto.deoan.org/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> </p><p><a href="https://www.domaintools.com/dti-inaugural-domain-intelligence-report/?utm_source=Mastodon&amp;utm_medium=Social&amp;utm_campaign=Domain-Intel-Report" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">domaintools.com/dti-inaugural-</span><span class="invisible">domain-intelligence-report/?utm_source=Mastodon&amp;utm_medium=Social&amp;utm_campaign=Domain-Intel-Report</span></a></p>
Tim (Wadhwa-)Brown :donor:<p>Another header bypass, this time a Citrix NetScaler nasty:</p><p><a href="https://attackerkb.com/topics/7zebEgmGLs/cve-2024-6235" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">attackerkb.com/topics/7zebEgmG</span><span class="invisible">Ls/cve-2024-6235</span></a></p><p><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a>, <a href="https://infosec.exchange/tags/netscaler" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netscaler</span></a></p>
Tim (Wadhwa-)Brown :donor:<p>The mean time between me pointing out a potential abuse case and us finding malware using it is shortening. This is either good news or bad.</p><p><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a>, <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a></p>
Taylor Parizo<p>Related:<br><a href="https://arxiv.org/pdf/2503.23175" rel="nofollow noopener noreferrer" target="_blank">Large Language Models are Unreliable to Cyber Threat Intelligence</a><br><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
Ian Campbell<p>Did that thing again where I shared some of the stuff we're reading internally at <span class="h-card" translate="no"><a href="https://infosec.exchange/@DomainTools" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>DomainTools</span></a></span> Investigations.</p><p>Not a roundup, just what caught our attention. Got something you think we should add? Link me, I always need more to read and more reasons to avoid cleaning the fridge.</p><p><a href="https://masto.deoan.org/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://masto.deoan.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://masto.deoan.org/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> </p><p>https://<br>dti.domaintools.com/cybersecur<br>ity-reading-list-week-of-2025-04-21/?utm_source=Mastodon&amp;utm_medium=Social&amp;utm_campaign=reading-list-april</p>
Christoffer S.<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@fabian_marquardt" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>fabian_marquardt</span></a></span> Welcome, it's a pretty decent place, and with <span class="h-card" translate="no"><a href="https://infosec.exchange/@jerry" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jerry</span></a></span> at the helm you've chosen your instance well ;-)</p><p>Enjoy!</p><p>(Make sure to follow a couple of Tags such as <a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> and <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> as it will somewhat get you going with a good timeline!)</p>
Alexandre Dulaunoy<p>I had the pleasure of presenting at <a href="https://infosec.exchange/tags/FIRSTCTI25" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FIRSTCTI25</span></a> in Berlin:</p><p>"The Art of Pivoting – How You Can Discover More from Adversaries with Existing Information."</p><p>The talk explored how unconventional indicators, like cookie names, QR codes, HTTP headers (HHHash), DOM structures, and reused Google Analytics IDs, can reveal surprising links across threat actor infrastructure and behavior.</p><p>We also shared real-world insights from our crawling and analysis with AIL, including:</p><ul><li>How “weak” indicators can gain strength through composite correlation</li><li>Unexpected metadata reuse across Tor services and social platforms</li><li>How AIL enables more creative and effective pivoting workflows</li></ul><p>🔗 Slides <a href="https://www.ail-project.org/assets/img/slides/the-art-of-pivoting.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ail-project.org/assets/img/sli</span><span class="invisible">des/the-art-of-pivoting.pdf</span></a></p><p><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/darkweb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>darkweb</span></a> </p><p><span class="h-card" translate="no"><a href="https://misp-community.org/@misp" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>misp</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@ail_project" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ail_project</span></a></span> <span class="h-card" translate="no"><a href="https://social.circl.lu/@circl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>circl</span></a></span> </p><p>Thanks to <span class="h-card" translate="no"><a href="https://infosec.exchange/@terrtia" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>terrtia</span></a></span> for the crazy discussions around correlations!</p>
Christoffer S.<p>Data Breach Investigation Report (DBIR) for 2025 has been published, and as always readable without registration which these days is to be celebrated because it's becoming increasingly rare to find non-walled content.</p><p>And DBIR has been historically awesome with a very, very personable writing style again something I consider increasingly rare in these days of LLM-generated content.</p><p>All in all, many reasons to celebrate:</p><p><a href="https://www.verizon.com/business/resources/reports/dbir/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">verizon.com/business/resources</span><span class="invisible">/reports/dbir/</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/DBIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DBIR</span></a></p>
cR0w :cascadia:<p>For those that track IABs:</p><p><a href="https://blog.talosintelligence.com/introducing-toymaker-an-initial-access-broker/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.talosintelligence.com/int</span><span class="invisible">roducing-toymaker-an-initial-access-broker/</span></a></p><p>IoCs, which include Metasploit shells:</p><blockquote><p>fdf977f0c20e7f42dd620db42d20c561208f85684d3c9efd12499a3549be3826</p><p>0a367cc7e7e297248fad57e27f83316b7606788db9468f59031fed811cfe4867</p><p>0bcfea4983cfc2a55a8ac339384ecd0988a470af444ea8f3b597d5fe5f6067fb</p><p>5831b09c93f305e7d0a49d4936478fac3890b97e065141f82cda9a0d75b1066d</p><p>691cc4a12fbada29d093e57bd02ca372bc10968b706c95370daeee43054f06e3</p><p>70077fde6c5fc5e4d607c75ff5312cc2fdf61ea08cae75f162d30fa7475880de</p><p>a95930ff02a0d13e4dbe603a33175dc73c0286cd53ae4a141baf99ae664f4132</p><p>c1bd624e83382668939535d47082c0a6de1981ef2194bb4272b62ecc7be1ff6b</p><p>209[.]141[.]43[.]37</p><p>194[.]156[.]98[.]155</p><p>158[.]247[.]211[.]51</p><p>39[.]106[.]141[.]68</p><p>47[.]117[.]165[.]166</p><p>195[.]123[.]240[.]2</p><p>75[.]127[.]0[.]235</p><p>149[.]102[.]243[.]100</p><p>206[.]188[.]196[.]20</p><p>51[.]81[.]42[.]234</p><p>178[.]175[.]134[.]52</p><p>162[.]33[.]177[.]56</p><p>64[.]52[.]80[.]252</p><p>162[.]33[.]178[.]196</p><p>103[.]199[.]16[.]92</p></blockquote><p><a href="https://infosec.exchange/tags/threatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatIntel</span></a></p>
Brian Clark<p>Sekoia has another excellent write-up on an attack they are seeing. The fact that this attack is successful in some places boggles my mind. It has a smorgasbord of known attacker TTPs that everyone should be monitoring, controlling and/blocking. Example TTPs include:<br>- Use of trycloudflare.com<br>- Use of dynamic DNS (duckdns!)<br>- Use of Wscript.exe<br>- Use of Mshta.exe</p><p>You know what to do folks!</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> </p><p>From: <span class="h-card" translate="no"><a href="https://infosec.exchange/@sekoia_io" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sekoia_io</span></a></span><br><a href="https://infosec.exchange/@sekoia_io/114386351495475519" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@sekoia_io/11</span><span class="invisible">4386351495475519</span></a></p>
Tim (Wadhwa-)Brown :donor:<p>Not got my name on it but there are two new techniques that I lobbied for (bind mounts and process argument overwrites). Kudos to the team for finding suitable source material to cite.</p><p><a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a>, <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a>, <a href="https://infosec.exchange/tags/att" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>att</span></a>&amp;ck</p>
Tim (Wadhwa-)Brown :donor:<p>We welcome ATT&amp;CK v17:</p><p><a href="https://attack.mitre.org/resources/updates/updates-april-2025/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">attack.mitre.org/resources/upd</span><span class="invisible">ates/updates-april-2025/</span></a></p><p>Time to update your mappings :).</p><p><a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a>, <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a>, <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a>, <a href="https://infosec.exchange/tags/att" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>att</span></a>&amp;ck</p>
Brian Greenberg :verified:<p>⚠️ Cyber threat: “Cookie Bite” attack hijacks Microsoft 365 — no malware required. Researchers uncovered a new attack that abuses Azure Entra ID auth cookies (ESTSAUTH + ESTSAUTHPERSISTENT) to:<br>🍪 Hijack sessions in Outlook, Teams, and more<br>🚫 Bypass MFA<br>📥 Avoid traditional endpoint detection<br>🧩 Spread via malicious browser extensions</p><p>🛡️ Organizations must:<br>🔐 Audit browser extension permissions<br>📊 Monitor for persistent cloud session abuse<br>🧠 Train users to avoid risky browser behaviors</p><p>Invisible. Persistent. And just one stolen cookie away.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft365</span></a> <a href="https://infosec.exchange/tags/MFABypass" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MFABypass</span></a> <a href="https://infosec.exchange/tags/EntraID" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EntraID</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <br><a href="https://www.darkreading.com/remote-workforce/cookie-bite-entra-id-attack-exposes-microsoft-365" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/remote-workfor</span><span class="invisible">ce/cookie-bite-entra-id-attack-exposes-microsoft-365</span></a></p>
Taggart :donor:<p>This is still ongoing, but I might do a looksee in your DNS records for <code>static-pcs-sdk-server.alibaba[.]com</code></p><p><a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a></p>
Volexity :verified:<p>New on the <span class="h-card" translate="no"><a href="https://infosec.exchange/@volexity" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>volexity</span></a></span> Blog: Multiple Russian threat actors are leveraging Signal, WhatsApp, and a compromised Ukrainian government email address to impersonate EU officials. This latest round of phishing attacks abuses first-party Microsoft Entra apps and OAuth to compromise targets.</p><p><a href="https://www.volexity.com/blog/2025/04/22/phishing-for-codes-russian-threat-actors-target-microsoft-365-oauth-workflows" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">volexity.com/blog/2025/04/22/p</span><span class="invisible">hishing-for-codes-russian-threat-actors-target-microsoft-365-oauth-workflows</span></a></p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
k3ym𖺀<p>🚨 <strong>New Threat Alert: Rustobot Botnet</strong> 🚨<br>A new Rust-based botnet is making waves — and it's hijacking routers to do it. <span class="h-card" translate="no"><a href="https://infosec.exchange/@FortiGuardLabs" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>FortiGuardLabs</span></a></span> latest research dives into Rustobot, a stealthy, modular botnet that’s fast, evasive, and ready to wreak havoc.</p><p>🔍 Learn how it works, what makes it different, and how to protect your network:<br>👉 <a href="https://www.fortinet.com/blog/threat-research/new-rust-botnet-rustobot-is-routed-via-routers" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fortinet.com/blog/threat-resea</span><span class="invisible">rch/new-rust-botnet-rustobot-is-routed-via-routers</span></a></p><p><strong>IOCs</strong></p><p><strong>URLs</strong></p><p>hxxp://66[.]63[.]187[.]69/w.sh<br>hxxp://66[.]63[.]187[.]69/wget.sh<br>hxxp://66[.]63[.]187[.]69/t<br>hxxp://66[.]63[.]187[.]69/tftp.sh<br>hxxp://66[.]63[.]187[.]69/arm5<br>hxxp://66[.]63[.]187[.]69/arm6<br>hxxp://66[.]63[.]187[.]69/arm7<br>hxxp://66[.]63[.]187[.]69/mips<br>hxxp://66[.]63[.]187[.]69/mpsl<br>hxxp://66[.]63[.]187[.]69/x86</p><p><strong>Hosts</strong></p><p>dvrhelper[.]anondns[.]net<br>techsupport[.]anondns[.]net<br>rustbot[.]anondns[.]net<br>miraisucks[.]anondns[.]net<br>5[.]255[.]125[.]150</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://infosec.exchange/tags/RustLang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RustLang</span></a> <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fortinet</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/IoTSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IoTSecurity</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a></p>
Brian Greenberg :verified:<p>⚠️ Cyber threat: Russian bulletproof host Proton66 fuels global attacks 🌐💣</p><p>Since January 8, IPs associated with Proton66 have been linked to:<br>🔍 Mass scanning and credential brute-forcing<br>💥 Exploitation of critical vulnerabilities (e.g., CVE-2025-0108, CVE-2024-41713)<br>🛡️ Hosting malware families like GootLoader and SpyNote<br>📱 Redirecting Android users to malicious APKs via compromised WordPress sites</p><p>Organizations must enhance their threat intelligence and monitoring to detect and mitigate such activities.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/Proton66" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Proton66</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a><br><a href="https://thehackernews.com/2025/04/hackers-abuse-russian-bulletproof-host.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/04/hack</span><span class="invisible">ers-abuse-russian-bulletproof-host.html</span></a></p>