lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

54
active users

#virustotal

0 posts0 participants0 posts today
Erik van Straten<p>Risico Cloudflare (+Trump)</p><p>🌦️ Achter Cloudflare<br>Steeds meer websites zitten "achter" het Amerikaanse bedrijf Cloudflare. Stel u opent <a href="https://pvv.nl" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pvv.nl</span><span class="invisible"></span></a> (let op, daar staat https:// vóór, Mastodon verstopt dat) in uw browser:</p><p> browser &lt;-1-&gt; Cloudflare &lt;-2-&gt; <a href="https://pvv.nl" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pvv.nl</span><span class="invisible"></span></a></p><p>⛓️‍💥 Géén E2EE<br>Bij zeer veel websites (<a href="https://pvv.nl" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pvv.nl</span><span class="invisible"></span></a> is een voorbeeld) is er sprake van twee *verschillende* verbindingen, dus beslist geen E2EE = End-to-End-Encryption (voor zover dat überhaupt nog wat zegt als de "echte" een cloud-server van Google, Microsoft of Amazon is).</p><p>🕋 CDN's<br>Cloudflare, een CDN (Content Delivery Network), heeft een wereldomspannend netwerk met "tunnel"-servers in computercentra van de meeste internetproviders. Waarschijnlijk ook bij u "om de hoek".</p><p>🔥 DDoS-aanvallen<br>Dat is werkt uitstekend tegen DDoS (Distributed Denial of Service) aanvallen. Ook zorgen CDN's voor veel snellere communicatie (mede doordat plaatjes e.d. op een web van servers "gecached" worden) - ook als de "echte" server aan de andere kant van de wereld staan.</p><p>🚨 Nadelen<br>Maar dit is NIET zonder prijs! Cloudflare kan namelijk *meekijken* in zeer veel "versleuteld" netwerkverkeer (en dat zelfs, desgewenst, wijzigen).</p><p>🚦 Nee, niet *u*<br>Ook kunnen Cloudflare-klanten allerlei regels instellen waar bezoekers aan moeten voldoen, en hen als "ongewenst" bezoek blokkeren (ook *criminele* klanten maken veelvuldig gebruik van deze mogelijkheid, o.a. om te voorkómen dat de makers van virusscanners nepwebsites op kwaadaardige inhoud kunnen checken).<br>Aanvulling 14:39: { zo kan ik, met Firefox Focus onder Android, <a href="https://cidi.nl" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cidi.nl</span><span class="invisible"></span></a> *niet* openen, ik zie dan een pagina waarin o.a. staat "Even geduld, de website van Centrum Informatie en Documentatie Israël (CIDI) is aan het verifiëren of de verbinding veilig is. Please unblock challenges.cloudflare.com to proceed."<br>}</p><p>😎 Men In Black<br>Omdat Cloudflare een (tevens) in de VS gevestigd bedrijf is, moeten zij voldoen aan de Amerikaanse FISA section 702 wetgeving. Dat betekent dat hen opgedragen kan worden om internetverkeer te monitoren, en zij daar een zwijgplicht over hebben. Terwijl Amerikanen al minder privacy-rechten hebben dan Europeanen, hebben *niet*-Amerikanen *nul* privacyrechten volgens genoemde FISA wet.</p><p>🔓 Knip<br>Dat https-verbindingen via Cloudflare niet E2EE zijn, blijkt uit onderstaand plaatje (dat vast méér mensen wel eens gezien hebben).</p><p>📜 Certificaten en foutmeldingen<br>Dat plaatje kan, zonder certificaatfoutmeldingen, ALLEEN bestaan als Cloudflare een geldig authenticerend website-certificaat (een soort paspoort) heeft voor, in dit geval, <a href="https://bleepingcomputer.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bleepingcomputer.com</span><span class="invisible"></span></a> - en dat hébben ze. Voor MILJOENEN websites.</p><p>🛃 MitM<br>Cloudflare (maar ook anderen, zoals Fastly) zijn een MitM (Man in the Middle).</p><p>🤔 De tweede verbinding?<br>Uw browser heeft, grotendeels transparant, een E2EE-verbinding met een Cloudflare server. U heeft géén idee wat voor soort verbinding Cloudflare met de werkelijke website heeft (is dat überhaupt https, en een veilige variant daarvan? Wat doet Cloudflare als het certificaat van de website verlopen is? Etc).</p><p>👽 AitM<br>En zodra een MitM kwaadaardig wordt, noemen we het een AitM (A van Attacker of Adversary).</p><p>🗽 Trump<br>Als Trump Cloudflare opdraagt om geen diensten meer aan NL of EU te leveren, werkt hier HELEMAAL NIETS MEER en dondert onze economie als een kaartenhuis in elkaar.</p><p>🃏 DV-certs<br>Dat Cloudflare een website-certificaat voor bijvoorbeeld <a href="https://vvd.nl" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vvd.nl</span><span class="invisible"></span></a> of <a href="https://cidi.nl" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cidi.nl</span><span class="invisible"></span></a> heeft verkregen, zou vreemd moeten zijn. Dit is echter een peuleschil "dankzij" DV (Domain Validated) certificaten (het lievelingetje van Google) die het internet steeds onveiliger maken en waar ook onze overheid "voor gevallen is" (zie <a href="https://infosec.exchange/@ErikvanStraten/114032329847123742" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ErikvanStrat</span><span class="invisible">en/114032329847123742</span></a>).</p><p>😱 Nepwebsites<br>Maar dit is nog niet alles: steeds meer criminele nepwebsites *verstoppen* zich achter Cloudflare, waar zijzelf (crimineel) geld aan verdient. Zie bijvoorbeeld <a href="https://security.nl/posting/876655" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">security.nl/posting/876655</span><span class="invisible"></span></a> (of kijk eens in het "RELATIONS" tabblad van <a href="https://www.virustotal.com/gui/ip-address/188.114.96.0/relations" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/gui/ip-address/</span><span class="invisible">188.114.96.0/relations</span></a> en druk enkele keren op •••).</p><p><a href="https://infosec.exchange/tags/Risico" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Risico</span></a> <a href="https://infosec.exchange/tags/Economie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Economie</span></a> <a href="https://infosec.exchange/tags/Cloudflare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cloudflare</span></a> <a href="https://infosec.exchange/tags/Fastly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fastly</span></a> <a href="https://infosec.exchange/tags/CDN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CDN</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MitM</span></a> <a href="https://infosec.exchange/tags/FISASection702" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FISASection702</span></a> <a href="https://infosec.exchange/tags/FISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FISA</span></a> <a href="https://infosec.exchange/tags/ThreeLetterAgencies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreeLetterAgencies</span></a> <a href="https://infosec.exchange/tags/Trump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trump</span></a> <a href="https://infosec.exchange/tags/Sbowden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sbowden</span></a> <a href="https://infosec.exchange/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/VVD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VVD</span></a> <a href="https://infosec.exchange/tags/PVV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PVV</span></a> <a href="https://infosec.exchange/tags/CIDI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CIDI</span></a> <a href="https://infosec.exchange/tags/VT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VT</span></a> <a href="https://infosec.exchange/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a> <a href="https://infosec.exchange/tags/DVCerts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DVCerts</span></a> <a href="https://infosec.exchange/tags/DV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DV</span></a> <a href="https://infosec.exchange/tags/OV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OV</span></a> <a href="https://infosec.exchange/tags/EV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EV</span></a> <a href="https://infosec.exchange/tags/QWAC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QWAC</span></a> <a href="https://infosec.exchange/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a> <a href="https://infosec.exchange/tags/NepWebsites" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NepWebsites</span></a> <a href="https://infosec.exchange/tags/FakeWebsites" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FakeWebsites</span></a></p>
Erik van Straten<p>Google is kwaadaardig</p><p>Extreem zelfs, zij hosten -zonder blikken of blozen- zelfs phishingwebsites met de volgende URL's (ik heb ".com" vervangen door "·com", met "hoge" punt, en de '/' door '⧸', om onbedoeld openen te voorkómen):</p><p> https:⧸⧸helpdesk-google·com<br> https:⧸⧸cancel-google·com<br> https:⧸⧸adsupport-google·com</p><p>Veel meer info in <a href="https://www.security.nl/posting/872651/https%3A__cancel-google%C2%B7com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security.nl/posting/872651/htt</span><span class="invisible">ps%3A__cancel-google%C2%B7com</span></a>.</p><p>Edit 15:14: ik zie dat de redactie van security.nl mijn artikel heeft verwijderd (tot zover vrijheid van meningsuiting). Ik had het artikel gearchiveerd: <a href="https://archive.is/3UwWn" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">archive.is/3UwWn</span><span class="invisible"></span></a>.</p><p><a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> <a href="https://infosec.exchange/tags/GoogleIsEvil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleIsEvil</span></a> <a href="https://infosec.exchange/tags/Cybercriminaliteit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercriminaliteit</span></a> <a href="https://infosec.exchange/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> <a href="https://infosec.exchange/tags/GoogleCloudHosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GoogleCloudHosting</span></a> <a href="https://infosec.exchange/tags/CloudHosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudHosting</span></a> <a href="https://infosec.exchange/tags/Hosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hosting</span></a> <a href="https://infosec.exchange/tags/CloudProviders" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudProviders</span></a> <a href="https://infosec.exchange/tags/BigTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BigTech</span></a> <a href="https://infosec.exchange/tags/DV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DV</span></a> <a href="https://infosec.exchange/tags/DomainValidated" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainValidated</span></a> <a href="https://infosec.exchange/tags/Certificates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Certificates</span></a> <a href="https://infosec.exchange/tags/VT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VT</span></a> <a href="https://infosec.exchange/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/FakeWebSites" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FakeWebSites</span></a> <a href="https://infosec.exchange/tags/FakeSites" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FakeSites</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a></p>
Erik van Straten<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@ryanrowcliffe" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ryanrowcliffe</span></a></span> : passkeys are easily lost (I can lookup screenshots) and they don't help for fake sites that you do not have an account for.</p><p>Sites as can be seen in <a href="https://www.virustotal.com/gui/ip-address/43.135.155.204/relations" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/gui/ip-address/</span><span class="invisible">43.135.155.204/relations</span></a> (said IP is detected by 18/94 virusscanners, according to VT).</p><p>Or a site that spoofs one that you do have an account for, such as your bank, and asks you to enter confidential/PII data without having to log in. The scammers subsequently call you, saying they're employees from your bank, and lie to you that criminals may have access to your bank account. You best act quickly by transferring your money to some other "safe vault" bank accout number. They'll offer to help you, provided that you install a RAT such as AnyDesk.</p><p>We're not fixing an extremely criminalized internet by using passkeys.</p><p><a href="https://infosec.exchange/tags/Passkeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Passkeys</span></a> <a href="https://infosec.exchange/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a> <a href="https://infosec.exchange/tags/FakeSites" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FakeSites</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/Spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spoofing</span></a></p>
✍️ Eljo #MorpurgoMedia<p>Linux in opmars en kan zich eindelijk meten met Windows en Apple. Eerste virus gevonden gericht op Linux UEFI boot.</p><p><a href="https://datanews.knack.be/nieuws/security/onderzoekers-vinden-eerste-uefi-bootkit-voor-linux/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">datanews.knack.be/nieuws/secur</span><span class="invisible">ity/onderzoekers-vinden-eerste-uefi-bootkit-voor-linux/</span></a></p><p><a href="https://mastodon.nl/tags/Bootkitty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bootkitty</span></a> <a href="https://mastodon.nl/tags/virus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virus</span></a> <a href="https://mastodon.nl/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mastodon.nl/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.nl/tags/bootkit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bootkit</span></a> <a href="https://mastodon.nl/tags/uefi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uefi</span></a> <a href="https://mastodon.nl/tags/eset" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eset</span></a> <a href="https://mastodon.nl/tags/virustotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virustotal</span></a> <a href="https://mastodon.nl/tags/masterbootrecord" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>masterbootrecord</span></a> <a href="https://mastodon.nl/tags/morpurgoMedia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>morpurgoMedia</span></a></p>
Erik van Straten<p>Weird and Weirder: Israel &amp; InfoSec</p><p>* ISRAEL *<br>From <a href="https://highergroundtimes.com/higher-ground/2024/jul/7/why-americas-christians-support-israel/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">highergroundtimes.com/higher-g</span><span class="invisible">round/2024/jul/7/why-americas-christians-support-israel/</span></a> (warning, OMG-talk on a privacy-invasive website):</p><p>&lt;&lt;&lt; Why America’s Christians support Israel<br>By Robert Knight Sunday, July 7, 2024<br>[...]<br>If the countries around it were pictured as the body and head of a gigantic man, Israel would constitute a fingernail.</p><p>Yet much of the world is insisting that it is diminutive Israel that has to give up “land for peace.”<br>[...]<br>The pro-Palestinian side argues facetiously that while Arabs have occupied what is now Israel for 3,000 years, Jews are interlopers who were not really in the picture until recently.<br>[...]<br>The Bible clearly says that God set aside Israel for the Jewish people. </p><p>Genesis 15:18, which Moses wrote about 3,500 years ago, states, “On that day the LORD made a covenant with Abram [Abraham] and said, “To your descendants I give this land, from the Wadi of Egypt to the great river, the Euphrates.”</p><p>Time and again, God allowed Israel’s enemies to smite them for adopting the barbaric practices of their pagan neighbors, such as child sacrifice, sexual immorality and idol worship. When they repented as a nation, God restored them.</p><p>An otherwise inexplicable miracle occurred in 1948 when Israel was reestablished after nearly 2,000 years. To many, it is proof that Jerusalem is at the center of God’s unfolding plan for humanity. Since its reestablishment 76 years ago, Israel has had a special relationship with the United States.<br>[...] &gt;&gt;&gt;</p><p>* INFOSEC *<br>One can read the same BS here: <a href="https://hdfy8d1.cpi1.eu.org/higher-ground/2024/jul/7/why-americas-christians-support-israel/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hdfy8d1.cpi1.eu.org/higher-gro</span><span class="invisible">und/2024/jul/7/why-americas-christians-support-israel/</span></a></p><p>However, if I tap "Home" in that page, or manually open <a href="https://hdfy8d1.cpi1.eu.org/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">hdfy8d1.cpi1.eu.org/</span><span class="invisible"></span></a>, then CloudFlare reports that I've been blocked:</p><p>&lt;&lt;&lt; Sorry, you have been blocked</p><p>You are unable to access washingtontimes.com</p><p>Why have I been blocked?<br>This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data. &gt;&gt;&gt;</p><p>Why would CloudFlare report that "washingtontimes.com" is blocking me, while it is actually "hdfy8d1.cpi1.eu.org" that is (partially?) proxying "highergroundtimes.com" (albeit related to washingtontimes)?</p><p>Why does CloudFlare proxy so many malicious/phishing or otherwise shitsites? Is it really only money that counts?</p><p>Here's an example, look at the domain names in <a href="https://www.virustotal.com/gui/ip-address/188.114.96.0/relations" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/gui/ip-address/</span><span class="invisible">188.114.96.0/relations</span></a> (note the "Communicating Files (1 M)" - mostly malware, then tap the ••• right above "Communicating Files" a couple of times to see more insane domain names).</p><p>Finally: note that, apart from the zillions of TLD's that confuse browsing people , now also "double-TLD's" (such as *.de.com and *.com.de) seem to gain popularity - by both legit and malicious users.</p><p><a href="https://infosec.exchange/tags/Gaza" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gaza</span></a> <a href="https://infosec.exchange/tags/GazaGenocide" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GazaGenocide</span></a> <a href="https://infosec.exchange/tags/Westbank" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Westbank</span></a> <a href="https://infosec.exchange/tags/Israel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Israel</span></a> <a href="https://infosec.exchange/tags/Bible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bible</span></a> <a href="https://infosec.exchange/tags/Christians" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Christians</span></a> <a href="https://infosec.exchange/tags/Arabs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Arabs</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/DomainNames" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainNames</span></a> <a href="https://infosec.exchange/tags/DV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DV</span></a> <a href="https://infosec.exchange/tags/CloudFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudFlare</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/Proxying" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxying</span></a> <a href="https://infosec.exchange/tags/HidingCybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HidingCybercriminals</span></a> <a href="https://infosec.exchange/tags/FacilitatingCyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FacilitatingCyberCrime</span></a> <a href="https://infosec.exchange/tags/VT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VT</span></a> <a href="https://infosec.exchange/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a></p>
Crazypedia⍼ :verified_pride:<p>Started a <a href="https://hackers.town/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a> Graph for the <a href="https://hackers.town/tags/Awakari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Awakari</span></a> AI Scraper. Working on finding the IPs they're using so we cna block those completely and reduce the time spent on the whack an asshole game<br><a href="https://hackers.town/tags/fediblock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fediblock</span></a> </p><p><a href="https://www.virustotal.com/graph/embed/g2a99ca46891a43288de5707f5425934e1c7b90aa9e72466b9fa471d231c7d636" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/graph/embed/g2a</span><span class="invisible">99ca46891a43288de5707f5425934e1c7b90aa9e72466b9fa471d231c7d636</span></a></p>
@infosec_jcp 🐈🃏 done differently<p>Yeaaahhh, about that <a href="https://infosec.exchange/tags/TextNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TextNow</span></a> free calls and sms's on <a href="https://infosec.exchange/tags/ApkMirror" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApkMirror</span></a> site* 🚩🚨</p><p>* First scan (!) Ever</p><p><a href="https://infosec.exchange/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a> 🔍🚩🚨🚩🚨🚩🚨🚩🚨<br><a href="https://www.virustotal.com/graph/embed/g19714e1fe09a40a490a37b65807eed6b84062f17f089410a8e06a622359aec04" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/graph/embed/g19</span><span class="invisible">714e1fe09a40a490a37b65807eed6b84062f17f089410a8e06a622359aec04</span></a></p><p>🚩🚨 <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/TextNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TextNow</span></a> <a href="https://infosec.exchange/tags/ApkMirror" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApkMirror</span></a> 🚩🚨</p>
@infosec_jcp 🐈🃏 done differently<p><a href="https://infosec.exchange/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a> <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AWS</span></a> 3 of 3 🥳🎉🎊<br><a href="https://www.virustotal.com/graph/embed/gb15a1d08beb44e2f8d9cf79fe78754a3c08b5fea50e5479ab0b9dd91a81f56da" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/graph/embed/gb1</span><span class="invisible">5a1d08beb44e2f8d9cf79fe78754a3c08b5fea50e5479ab0b9dd91a81f56da</span></a></p>
@infosec_jcp 🐈🃏 done differently<p><a href="https://infosec.exchange/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a> <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AWS</span></a> 2 of 3 ☣️🔍🥳<br><a href="https://www.virustotal.com/graph/embed/gb15a1d08beb44e2f8d9cf79fe78754a3c08b5fea50e5479ab0b9dd91a81f56da" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/graph/embed/gb1</span><span class="invisible">5a1d08beb44e2f8d9cf79fe78754a3c08b5fea50e5479ab0b9dd91a81f56da</span></a></p>
@infosec_jcp 🐈🃏 done differently<p><a href="https://infosec.exchange/tags/virustotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virustotal</span></a> - <a href="https://infosec.exchange/tags/fastly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fastly</span></a> ( repeat offender )<br><a href="https://www.virustotal.com/graph/embed/g5bf729f25f154ae7b229589245feba68fd8de1ec58a24ca6ae301c6f1d68a02d" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/graph/embed/g5b</span><span class="invisible">f729f25f154ae7b229589245feba68fd8de1ec58a24ca6ae301c6f1d68a02d</span></a></p>
@infosec_jcp 🐈🃏 done differently<p>Today I had FOUR new <a href="https://infosec.exchange/tags/GammaGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GammaGroup</span></a> <a href="https://infosec.exchange/tags/FinFisher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinFisher</span></a> <a href="https://infosec.exchange/tags/FinSpy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinSpy</span></a> <a href="https://infosec.exchange/tags/Finsky" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Finsky</span></a> attack nodes do a nice <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> on me to memory leak attack my client(s) that I use to post here... </p><p>Super pumped about three <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AWS</span></a> nodes ( several repeat offenders, mind) and a <a href="https://infosec.exchange/tags/Fastly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fastly</span></a> (also repeat offenders) DNS Node.</p><p>Got my sys nice and super slow until.... my OS &amp; memory on the ... Let's call it a 💻👨‍💻💻</p><p> __unleashed my free System resources__ </p><p>... just BOUNCED BACK! </p><p> 🥳🎉🎊🎉🎊🥳🎉🎊😏</p><p><a href="https://infosec.exchange/tags/virustotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virustotal</span></a> - <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AWS</span></a> 1 of 3<br><a href="https://www.virustotal.com/graph/embed/gc720367fbc7c4f7fa779a04f167398ca34f471c1729d4dc78037bafa7d64f708" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/graph/embed/gc7</span><span class="invisible">20367fbc7c4f7fa779a04f167398ca34f471c1729d4dc78037bafa7d64f708</span></a></p>
@infosec_jcp 🐈🃏 done differently<p>New <a href="https://infosec.exchange/tags/StateSponsoredMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StateSponsoredMalware</span></a> <a href="https://infosec.exchange/tags/ForcedMDM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ForcedMDM</span></a> client app <a href="https://infosec.exchange/tags/SprintMCMapk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SprintMCMapk</span></a> module update on <a href="https://infosec.exchange/tags/GammaGroup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GammaGroup</span></a> <a href="https://infosec.exchange/tags/FinFisher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinFisher</span></a> <a href="https://infosec.exchange/tags/FinSpy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinSpy</span></a> <a href="https://infosec.exchange/tags/MobileClientManager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileClientManager</span></a> </p><p>The <a href="https://infosec.exchange/tags/ForcedMDM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ForcedMDM</span></a> <a href="https://infosec.exchange/tags/GooglePlayStore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GooglePlayStore</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> on 01-16-2024</p><p>Notice how the <a href="https://infosec.exchange/tags/PNGs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PNGs</span></a> actually are compressed arrays leading to <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> using a long running <a href="https://infosec.exchange/tags/PNGListArray" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PNGListArray</span></a> in a Portable Network Graphics file format that the client is able to unpack and call to launch <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> attaccc'd as a client from a <a href="https://infosec.exchange/tags/GammaGroupProxyServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GammaGroupProxyServer</span></a> administrator</p><p><a href="https://infosec.exchange/tags/CALEA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CALEA</span></a> software Reveals on <a href="https://infosec.exchange/tags/Android12" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android12</span></a> examples</p><p>See screenshots <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/RTNDA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RTNDA</span></a> <a href="https://infosec.exchange/tags/SSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSM</span></a>™ <a href="https://infosec.exchange/tags/StateSponsoredMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StateSponsoredMalware</span></a>™ <a href="https://infosec.exchange/tags/GreyMarketInvestigations" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GreyMarketInvestigations</span></a> <a href="https://infosec.exchange/tags/CALEA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CALEA</span></a> <a href="https://infosec.exchange/tags/ForcedMDM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ForcedMDM</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/CivilRightsAbuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CivilRightsAbuse</span></a> logged from <a href="https://infosec.exchange/tags/GooglePlayStore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GooglePlayStore</span></a> </p><p><a href="https://infosec.exchange/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a></p><p><a href="https://www.virustotal.com/graph/embed/gfc12bdb135534ae5bd0fc322e7679090d7b08158b4b84f26a4abfa175df9a5a7" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/graph/embed/gfc</span><span class="invisible">12bdb135534ae5bd0fc322e7679090d7b08158b4b84f26a4abfa175df9a5a7</span></a></p>
@infosec_jcp 🐈🃏 done differentlyUpdated 🔎☣️🎁☠️🔍: 📰🗞️🛰️📡📺 #infosec #SSM™ #StateSponsoredMalware™ #investigations #RTDNA
@infosec_jcp 🐈🃏 done differentlyGammaGroup.com #FinFisher #FinSpy #Finsky App : #CarrierHub #SMF-2021.2.apk#Android12
Frehi<p>Yesterday the news broke that a trojanized version of <a href="https://fosstodon.org/tags/freedownloadmanager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freedownloadmanager</span></a> was being distributed. <a href="https://securelist.com/backdoored-free-download-manager-linux-malware/110465/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securelist.com/backdoored-free</span><span class="invisible">-download-manager-linux-malware/110465/</span></a></p><p>1 day later:<br>- no single anti virus vendor (besides <a href="https://fosstodon.org/tags/Kasperksy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kasperksy</span></a>) added detection <a href="https://www.virustotal.com/gui/file/b77f63f14d0b2bde3f4f62f4323aad87194da11d71c117a487e18ff3f2cd468d/detection" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/gui/file/b77f63</span><span class="invisible">f14d0b2bde3f4f62f4323aad87194da11d71c117a487e18ff3f2cd468d/detection</span></a><br>- Both 1.1.1.2 and 9.9.9.9 malware filtering DNS servers still resolve the domain<br>- Only a handful of security vendors flag the domain as malicious <a href="https://www.virustotal.com/gui/domain/deb.fdmpkg.org/detection" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/gui/domain/deb.</span><span class="invisible">fdmpkg.org/detection</span></a></p><p>Even though this is not widespread, this is disappointing.</p><p><a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://fosstodon.org/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://fosstodon.org/tags/virustotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virustotal</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>📨 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> list of resources for week #29/2023 is out! It includes the following and much more:</p><p>➝ 🇷🇺 ⚖️ <a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> Seeks 18 Years in Jail for Founder of <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> Firm<br>➝ 🇷🇺 🇪🇺 Pro-Russian hacktivists increase focus on Western targets. The latest is <a href="https://infosec.exchange/tags/OnlyFans" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OnlyFans</span></a><br>➝ 🧨 🤖 <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> Botnets Hijacking <a href="https://infosec.exchange/tags/Zyxel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zyxel</span></a> Devices to Launch Devastating Attacks<br>➝ 🪱 New <a href="https://infosec.exchange/tags/P2PInfect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>P2PInfect</span></a> Worm Targeting Redis Servers on <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> and <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> Systems<br>➝ 🚫 🛜 <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> restricting internet access to some employees to reduce <a href="https://infosec.exchange/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a> risk<br>➝ 🇬🇧 🍏 <a href="https://infosec.exchange/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> slams UK surveillance-bill proposals<br>➝ 🎭 💸 Cybersecurity firm <a href="https://infosec.exchange/tags/Sophos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sophos</span></a> impersonated by new <a href="https://infosec.exchange/tags/SophosEncrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SophosEncrypt</span></a> ransomware<br>➝ 🇺🇦 🤖 <a href="https://infosec.exchange/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a> takes down massive bot farm, seizes 150,000 SIM cards<br>➝ 🔐 🛜 <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> and <a href="https://infosec.exchange/tags/NSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSA</span></a> Issue New Guidance to Strengthen <a href="https://infosec.exchange/tags/5G" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>5G</span></a> Network Slicing Against Threats<br>➝ 🇨🇳 🦠 Chinese <a href="https://infosec.exchange/tags/APT41" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT41</span></a> Hackers Target Mobile Devices with New WyrmSpy and DragonEgg <a href="https://infosec.exchange/tags/Spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spyware</span></a><br>➝ 🇺🇸 🪦 Famed Hacker Kevin Mitnick Dead at 59<br>➝ 🇺🇸 🕵🏻‍♂️ U.S. Government Blacklists <a href="https://infosec.exchange/tags/Cytrox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cytrox</span></a> and <a href="https://infosec.exchange/tags/Intellexa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intellexa</span></a> Spyware Vendors for Cyber Espionage<br>➝ ☁️ 🔓 <a href="https://infosec.exchange/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> alerts users to critical vulnerability in Citrix ADC and Gateway<br>➝ 🔓 📂 <a href="https://infosec.exchange/tags/VirusTotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirusTotal</span></a> Data Leak Exposes Some Registered Customers' Details<br>➝ 🦠 🐈‍⬛ FIN8 Group Using Modified Sardonic <a href="https://infosec.exchange/tags/Backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Backdoor</span></a> for <a href="https://infosec.exchange/tags/BlackCat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackCat</span></a> Ransomware Attacks<br>➝ 👤 🔓 <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> Security alert: social engineering campaign targets technology industry employees<br>➝ 🇺🇸 🇨🇳 Analysis of <a href="https://infosec.exchange/tags/Storm0558" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Storm0558</span></a> techniques for unauthorized email access<br>➝ 🇨🇳 ☁️ <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> Bug Allowed Hackers to Breach Over Two Dozen Organizations via Forged Azure AD Tokens<br>➝ 🇺🇸 📱 White House, <a href="https://infosec.exchange/tags/FCC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FCC</span></a> advance efforts to add security labels to connected devices<br>➝ 🇪🇸 🇺🇦 Police arrests Ukrainian <a href="https://infosec.exchange/tags/scareware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scareware</span></a> developer after 10-year hunt<br>➝ 🇳🇴 💵 <a href="https://infosec.exchange/tags/Norway" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Norway</span></a> Threatens $100,000 Daily Fine on <a href="https://infosec.exchange/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a> Over Data<br>➝ 🅰️ 🔓 Two New Adobe <a href="https://infosec.exchange/tags/ColdFusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ColdFusion</span></a> Vulnerabilities Exploited in Attacks<br>➝ 🎣 🌍 <a href="https://infosec.exchange/tags/JumpCloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JumpCloud</span></a> Says Sophisticated Nation-State Hackers Targeted Specific Customers<br>➝ 🦠 📊 <a href="https://infosec.exchange/tags/MOVEit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MOVEit</span></a> Hack: Number of Impacted Organizations Exceeds 340</p> <p>📚 This week's recommended reading is: "Leadership Is Changing the Game - The Transition from Technical Expert to Leader" by Brian Donovan</p><p>Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-week-292023" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/infosec-mashup-week-292023</span></a></p>
Eva Wolfangel<p>Aber wie gesagt: Sensible Inhalte haben auf Virustotal natürlich nichts zu suchen. Darauf zu hoffen, dass sie schon niemand findet, ist leichtsinnig. Und es wurden ja schon Dinge dort gefunden…<br><a href="https://chaos.social/tags/virustotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>virustotal</span></a> <a href="https://chaos.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Malwar3Ninja | Threatview.io<p>[Threatview.io] ⚡Our team conducted a hunt on the available domain telemetry data in our proactive hunter dataset for the known ssl certificate used by <a href="https://infosec.exchange/tags/icedid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icedid</span></a>. </p><p>The IOC's contain indicators from period 01 January 2022 and fresh IOC's will be published on daily baisis in out IP/ domain blocklist feed on Threatview.io. </p><p>Check out our latest <a href="https://infosec.exchange/tags/Virustotal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Virustotal</span></a> collection with IP's and Domains related to <a href="https://infosec.exchange/tags/Icedid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Icedid</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a>. </p><p><a href="https://www.virustotal.com/gui/collection/48eb7f1b21f63c722ee5c76569ae317ceaf80731c700b489b6bff7c0cf0074e9" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/gui/collection/</span><span class="invisible">48eb7f1b21f63c722ee5c76569ae317ceaf80731c700b489b6bff7c0cf0074e9</span></a></p><p>More details on ICEDID: <a href="https://malpedia.caad.fkie.fraunhofer.de/details/win.icedid" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malpedia.caad.fkie.fraunhofer.</span><span class="invisible">de/details/win.icedid</span></a></p><p><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a><br><a href="https://infosec.exchange/tags/CTI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTI</span></a><br><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a><br><a href="https://infosec.exchange/tags/threathunt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threathunt</span></a></p>