The pages donโt include a download link and we havenโt been able to answer the question: What does the user see?
If youโre able to find out, let us know in our DMs or comments ๐ฅ
@expelsecurity.bsky.social
The leading MDR provider trusted by some of the worldโs most renowned brands to expel adversaries, minimize risk, and build security resilience. ๐ expel.com
The pages donโt include a download link and we havenโt been able to answer the question: What does the user see?
If youโre able to find out, let us know in our DMs or comments ๐ฅ
Clicking on the โDragons Guideโ sent us to Bing instead. From Bing, we were able to view one of the several Link-pits we found. We found other sites by looking for webpages with the same โdodecadragons-guideโ in the URL.
01.08.2025 21:21 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0We also found a few hosting the SEO poisoning. Here are some examples: graduatetutor[.]org, theyansweredthecall[.]com, traykin[.]com, and mediagin[.]net.
These websites are โLink-pits.โ They hold a large number of pages and keywords to arrive high in search results.
We did some digging and found a bunch of these JavaScript files. The name is always โFULL DOCUMENT.JSโ but they come in a ZIP file with the name from the SEO poisoning. The ZIPs were named like the examples below.
01.08.2025 21:21 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0The JS file contains the following content.
It calls GetObject() with content that decodes to "scriptlet:http[:]//0x3e3cb218/vag"
That hex? Thatโs an IP address ๐ 62.60.178[.]24
When the script executes, it downloads a remote payload and starts the malware infection.
A user attempts to download a sort of guide. Their โguideโ arrives high in search results. If they download the file, they receive a .ZIP and inside the ZIP file there is a small JS file. Due to size and obfuscation, this small file can easily bypass the first pass of detections.
01.08.2025 21:21 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0โ ๏ธ Weโve noticed a campaign leveraging SEO poisoning to drop a small loader. If youโve seen the lure in the watering hole, weโd love to know. A copy of the malware can be found on VirusTotal as MD5 hash 6af56c606b4ece68b4d38752e7501457.
Hereโs what weโre seeing ๐งต
What Fortune 100s are getting wrong about cybersecurity hiring
๐ Read more: www.helpnetsecurity.com/2025/07/17/c...
#cybersecurity #cybersecuritynews #burnout #certification @expelsecurity.bsky.social
Spotted in NYC โ๐
Took cloud security so seriously we actually ended up in the clouds. โ๏ธ Thanks for having us, Nasdaq!
โ ๏ธ Weโve been keeping a close eye on the US-Israel-Iran geopolitical situation. Many resources are providing a ton of information and data but not a lot of analysis.
Our take: things are not likely to intensify in the cyber realm.
Here's what to do and what Expel is doing:
๐๐ฅ When a malicious file hits your environment, every second counts.
Expel's โdelete malicious fileโ response action enables our SOC to permanently remove a confirmed malicious file directly from an affected host, using the EDRs and security tools you already have. expel.com/blog/explore...
โ ๏ธ๐ท๏ธ Scattered Spider is acting with a heightened amount of activity. We're seeing them pivot from credential harvesting to directly targeting IT help desks, using social engineering to reset passwords and bypass MFA.
Get the full 411 on Scattered Spider's heightened activity:
Itโs Patch Tuesday! ๐ฉน This month, Microsoft released 66 CVEs including CVE-2025-33053 and CVE-2025-33070.
Of the vulnerabilities, here are the three that caught our eye as the highest priority due to the vulnerability exploitation risk factors ๐๐จ expel.com/blog/patch-t...
Learn more about how Expel MDR can work with your XSIAM deployment: expel.com/blog/more-si...
10.06.2025 17:58 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0What this means for your security team:
๐คธ Choose the best security tools for you knowing Expel can integrate with them
๐ Combine the strengths of your SIEM data & detections with Expelโs expert analysis & response capabilities
๐ฐ Receive the same high-quality Expel MDR experience
Youโve invested in your SIEM, now our goal is to make that investment ๐ธ๐ฐ๐ณ๐ฌ.
Weโre doubling down on our position as a leader in MDR flexibility by announcing the expansion of our SIEM coverage. Weโve launched advanced support for Palo Alto Networks Cortex XSIAM this month. ๐
Acquisitions happen. But when your security vendor gets bought out, it's not just business as usual. Are you ready to ask the hard questions? Because you need to.
Our CSO Greg Notch lays out the 5 questions you need to ask when your security vendor gets acquired: expel.com/blog/5-quest...
In 7 minutes you can...
๐ run a darn good mile
๐คณ doom scroll before your next meeting
๐ฅ๏ธ or onboard Expel
That's right. The onboarding even includes time to validate the connection within Expel Workbenchโข and to test the connection. Watch the full demo and follow along! expel.com/blog/how-to-...
This is where Expel MDR can partner with financial organizations to protect against bad actors attempting to look like the real deal. Learn more ๐ expel.com/blog/identit...
03.06.2025 15:53 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0The numbers paint a clear picture:
๐งโ๐ป Stolen credentials were used in 22% of breaches
๐ธ ATO incidents jumped 13% in 2024, with global losses projected to hit $17 billion by 2025
๐
80% of consumers would ditch a platform after an account takeover
๐ฆน While the convenience is great, cybercriminals are all over thisโtargeting credentials via phishing and social engineering to simply walk into your systems.
03.06.2025 15:53 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0๐ญ Identity is your new perimeter in cybersecurity. Today, hackers arenโt just breaking in, theyโre logging in.
In financial services, trust is everything. Your customers and employees need to securely access your services from anywhere.
Expel's contain host auto remediation allows our SOC analystsโwith your pre-approvalโto automatically isolate a compromised or suspicious endpoint from your network.
Learn:
โ๏ธhow our contain host auto remediation works
๐how our analysts kick off this action
๐ฅ๏ธhow to set it up
In media (and cloud) we trust ๐ซก
Join Pierre Noel on 3rd June at #Infosec2025 for insights on overcoming common cloud transformation challenges in a changing digital media ecosystem. And don't forget to come see us at stand C85 for custom AI portraits and swag. expel.com/infosecurity...
๐ท๏ธOperation Endgame just announced disruption of the infrastructure behind Lactrodectus malware, a malware used by ransomware actors to gain access to enterprise networks. But the devs are persistent so we expect them to return.
Here are the most recent tactics we've seen: expel.com/blog/followi...
Mergers and acquisitions can fuel growth but they also create opportunities for cyber threats. Join Expel's experts along with Visa's Ilaiy Elangovan on June 5 for a discussion on expanding your orgโwithout slowing down the deal. ๐ฆ๐ก๏ธ
Register now: expel.com/webinars/ma-...
New blog series alert! ๐ฆ Follow along as we explore all of Expelโs auto remediations.
In this post, we'll focus on the kill process auto remediation, which enables Expel's SOC to immediately terminate malicious processes across endpoints.
Here's how it works and how to set it up:
Now that we're (a bit more) recovered from #RSAC, we wanted to take a minute to highlight the key themes we saw this year.
๐ง AIโwhoโs using it & how
๐บ๏ธGeopolitical shifts & its impact on cybersecurity
๐ญChanges in corporate expectations
๐กHow all of this is shaping new tech
expel.com/blog/recappi...
Identity has become the new frontline in cybersecurity. ๐ชช
๐ฅ In this interview with ISMG at #RSAC 2025, our CEO Dave Merkel shares why threat actors are prioritizing identity-based attacks and what security leaders should ask when evaluating AI-enabled tools. www.databreachtoday.com/identity-new...
If you're one of the many orgs that consolidated their security tools around @microsoft.com to keep costs down and now need an MDR provider to protect these new investments, you're in the right place. ๐
Learn how Expel MDR works seamlessly with your Microsoft environment: expel.com/blog/simplif...