L²'s Avatar

@lgde.bsky.social

DFIR. Ex-Lead intelligence. Ex @ANSSI_FR. PhD in intl law. Mostly working on Chinese #APT but also on russian and cybercrime actors #ThreatIntel #Malware #DFIR https://linktr.ee/l_lgde

214 Followers  |  488 Following  |  6 Posts  |  Joined: 30.09.2023
Posts Following

Posts by L² (@lgde.bsky.social)

Preview
GreyNoise Observes Active Exploitation of Critical Apache Tomcat RCE Vulnerability (CVE-2025-24813) Attackers are actively exploiting Apache Tomcat servers by leveraging CVE-2025-24813. If successfully exploited it could enable remote code execution. GreyNoise has identified multiple IPs engaging in...

🚨Active Exploitation Alert: Critical Apache Tomcat RCE (CVE-2025-24813). Majority of traffic targeting U.S.-based systems. Full analysis & attacker IPs⬇️
#ApacheTomcat #Apache #GreyNoise #Vulnerability #CVE202524813

20.03.2025 19:31 — 👍 13    🔁 6    💬 1    📌 0
Post image

Trump administration does not believe Russia represents a cyber threat against US national security or critical infrastructure? www.theguardian.com/us-news/2025...

28.02.2025 20:34 — 👍 36    🔁 17    💬 2    📌 5
How Long Can a Vulnerable Server Stay Clean on the Internet? A Honeypot Tale – Securite360

How long can a vulnerable server stay clean on the internet? A honeypot tale. #malware #miner #redtail

🔗 securite360.net/how-long-can...

27.02.2025 11:51 — 👍 4    🔁 1    💬 0    📌 0
Post image

#BREAKING Europe's security is at a 'turning point': EU chief

17.02.2025 13:02 — 👍 44    🔁 15    💬 3    📌 2

A lire absolument, pour ceux qui souhaitent comprendre l'ampleur de ce que les #databrokers obtiennent comme info sur les internautes.

#adint #cybercriminalité #sensibilisation

Merci #LeMonde pour cet excellent article.

www.lemonde.fr/pixels/artic...

12.02.2025 16:45 — 👍 10    🔁 4    💬 3    📌 1
Preview
ScatterBrain: Unmasking the Shadow of PoisonPlug's Obfuscator | Google Cloud Blog We been tracking multiple espionage operations conducted by China-nexus actors utilizing POISONPLUG.SHADOW malware.

The blog feels like a retro FLARE blog from the good old FireEye days!

Shout out to Nino Isakovic, @qutluch.bsky.social and @lukejenx.bsky.social

cloud.google.com/blog/topics/...

29.01.2025 08:46 — 👍 12    🔁 4    💬 1    📌 0
Deobfuscation of Lumma Stealer Introduction

Deobfuscation of Lumma Stealer

ryan-weil.github.io/posts/LUMMA-...

#malware #infosec #stealer #writeup

23.12.2024 07:23 — 👍 1    🔁 1    💬 0    📌 0

ReversingLabs researchers have identified 18 malicious VSCode extensions available through the official VSCode Marketplace.

As soon as the extensions were removed from the VSCode Marketplace, the attacker uploaded similar malicious projects on the npm portal.

www.reversinglabs.com/blog/a-new-p...

18.12.2024 23:30 — 👍 28    🔁 13    💬 0    📌 0
Post image

Spotting PLA activity is rare - every opportunity to investigate matters. Dive in #Nomadpanda #RedFoxtrot #Quickheal #malware securite360.net/a-painful-qu...

13.12.2024 21:08 — 👍 2    🔁 3    💬 0    📌 0

In relation to the RDP phish campaign detailed below: Not sure it's been mentioned, but apparently both the Swedish and Norwegian governments were at least on the target list, judging by these phish domains.

regeringskansliet-se[.]cloud
dep-no[.]cloud

#infosec #apt

microsoft.com/en-us/security/b…

05.12.2024 14:28 — 👍 2    🔁 1    💬 1    📌 0
Preview
Stark Industries Solutions: An Iron Hammer in the Cloud Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distr...

An investigation into Stark Industries reveals it is being used as a global proxy network that conceals the true source of cyberattacks and disinformation campaigns against enemies of Russia.
krebsonsecurity.com/2024/05/star...

01.12.2024 08:19 — 👍 5    🔁 4    💬 0    📌 0
Preview
Damage to Baltic Sea submarine cables: Why suspicion is focusing on a Chinese vessel Le Monde has reconstructed the itinerary of the Yi-Peng 3, revealing why this merchant ship, currently immobilized between Sweden and Denmark, is the number one suspect in the damage caused to two sub...

Why is a Chinese ship suspect in the damage to Baltic Sea cables? @lemonde.fr has reconstructed the itinerary of the Yi Peng 3, revealing that this merchant ship, now idle between Sweden and Denmark, was precisely sailing above the cables at the time they broke—sometimes down to the exact second.

22.11.2024 09:26 — 👍 20    🔁 4    💬 1    📌 0
Preview
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack In a first, Russia's APT28 hacking group appears to have remotely breached the Wi-Fi of an espionage target by hijacking a laptop in another building across the street.

Russian spies—likely Russia's GRU intelligence agency—used a new trick to hack a victim in Washington, DC: They remotely infected another network in a building across the street, hijacked a laptop there, then breached the target organization via its Wifi. www.wired.com/story/russia...

22.11.2024 12:06 — 👍 580    🔁 328    💬 12    📌 46
About Apple threat notifications and protecting against mercenary spyware - Apple Support Apple threat notifications are designed to inform and assist users who may have been individually targeted by mercenary spyware.

If you're part of civil society and received an Apple notification. The Amnesty Security Lab would be happy to test your phone!

The Apple notification looks like this: support.apple.com/en-us/102174

The Security Lab can be contacted here: securitylab.amnesty.org/get-help/

20.11.2024 12:50 — 👍 28    🔁 25    💬 0    📌 0
Preview
An Infostealer Searching for « BIP-0039 » Data - SANS Internet Storm Center

An Infostealer Searching for « BIP-0039 » Data isc.sans.edu/diary/31464

22.11.2024 04:02 — 👍 6    🔁 3    💬 0    📌 0
Post image

Podcast: risky.biz/RBNEWS364/
Newsletter: news.risky.biz/risky-biz-ne...

-US charges five Scattered Spider members
-Apple fixes macOS zero-days
-T-Mobile finally stops a breach
-US takes down PopeyeTools carding portal
-Thailand throws out NSO lawsuit
-Microsoft develops something dumb, part 9,136

22.11.2024 10:40 — 👍 21    🔁 11    💬 1    📌 0
Post image

A few months' old post but maybe still relevant securite360.net/unveiling-sh...

17.11.2024 14:18 — 👍 1    🔁 0    💬 0    📌 0
Une grenouille et ses têtards

Une grenouille et ses têtards

Pour nos prochaines rencontres cyber, nous sommes à la recherche de doctorants volontaires pour parler de leurs travaux (cybersecurité ou manipulation de l'information/réseaux sociaux)
Rejoignez nous pour les "têtards" !
contact@m82-project.org

15.12.2023 19:14 — 👍 2    🔁 7    💬 0    📌 0
Post image

[CTI insights]

The latest Qakbot payload distributed happened to be packed by the Dave crypter. The DLL decrypts a resource containing Dave's encrypted shellcode and executes it! (cf. securityintelligence.com/x-force/tric...)

21.12.2023 10:07 — 👍 2    🔁 2    💬 1    📌 0
Aki-RATs - Command and Control Party

Last piece from our CERT, on Akira this time ✍

03.12.2023 12:06 — 👍 1    🔁 0    💬 0    📌 0

Happy to share our new CTI report about Lumma stealer 🕵‍♂️

18.10.2023 08:46 — 👍 1    🔁 0    💬 0    📌 0
Post image

Last friday, we published a report on GuLoader targeting the energy sector in 🇫🇷 and elsewhere.

This report, initially drafted in July for our client, has been recently updated to include new victims we identified.

www.intrinsec.com/wp-content/u...

05.10.2023 05:28 — 👍 4    🔁 0    💬 0    📌 0
Post image

New #Bumblebee campaign leveraging CVE-2023-38831
Botnet ID : is0210
RC4 key : NEW_BLACK
C2 : g7qf7ew5c[.]life
TTPs : .RAR -> .EXE

04.10.2023 16:43 — 👍 1    🔁 1    💬 1    📌 0