Adrian Luca's Avatar

Adrian Luca

@adrianluca.bsky.social

Security Test & Threat intelligence Engineer @virusbtn.bsky.social

121 Followers  |  326 Following  |  2 Posts  |  Joined: 19.11.2024  |  1.9156

Latest posts by adrianluca.bsky.social on Bluesky

VB2026 Seville 30 Sept - 2 Oct

VB2026 Seville 30 Sept - 2 Oct

We are thrilled to officially announce that VB2026 will take place in the vibrant city of Seville, Spain, from 30 September to 2 October 2026.

More details coming soon on the venue, call for papers, sponsorship opportunities, and how to join us.

Can't wait to see you there!

01.10.2025 13:41 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Malware Analysis - Intermediate Level Signature writing, deobfuscation, dynamic API resolving, syscalls, hooking, shellcode analysis and more

My intermediate level malware analysis course is there.
60% off for the next two weeks.

malwareanalysis-for-hedgehogs.learnworlds.com/course/inter...

01.09.2025 15:17 โ€” ๐Ÿ‘ 9    ๐Ÿ” 6    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

In a new Bulletin article, Dr Sarah Gordon calls for a shift not just in how AI systems are secured, but in how we design them, as well as acknowledgement of emotional simulation as a distinct attack vector. www.virusbulletin.com/virusbulleti...

20.08.2025 12:57 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Mind map of SocGholish (Operated by TA56) infection chains. The details are complex but explained in more detail on our blog post.

Mind map of SocGholish (Operated by TA56) infection chains. The details are complex but explained in more detail on our blog post.

Our team @silentpush just dropped a definitive look at SocGholish (operated by TA569) and the initial access broker ecosystem they are facilitating. Big thanks to past researchers who have worked on SocGholish! We've got details about our visibility @ www.silentpush.com/blog/socghol... ๐Ÿ––๐Ÿป

06.08.2025 19:49 โ€” ๐Ÿ‘ 11    ๐Ÿ” 5    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Weaponized PDF leading to rogue ScreenConnect download

Weaponized PDF leading to rogue ScreenConnect download

Compromised travel agency in Sri Lanka ๐Ÿ‡ฑ๐Ÿ‡ฐ spreading fake Royal Air Maroc โœˆ๏ธ๐Ÿ‡ฒ๐Ÿ‡ฆemails with a weaponized PDF ๐Ÿ“„ that leads to a rogue ConnectWise ScreenConnect download ๐Ÿ”ฅ

โžก๏ธ hunting.abuse.ch/hunt/6890d35...

Payload delivery URL + botnet C2 are hosted at 51.89.204 .89 (StarkRDP ๐Ÿ‡ฉ๐Ÿ‡ช)

04.08.2025 16:08 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

CISA has released Thorium, a malware analysis platform

www.cisa.gov/resources-to...

Also on GitHub: github.com/cisagov/thor...

31.07.2025 18:11 โ€” ๐Ÿ‘ 23    ๐Ÿ” 6    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Fake gaming website leading to LummaStealer download

Fake gaming website leading to LummaStealer download

We've observed an interesting infection chain โ›“๏ธ in the wild, starting with #LummaStealer spread through a fake gaming website and resulting in #Latrodectus and #SectopRat ๐Ÿชฒ๐Ÿ”๐Ÿ‘€

See below for more...

31.07.2025 11:54 โ€” ๐Ÿ‘ 5    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Top 5 Reasons Security Companies Are Sending Their Teams to VB2025

Top 5 Reasons Security Companies Are Sending Their Teams to VB2025

Leading security companies are sending their teams to #VB2025, and not without reason.

Research-first content, real-world relevance, and networking that actually helps.

๐Ÿ“ Berlin | 24โ€“26 Sept

See the top 5 reasons in our blog post ๐Ÿ‘‡ tinyurl.com/26n6t6ye

25.07.2025 12:23 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

2025-07-15 (Tuesday): Some different IOCs from the #SmartApeSG #ClickFix page today.

warpdrive[.]top <-- domain used for SmartAgeSG injected script and to display ClickFix page.

sos-atlanta[.]com <-- domain from script injected into clipboard and to retrieve #NetSupportRAT malware package

15.07.2025 19:18 โ€” ๐Ÿ‘ 5    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

A programming fact that still amazes me is that the HTTP header which containers the referring url is called "referer", because the developer spelt "referrer" wrong and the spell checker didn't catch it, so it made it into the official standards and they just never changed it lmao

11.07.2025 05:45 โ€” ๐Ÿ‘ 226    ๐Ÿ” 28    ๐Ÿ’ฌ 13    ๐Ÿ“Œ 1

After years of dominance in #ESETโ€™s top #infostealer statistics, the era of #AgentTesla has come to an end. It finished H1 2025 in fourth place, its numbers having decreased by 57%. The reason? It is no longer under active development. 1/4

09.07.2025 12:11 โ€” ๐Ÿ‘ 6    ๐Ÿ” 6    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

I'm thrilled to be speaking at #VB2025 this September in Berlin! My talk will focus on TAG-124, a widespread traffic distribution system, and its role in the cybercriminal ecosystem, with a particular emphasis on its link to ransomware operations! ๐Ÿ‘‰ tinyurl.com/3hurr52m

16.06.2025 07:14 โ€” ๐Ÿ‘ 20    ๐Ÿ” 5    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

-CoinMarketCap hacked via animated logo
-White House rejects NSA & CyberCom nomination
-FCC probes US Cyber Trust Mark program
-Cyberattack disrupts Russian animal processing industry
-Iran hacks Albania's capital Tirana

Podcast: risky.biz/RBNEWS441/
Newsletter: news.risky.biz/risky-bullet...

23.06.2025 07:48 โ€” ๐Ÿ‘ 14    ๐Ÿ” 7    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 1
HTML source of page from legitimate but compromised site showing SmartApeSG injected script.

HTML source of page from legitimate but compromised site showing SmartApeSG injected script.

Example of a ClickFix-style page caused by the injected SmartApeSG script.  A victim must click to get the popup and follow the instructions to paste and run the malicious script.

Example of a ClickFix-style page caused by the injected SmartApeSG script. A victim must click to get the popup and follow the instructions to paste and run the malicious script.

Traffic from an infection filtered in Wireshark.  This shows the NetSupport RAT C2 traffic and StealC v2 traffic.

Traffic from an infection filtered in Wireshark. This shows the NetSupport RAT C2 traffic and StealC v2 traffic.

2025-06-18 (Wed): #SmartApeSG --> #ClickFix lure --> #NetSupportRAT --> #StealCv2

A #pcap of the traffic, the malware/artifacts, and some IOCs are available at www.malware-traffic-analysis.net/2025/06/18/i....

Today's the 12th anniversary of my blog, so I made this post a bit more old school.

19.06.2025 04:23 โ€” ๐Ÿ‘ 11    ๐Ÿ” 5    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Thank you Martijn!

19.06.2025 07:23 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

We published the VBSpam Q2 2025 report: All tested solutions demonstrated robust performance, achieving spam catch rates exceeding 90%, underscoring the general maturity of spam detection capabilities.

18.06.2025 10:03 โ€” ๐Ÿ‘ 3    ๐Ÿ” 2    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1
An archive.org snapshot of the LosPollos push monetization affiliate network. The LosPollos ad network incorporates many elements and references from the hit series โ€œBreaking Bad,โ€ mirroring the fictional โ€œLos Pollos Hermanosโ€ restaurant chain that served as a money laundering operation for a violent methamphetamine cartel. The LosPollos advertising website invokes characters and themes from the hit show Breaking Bad. In the center is a lego version of the meth cook and main co-star Jesse, standing in front of a what appears to be a meth lab. The logo for LosPollos (upper left) is the image of Gustavo Fring, the fictional chicken restaurant chain owner in the show.

An archive.org snapshot of the LosPollos push monetization affiliate network. The LosPollos ad network incorporates many elements and references from the hit series โ€œBreaking Bad,โ€ mirroring the fictional โ€œLos Pollos Hermanosโ€ restaurant chain that served as a money laundering operation for a violent methamphetamine cartel. The LosPollos advertising website invokes characters and themes from the hit show Breaking Bad. In the center is a lego version of the meth cook and main co-star Jesse, standing in front of a what appears to be a meth lab. The logo for LosPollos (upper left) is the image of Gustavo Fring, the fictional chicken restaurant chain owner in the show.

New, by me: A Dark Adtech Empire Fed by Fake CAPTCHAs

Late last year, security researchers made a startling discovery: Kremlin-backed disinformation campaigns were bypassing moderation on social media platforms by leveraging the same malicious advertising [โ€ฆ]

[Original post on infosec.exchange]

12.06.2025 23:52 โ€” ๐Ÿ‘ 10    ๐Ÿ” 33    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Official site of the DNS4EU project Join DNS4EU, an EU initiative providing secure, private, and reliable DNS services for users across Europe. Safeguard your online experience with DNS solutions that prioritise privacy, data protection...

For those of you looking for privacy and security focused European DNA provider then you should look at the @enisa_eu@respublicae.eu supported DNS4EU service that has been recently launched.

#cybersecurity #EU #Privacy #DataSovereignty

www.joindns4.eu

09.06.2025 13:15 โ€” ๐Ÿ‘ 7    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
View of the Botconf 2025 conference with a large blue screen at the top. Mostly empty seats for now, 5 people can be seen.

View of the Botconf 2025 conference with a large blue screen at the top. Mostly empty seats for now, 5 people can be seen.

These were the last technical tests before the beginning of #Botconf2025...

and we have started with a live broadcast at https://www.youtube.com/BotconfTV

21.05.2025 09:33 โ€” ๐Ÿ‘ 3    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

And hashtag#Botconf2025 is back online with the second day of our main conference. You can follow many talks live by reaching this link

https://youtube.com/playlist?list=PL8fFmUArVzKjMgBjO4EQ-O_7U8ok3C-06

22.05.2025 07:12 โ€” ๐Ÿ‘ 2    ๐Ÿ” 5    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Diagram showing a high-level overview of how hijacked cloud resource domains are used for malicious activities by Hazy Hawk.

Diagram showing a high-level overview of how hijacked cloud resource domains are used for malicious activities by Hazy Hawk.

Inflobox researchers Jacques Portal & Renรฉe Burton look into Hazy Hawk, an actor that hijacks abandoned cloud resources of high-profile organizations. The hijacked domains are used to host large numbers of URLs that send users to scams & malware via different TDSs. blogs.infoblox.com/threat-intel...

21.05.2025 10:48 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Have you ever wanted to read a 215-page report on Doppelganger, the Russian disinformation group? Now's your chance!

mpf.se/psychologica...

18.05.2025 09:57 โ€” ๐Ÿ‘ 156    ๐Ÿ” 55    ๐Ÿ’ฌ 5    ๐Ÿ“Œ 4
Post image

๐Ÿšจ The wait is over โ€” the full program of briefings for the Honeynet Project Workshop 2025 in Prague is now live! ๐ŸŽ‰

๐Ÿ“ NTK, Prague
๐Ÿ—“ June 2โ€“4, 2025
๐Ÿ‘‰ Register today: prague2025.honeynet.org/program/

#honeynet2025 #cybersecurity #infosec #deception #cyberdeception #TI #TTPs #Malware

14.05.2025 12:59 โ€” ๐Ÿ‘ 5    ๐Ÿ” 5    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Did you know?
The VB2025 venue is only a 5-min walk from the Brandenburg Gate. 
See you there!
VB2025 Berlin 24-26 Sept 2025

Did you know? The VB2025 venue is only a 5-min walk from the Brandenburg Gate. See you there! VB2025 Berlin 24-26 Sept 2025

Join us in the heart of Berlin for #VB2025!

The JW Marriott offers premium space, top networking, and is
steps from Tiergarten & the Brandenburg Gate.

More info coming soon!

๐Ÿ—“๏ธ 24โ€“26 Sept 2025
๐Ÿ“JW Marriott Berlin

โžก๏ธ tinyurl.com/y95v38wz

#Cybersecurity #Berlin

16.04.2025 13:00 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Logo VIGINUM + Analyse du mode opรฉratoire informationnel russe Storm-1516

Logo VIGINUM + Analyse du mode opรฉratoire informationnel russe Storm-1516

VIGINUM publie un rapport sur les activitรฉs de Storm-1516, un mode opรฉratoire informationnel russe susceptible dโ€™affecter le dรฉbat public francophone et europรฉen.
Ce rapport s'appuie sur l'analyse de 77 opรฉrations informationnelles conduites par Storm-1516 โžก๏ธ www.sgdsn.gouv.fr/publications...

07.05.2025 08:22 โ€” ๐Ÿ‘ 96    ๐Ÿ” 67    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 24

Thank you!

07.05.2025 09:05 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
VB2025 programme is live
Three days. Many voices. One Berlin.
VB2025 Berlin 24-26 September 2025

VB2025 programme is live Three days. Many voices. One Berlin. VB2025 Berlin 24-26 September 2025

The wait is over: The VB2025 programme is here.

Three days of bold ideas, sharp minds, and real-world security insight.

๐Ÿ‘€ Tickets? Coming very soon.

๐Ÿ—“๏ธ 24โ€“26 September 2025
๐Ÿ“JW Marriott Hotel, Berlin

๐Ÿ‘‰ www.virusbulletin.com/conference/v...

#VB2025 #Cybersecurity #Infosec #Berlin

02.05.2025 13:37 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Malware Analysis - Virut, a polymorphic file infector
YouTube video by MalwareAnalysisForHedgehogs Malware Analysis - Virut, a polymorphic file infector

๐Ÿฆ” ๐Ÿ“นNew Video: Analysis of Virut - Part I
โžก๏ธ self-modifying code
โžก๏ธ Ghidra markup decryption stub
โžก๏ธ API resolving
โžก๏ธ unpacking
#MalwareAnalysisForHedgehogs
www.youtube.com/watch?v=250B...

30.04.2025 14:04 โ€” ๐Ÿ‘ 3    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐Ÿ‘€ Lโ€™ANSSI et ses partenaires du Centre de Coordination des Crises #Cyber ont observรฉ le ciblage et la compromission dโ€™entitรฉs franรงaises par le mode opรฉratoire dโ€™attaque (MOA) APT28, attribuรฉ publiquement par lโ€™Union Europรฉenne ร  la Russie.

๐Ÿ”—ร€ lire ici : www.cert.ssi.gouv.fr/cti/CERTFR-2...

29.04.2025 13:10 โ€” ๐Ÿ‘ 30    ๐Ÿ” 29    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1
Flow chart showing the  Morphing Meerkat attack chain.

Flow chart showing the Morphing Meerkat attack chain.

An Infoblox report looks into a DNS technique used to tailor content to victims. A phishing kit developed by the Morphing Meerkat actor creatively employs DNS mail exchange (MX) records to dynamically serve fake, tailored login pages, spoofing over 100 brands. blogs.infoblox.com/threat-intel...

03.04.2025 09:54 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@adrianluca is following 20 prominent accounts