Christina Lekati's Avatar

Christina Lekati

@christinalekati.bsky.social

#SocialEngineering, #Psychology, #HUMINT & #OSINT intertwined for the sake of security.

3,583 Followers  |  93 Following  |  132 Posts  |  Joined: 15.07.2023
Posts Following

Posts by Christina Lekati (@christinalekati.bsky.social)

"Proven play? Replay".

This is not a one time hit. Mandiant has observed UNC1069 using these techniques to target both corporate entities and individuals within the cryptocurrency industry, as well as venture capital firms and their employees or executives. The list will expand.

13.02.2026 17:27 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

๐Ÿ”ธ Embedded within the string of commands is a single command that initiates a multi-stage infection chain, ultimately deploying 7 distinct malware families (described in the report).

13.02.2026 17:27 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

๐Ÿ”ธ And then hey, "the audio is broken!". If only that could quickly get fixed...there are only 20 minutes left in the call.

This is where the ClickFix-style social engineering begins. The the threat actor directs the victim to run troubleshooting commands on their system to fix the issue.

13.02.2026 17:27 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

๐Ÿ”ธ The call begins. The victim sees the video of a CEO from another company.

Or, purportedly, their deepfake version.

13.02.2026 17:27 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

๐˜‰๐˜ถ๐˜ต, ๐˜ธ๐˜ฉ๐˜ฆ๐˜ฏ ๐˜ข ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต ๐˜ข๐˜ค๐˜ต๐˜ฐ๐˜ณ ๐˜ต๐˜ข๐˜ฌ๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ช๐˜ฎ๐˜ฆ ๐˜ต๐˜ฐ ๐˜ฃ๐˜ถ๐˜ช๐˜ญ๐˜ฅ ๐˜ต๐˜ณ๐˜ถ๐˜ด๐˜ต ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ข ๐˜ต๐˜ข๐˜ณ๐˜จ๐˜ฆ๐˜ต ๐˜ง๐˜ช๐˜ณ๐˜ด๐˜ต, ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ณ๐˜ถ๐˜ด๐˜ต-๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ง๐˜ฆ๐˜ณ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ฎ๐˜ฆ๐˜ค๐˜ฉ๐˜ข๐˜ฏ๐˜ช๐˜ด๐˜ฎ ๐˜ฌ๐˜ช๐˜ค๐˜ฌ๐˜ด ๐˜ช๐˜ฏ. ๐˜ˆ๐˜ฏ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ๐˜ฏ, ๐˜ต๐˜ฉ๐˜ฆ ๐˜ญ๐˜ช๐˜ต๐˜ต๐˜ญ๐˜ฆ ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ง๐˜ญ๐˜ข๐˜จ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ง๐˜ฐ๐˜ญ๐˜ญ๐˜ฐ๐˜ธ ๐˜ต๐˜ฆ๐˜ฏ๐˜ฅ ๐˜ต๐˜ฐ ๐˜จ๐˜ฆ๐˜ต ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ๐˜ญ๐˜ฐ๐˜ฐ๐˜ฌ๐˜ฆ๐˜ฅ. ๐˜ˆ๐˜ด ๐˜ต๐˜ฉ๐˜ฆ๐˜บ ๐˜ฅ๐˜ช๐˜ฅ.

13.02.2026 17:27 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

๐Ÿ”ธ The Calendly link redirects to a spoofed Zoom meeting hosted on the threat actor's infrastructure: zoom[.]uswe05[.]us

๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜ช๐˜ด ๐˜ต๐˜ฉ๐˜ฆ ๐˜ง๐˜ช๐˜ณ๐˜ด๐˜ต ๐˜ฐ๐˜ฃ๐˜ท๐˜ช๐˜ฐ๐˜ถ๐˜ด ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ง๐˜ญ๐˜ข๐˜จ ๐˜ต๐˜ฉ๐˜ข๐˜ต *๐˜ค๐˜ฐ๐˜ถ๐˜ญ๐˜ฅ* ๐˜ฉ๐˜ข๐˜ท๐˜ฆ ๐˜ฃ๐˜ฆ๐˜ฆ๐˜ฏ ๐˜ด๐˜ฑ๐˜ฐ๐˜ต๐˜ต๐˜ฆ๐˜ฅ.

13.02.2026 17:27 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

๐–๐ก๐š๐ญ ๐ก๐š๐ฉ๐ฉ๐ž๐ง๐ž๐?

๐Ÿ”ธ The threat actor initiates contact with a specific victim via Telegram, using a legit but compromised account of an executive,leverageing existing trust.

๐Ÿ”ธ After building rapport through industry-specific conversation, they invite the victim to a call & send a Calendly link.

13.02.2026 17:27 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering | Google Cloud Blog North Korean threat actors target the cryptocurrency industry using AI-enabled social engineering such as deepfakes, and ClickFix.

If you think AI and deepfakes are THE name of the game in "sophisticated" social engineering attacks, think again. AI-gen deepfakes are often just one step (a final blow) in a larger social engineering kill-chain.

In this week's SE case, we see a layered intrusion.

cloud.google.com/blog/topics/...

13.02.2026 17:27 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

You will learn how to conduct an in-depth digital investigation on a subject, discover new leads, uncover and utilize all the evidence that are hiding in plain sight (and beyond) & conduct virtual HUMINT in an uncomplicated, step-by-step process.
P.S. There will be a class challenge, and a reward :)

03.02.2026 16:40 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Join @osintgeek.de and me on the 21st & 22nd of April for two days full of learning, hands-on exercises, real life case studies and the latests developments in #OSINT #SOCMINT and #HUMINT.

03.02.2026 16:40 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

๐Ž๐ฎ๐ซ "๐…๐ฎ๐ง๐๐š๐ฆ๐ž๐ง๐ญ๐š๐ฅ๐ฌ ๐จ๐Ÿ ๐‚๐ฒ๐›๐ž๐ซ ๐ˆ๐ง๐ฏ๐ž๐ฌ๐ญ๐ข๐ ๐š๐ญ๐ข๐จ๐ง๐ฌ ๐š๐ง๐ ๐‡๐ฎ๐ฆ๐š๐ง ๐ˆ๐ง๐ญ๐ž๐ฅ๐ฅ๐ข๐ ๐ž๐ง๐œ๐ž" ๐œ๐ฅ๐š๐ฌ๐ฌ ๐ข๐ฌ ๐ซ๐ž๐ญ๐ฎ๐ซ๐ง๐ข๐ง๐  ๐ญ๐ก๐ข๐ฌ ๐ฌ๐ฉ๐ซ๐ข๐ง๐  ๐ญ๐จ @blackhatevents.bsky.social ๐€๐ฌ๐ข๐š ๐ข๐ง ๐’๐ข๐ง๐ ๐š๐ฉ๐จ๐ซ๐ž! ๐ŸŽ‰

For details & registrations:
blackhat.com/asia-26/trai...

03.02.2026 16:40 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Aim for less detail in what can be visible, even through crowdsourced images.

๐Ÿ”น Prioritize based on risk and take practical steps to implement better security measures on those vulnerable, identified spots before an adversary exploits them.

May the odds ever be in our favor โœจ๏ธ

08.01.2026 09:45 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

What can be done? If you work on securing a critical infrastructure entity:

๐Ÿ”น Run your own OSINT analysis to identify vulnerabilities in advance. Know your level of exposure.

Control what you can:
๐Ÿ”น Where possible, ask platforms to add blur or remove certain imagery.

08.01.2026 09:45 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

It is scary easy for saboteurs or other attackers to find vulnerabilities on critical infrastructure free & available online, and to focus on the locations/points where an attack could have the maximum impact.
This incident has not been an isolated event.

08.01.2026 09:45 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

There is more publicly available information and databases that can be researched, found, and used in similar acts of sabotage (or worse, given the geopolitical state we are currently in).

08.01.2026 09:45 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

The Google street view imagery provides some extra help in reviewing some of the physical security and the surrounding area in preparation of a better plan.
The OpenInfraMap in combination with Google maps is just one simple example of potential adversarial OSINT.

08.01.2026 09:45 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image Post image

Looking at the OpenInfraMap data in combination with satellite imagery, it is easy to see why this point of attack was chosen: all the 110 ฮšilovolt high-voltage lines that supply southwest Berlin converge into a single cable bridge that is overground, and easily accessible.

08.01.2026 09:45 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Don't think that searching this map needs to take a lot of time. By using Overpass Turbo (also with the help of with any LLM that it is compatible with) one can significantly trim the search time and concentrate their research through queries.

08.01.2026 09:45 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

๐Ž๐ฉ๐ž๐ง๐ˆ๐ง๐Ÿ๐ซ๐š๐Œ๐š๐ฉ (๐ก๐ญ๐ญ๐ฉ๐ฌ://๐จ๐ฉ๐ž๐ง๐ข๐ง๐Ÿ๐ซ๐š๐ฆ๐š๐ฉ.๐จ๐ซ๐ /) is an open-source web platform that provides a layered, detailed visualization on global infrastructure data like ๐˜ฑ๐˜ฐ๐˜ธ๐˜ฆ๐˜ณ, ๐˜ต๐˜ฆ๐˜ญ๐˜ฆ๐˜ค๐˜ฐ๐˜ฎ, ๐˜ฐ๐˜ช๐˜ญ ๐˜ข๐˜ฏ๐˜ฅ ๐˜จ๐˜ข๐˜ด ๐˜ฏ๐˜ฆ๐˜ต๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ๐˜ด, ๐˜ธ๐˜ข๐˜ต๐˜ฆ๐˜ณ ๐˜ช๐˜ฏ๐˜ง๐˜ณ๐˜ข๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ถ๐˜ณ๐˜ฆ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฎ๐˜ข๐˜ซ๐˜ฐ๐˜ณ ๐˜ณ๐˜ข๐˜ช๐˜ญ ๐˜ฑ๐˜ฐ๐˜ธ๐˜ฆ๐˜ณ ๐˜ด๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ๐˜ด ๐˜ช๐˜ฏ๐˜ง๐˜ณ๐˜ข๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ถ๐˜ณ๐˜ฆ (data is crowdsourced from OpenStreetMap).

08.01.2026 09:45 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

How did they know to set on fire one specific bridge that contained 5 high-voltage and 10 med-voltage cables,causing a major power outage?
Can one find enough information on a city's power grid infrastructure available online?

Yes,they can. With more detail than there should be.

08.01.2026 09:45 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image Post image

Berlin was faced with a 2nd arson attack on their power grid within a few months, leaving thousands of households without power, for days. Several systems were damaged simultaneously deeming any backup systems, ineffective.
An attack like this requires some reconnaissance.
๐Ÿงต

08.01.2026 09:45 โ€” ๐Ÿ‘ 13    ๐Ÿ” 6    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Adversarial Misuse of Generative AI | Google Cloud Blog We share our findings on government-backed and information operations threat actor use of the Gemini web application.

Report by Google (government-backed threat actor use of the Gemini): cloud.google.com/blog/topics/...

04.08.2025 10:11 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Detecting and Countering Malicious Uses of Claude Detecting and Countering Malicious Uses of Claude

2 additional reports on how GenAI has been used in social engineering attacks. They provide a more holistic understanding on how these tools are being used by adversaries:

Report by Anthropic (Claude): www.anthropic.com/news/detecti...

04.08.2025 10:11 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

๐Ÿ”น I know that some of you in my network (and some of our clients) had to deal with the attacks documented. This will hit home.

๐Ÿ”น Ultimately, we can use this report help us further improve our defense strategies with reality in mind.

04.08.2025 10:11 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

๐Ÿ”น The operations described in the report help give us a better understanding of how threat actors are *realistically* trying to abuse GenAI models. No guesses, no fancy assumptions, just the observed TTPs.

04.08.2025 10:11 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
Disrupting malicious uses of AI: June 2025 Our latest report featuring case studies of how weโ€™re detecting and preventing malicious uses of AI.

3 resources in 1 post:
Open AI has released a new report outlining the ways in which threat actors used their generative AI products to support their social engineering attack operations. They provide the case studies.

openai.com/global-affai...

Why is this useful? ๐Ÿงต

04.08.2025 10:11 โ€” ๐Ÿ‘ 5    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1
Post image

Happy news!! This September at @brucon we will be taking a deep dive into #socialengineering and #OSINT through a 3-day, hands-on training class!
I SO look forward to it and to meeting the participants!! ๐Ÿคฉ๐Ÿ‘ฉ๐Ÿปโ€๐Ÿ’ป

Full class content & details: www.brucon.org/training-det...

16.07.2025 16:30 โ€” ๐Ÿ‘ 4    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Always fun hanging out with you @cyber.coffee! ๐Ÿ™Œ๐Ÿป

17.06.2025 11:37 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image Post image

Very grateful for last week spent at X33fcon in Poland!
It started with 2 days full of #socialengineering & #OSINT training where I had the privilege to teach a class that was present, curious, and ready to try things out.
Big bonus: reconnecting with friends during the conference days afterwards๐Ÿ˜Š

17.06.2025 09:50 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Preview
When AI Goes Rogue: How Agentic AI Will Reshape Social Engineering Attacks Cyber criminals are rarely late to the game when it comes to new technologies. In fact, theyโ€™re often among the first ones to experimentโ€ฆ

Agentic AI has opened new frontiers for adversaries looking to automate and scale attacks.

I wrote an article explaining what Agentic AI really is & how it can shape the future of the social engineering threat landscape.

christina-lekati.medium.com/when-ai-goes...

21.05.2025 12:49 โ€” ๐Ÿ‘ 0    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0