Cert Central has an unauthenticated API endpoint to return the database as a csv: certcentral[.]org/api/download_csv
It used in CCCS' AssembyLine as a blacklist.
@securityaura.bsky.social
uses it for threat hunting github.com/SecurityAura...
Looking forward to see what others do with it.
19.06.2025 10:22 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
The scammers have tricked millions through text messages:
Who are they and how do they scam us?
A team of journalists in Norway spent a year secretly monitoring a credit card fraud gang to uncover who's behind it and how they operate. Here's the story -- in English -- of how they unmasked Darcula and the crime-as-a-service software Magic Cat. www.nrk.no/dokumentar/x...
05.05.2025 15:03 โ ๐ 43 ๐ 22 ๐ฌ 1 ๐ 2
Again? :(
21.04.2025 21:01 โ ๐ 3 ๐ 0 ๐ฌ 0 ๐ 0
Scammers are happily abusing multiple platforms at once thanks to lack of controls.
Who's going to protect users here? Google? Facebook?
11.03.2025 17:49 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0
If you manage #wordpress sites using #managewp, watch out for this #phishing campaign via #googleads.
-> menagewp[.]com (ad URL and redirect)
-> orion[.]manaqewp[.]com (phishing page)
24.03.2025 22:36 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0
Impostor certificate:
EV Code-signing certificate "Yurisk LLC", used to sign fake NordPass installer.
Abused and revoked within 1 week of issuance. Company registration says they transport freight.
04.04.2025 12:44 โ ๐ 2 ๐ 1 ๐ฌ 1 ๐ 0
Fake PuTTy, signed "Eptins Enterprises Llp"
Sets scheduled task "Security Updater" and checks into IP address: 185.196.10.127
Triage: tria.ge/250401-wnbad...
www.virustotal.com/gui/file/7ca...
@jeromesegura.com
01.04.2025 18:58 โ ๐ 0 ๐ 1 ๐ฌ 0 ๐ 0
Fake SCPToolkit uploaded to MB by aachum:
Signed EXE "jmutanen software Oy" loads an MSI and the real SCPToolkit as a decoy. Installs ScreenConnect: microsoftnet[.]ru
Files from signer: bazaar.abuse.ch/browse/tag/j...
Zip with parts:
www.virustotal.com/gui/file/1df...
01.04.2025 12:16 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0
Signed DLL, 2/70 hits on VT? virustotal.com/gui/file/224...
Actually easy to see it downloads from PasteBin and excludes C:
I created a course with KC7Cyber
to showcase and educate: kc7cyber.com/modules/VT101
I like to promote it because I know details like these get looked over.
19.03.2025 23:21 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Dang. Black Basta spending $500 to run a campaign and $4,000 for the Extended Validation certificate. ๐คฏ
Great to see the code-signing certificate abuse the other side. Great use of Cert Central: tying certificates BB talked about back to the actual malwares.
18.03.2025 17:12 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Signed malware "Webber Air Investments LLC"
First seen 23 days ago targeting YouTubers, rip.
Vidar C2: 95.217.30.53
bazaar.abuse.ch/browse/tag/W...
18.03.2025 10:31 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Our SOC noticed that some attackers using the ClickFix and Fake Captcha technique are also providing text incase their payloads are read by AI or LLM.
Learn more about fake captchas: expel.com/blog/expel-q...
14.03.2025 16:44 โ ๐ 5 ๐ 3 ๐ฌ 0 ๐ 0
Ya'll will start seeing more files signed by Microsoft.
Please report them to centralpki@microsoft[.com or just tag me at a minimum, please.
Microsoft has been good at revoking them
This week I saw
Lumma Infostealer
QuasarRAT
CobaltStrike (C2: uuuqf[.]com)
www.virustotal.com/gui/file/401...
14.03.2025 11:05 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
Fake MalwareBytes installer.
Installs Zoom as a decoy: tria.ge/250308-wyeqk...
Rhadamanthys, per VirusTotal's config extractor.
virustotal.com/gui/file/4c2...
C2: 185.33.87.209
08.03.2025 18:34 โ ๐ 3 ๐ 1 ๐ฌ 0 ๐ 0
Understanding the technique is important. This technique accounts for essentially 78% of bloated files (out of 1000).
Debloat handles 91% of examples but only PE files.
When attackers use this technique with other file types, you'll be on your own until debloat adds support.
08.03.2025 16:13 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Fake Zoom reaches out to Namecheap domain ZoomInstaller[.]com
Fake MagicApp also installs Zoom; reaches out to Github and Namecheap domain MagicVision[.]io
Both suspiciously over 100MB due to .NET resource.
tria.ge/250308-mqs4j...
tria.ge/250308-mpm6x...
Certificate reported.
08.03.2025 11:00 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Code-signing certs reported this morning:
BlackmoonBanker signed by trading company "็ฆๅท้ๅพทๆด่ดธๆๆ้ๅ
ฌๅธ"
Fake DeepSeek signed by pharma company "TRUONG LUU THUY PHARMA COMPANY LIMITED"
Fake games, installs uTorrent, signed by construction company "MASTER SGDN BAU GMBH"
26.02.2025 12:25 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0
Ah yes, the Austrian construction company that makes my favorite games.
www.virustotal.com/gui/file/e48...
26.02.2025 11:37 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
I suspect that a lot of folk don't realize that a lot of the certificates Cert Central handles are for files that are not detected by any detection engine.
Today's example was a 1Password Setup application. The file downloads the real 1Password as a decoy
www.joesandbox.com/analysis/162...
21.02.2025 12:52 โ ๐ 3 ๐ 1 ๐ฌ 0 ๐ 0
Want experience doing malware analysis, categorizing threat actors, and other malware shaped things?
We need more individual contributors for Cert Central. DM or email admin at certcentral . org
As it turns out, we have a lot of malware to analyze.
21.02.2025 12:46 โ ๐ 5 ๐ 2 ๐ฌ 0 ๐ 0
Good to hear, I've been wondering about you guys. You 404Media folk have been hammering stuff out every day for the past few months.
I hope the rest of the team gets some rest too.
20.02.2025 21:22 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Certificate signing DarkGate malware reported: "BLVS Tech Inc."
DarkGate gets signed with a code-signing certificate fairly often. CertCentral.org is tracking 23 instances, I'm sure it happens more than that though.
www.virustotal.com/gui/file/e92...
bazaar.abuse.ch/browse/tag/B...
12.02.2025 09:46 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
Website: certcentral.org
certReport has been updated to 3.2: you can use an API key and "-p" to submit reports to the database. Read more here: certcentral.org/reporting_to...
We can handle submitting your reports too. See the website for more details. :)
10.02.2025 13:53 โ ๐ 2 ๐ 0 ๐ฌ 0 ๐ 0
Cert Central .org is live!
We track and report abused code-signing certs.
By submitting to the website, you contribute to the DB of >800 certsโa DB you can access and view.
Want to get more involved? Check out the Training and Research pages to learn more. 1/2
10.02.2025 13:53 โ ๐ 14 ๐ 7 ๐ฌ 1 ๐ 0
I am working on a public platform to make it even easier for people to report code-signing certificates.
My goal is to continue to raise awareness on the abuse and the impact revocation has on malware distributors. Keep an eye on my socials for more news.
28.01.2025 13:39 โ ๐ 9 ๐ 3 ๐ฌ 0 ๐ 0
#Signed #Reported "44.211.848 NICOLAS SAMUEL DE ALMEIDA"
Fake Open AI Sora downloads. User receives file "video_for_you.mp4 - openai\.com"
You always know it is going to be a special time when the VT comments are stories.
www.virustotal.com/gui/file/acd...
27.01.2025 13:11 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0
GCIH, GCFE | DFIR, Threat Hunting, Detection Engineering | @CuratedIntel DFIR Member
https://github.com/SecurityAura
http://infosec.exchange/@SecurityAura
Threat Hunter at SentinelOne | curatedintel.org Member | k3yp0d.blogspot.com | Opinions are of my own voices inside my own head | memes and music are welcome
Cybersecurity reporter at Bloomberg News in DC. Signal: @howelloneill.01, email: patoneill1@bloomberg.net
computer security person. former helpdesk.
President of Signal, Chief Advisor to AI Now Institute
reverse engineering, cryptography, exploits, hardware, file formats, and generally giving computers a hard time
Fedi: @retr0id@retr0.id
Macroblog: https://www.da.vidbuchanan.co.uk/blog/
Founder & CEO LutaSecurity @payequitynow MIT&Harvard visiting scholar, @MasonNatSec fellow, 1/2 Chamoru, 1/2 Greek all-American hacker
Writer for WIRED. Author of SANDWORM. New book, TRACERS IN THE DARK: The Global Hunt for the Crime Lords of Cryptocurrency, out now. agreenberg@wired.com. Andy.01 on Signal.
Washington Post reporter covering hacking, disinformation and whatโs left of privacy. Author of books on the Cult of the Dead Cow, organized criminal hacking, and Napster. Pulitzer co-finalist 2024. Signal joemenn.01
Geopolitics, Russia, China, Cyber
Chairman @silverado.org
Author of WorldOnTheBrink.com
Host GeopoliticsDecanted.com podcast
Founder Alperovitch Institute for Cybersecurity Studies at Johns Hopkins SAIS
Co-Founder CrowdStrike
@DAlperovitch elsewhere
Real-time historian of the late cyber capitalist era @TechCrunch. Posts about infosec, surveillance by day. ๐, โฝ๏ธ, ๐ธ, ๐ฎ by night.
โ๏ธ Signal: +1 917 257 1382
Past lives: VICE Motherboard, Mashable, WIRED.
cybersecurity weather man. scanning the horizons for cloudy cyber. Expert at nothing except computer rubbish. Anti-ransomware since 2015.
Founder of Granitt, securing journalists and at-risk people around the world.
Journalist - cyber/natn'l security. Speaker. Georgetown adjunct prof. Author - COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World's First Digital Weapon
Signal: KimZ.42
https://www.zetter-zeroday.com
CISO of SentinelOne, teaching at Stanford.
I teach cryptography at Johns Hopkins. https://blog.cryptographyengineering.com
I am eminently qualified to speak from experience about a variety of dumpster fires.
ICS DFIR at Dragos, martial artist, marksman, humanist, level 14 Neutral Good rogue, USAF retired. I post *very serious* things about infosec. Thoughts my own. Enby. ๐ณ๏ธโ๐
National security reporter for The Wall Street Journal focused on cyber conflict, digital espionage and intelligence. Based in DC, with past bylines from SF, London and Berlin. It can happen here. https://www.wsj.com/news/author/dustin-volz
Founder of Azeria Labs, Trainer, Author of Blue Fox: Arm Assembly Internals & Reverse Engineering