Ole Villadsen's Avatar

Ole Villadsen

@olevilladsen.bsky.social

Threat researcher @ Proofpoint. Formerly IBM X-Force, CMU, US Government, US Navy. Views are my own.

223 Followers  |  200 Following  |  7 Posts  |  Joined: 04.07.2023  |  1.6032

Latest posts by olevilladsen.bsky.social on Bluesky

Preview
Remote access, real cargo: cybercriminals targeting trucking and logistics | Proofpoint US Key findingsΒ  Cybercriminals are compromising trucking and freight companies in elaborate attack chains to steal cargo freight.Β  Cargo theft is a multi-million-dollar criminal

Threat actors are teaming up with organized crime to target truckers β€” stealing identities, placing fraudulent bids on freight, and making off with the cargo. Their entry point? Emails with links delivering Remote Monitoring and Management (RMM) tools. Together with @selenalarson.bsky.social :

03.11.2025 10:40 β€” πŸ‘ 29    πŸ” 20    πŸ’¬ 1    πŸ“Œ 3

🚨 Job seekers, watch out! 🚨

Proofpoint found threat actors targeting job seekers to distribute remote management tools that can lead to data or financial theft, or potentially to install follow-on malware like ransomware.

24.07.2025 15:41 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 1    πŸ“Œ 1

I just call it "first lunch" or "second breakfast"

28.05.2025 22:04 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
A Brief History of DanaBot, Longtime Ecrime Juggernaut Disrupted by Operation Endgame | Proofpoint US Key Findings: Proofpoint first identified and named DanaBot in May 2018. Initially developed as a banking trojan, DanaBot was also used as an information stealer and loader for follow-on

Today, Proofpoint joins the cybersecurity community and the U.S. and international law enforcement in celebrating the disruption of #DanaBot, a malware-as-a-service used by sophisticated cybercriminals since 2018. brnw.ch/21wSRiZ

22.05.2025 19:48 β€” πŸ‘ 5    πŸ” 1    πŸ’¬ 1    πŸ“Œ 1
Preview
Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice | Proofpoint US Key findingsΒ Β Β  More threat actors are using legitimate remote monitoring and management (RMM) tools as a first-stage payload in email campaigns.Β  RMMs can be used for

Thanks for the shoutout and for recognizing our work at DFIR Report in tracking these threats!

πŸ”—Read the article here: www.proofpoint.com/us/blog/thre...

13.03.2025 00:59 β€” πŸ‘ 9    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice | Proofpoint US Key findingsΒ Β Β  More threat actors are using legitimate remote monitoring and management (RMM) tools as a first-stage payload in email campaigns.Β  RMMs can be used for

New cyber threat research from Proofpoint highlights how attackers are adapting to law enforcement disruptions, leveraging trusted software to evade detection and compromise systems.

This blog details our team's findings: www.proofpoint.com/us/blog/thre....

#malware #ransomware #dataloss

11.03.2025 16:14 β€” πŸ‘ 5    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Hidden in Plain Sight: TA397’s New Attack Chain Delivers Espionage RATs | Proofpoint US Key findingsΒ  Proofpoint observed advanced persistent threat (APT) TA397 targeting a Turkish defense sector organization with a lure about public infrastructure projects in Madagascar.Β Β  The attack...

Dropping some new research on TA397/Bitter 🚨

Hidden in Plain Sight | TA397’s New Attack Chain Delivers Espionage RATs

Report:
www.proofpoint.com/us/blog/thre...

17.12.2024 12:10 β€” πŸ‘ 16    πŸ” 13    πŸ’¬ 2    πŸ“Œ 1

In December 11 and 12, 2024, a spearphishing campaign targeted at least 20 Autonomous System (AS) owners, predominantly Internet Service Providers (ISPs), and purported to come from the Network Operations Center (NOC) of a prominent European ISP.

🧡‡️

12.12.2024 21:18 β€” πŸ‘ 17    πŸ” 11    πŸ’¬ 1    πŸ“Œ 5
Screenshot of the email showing a TAR archive as an email attachment.

Screenshot of the email showing a TAR archive as an email attachment.

The TAR archive and its content, a Windows EXE file for AgentTesla

The TAR archive and its content, a Windows EXE file for AgentTesla

An update to the Windows registry showing the malware persistent on an infected Windows host.

An update to the Windows registry showing the malware persistent on an infected Windows host.

Traffic from an infection filtered in Wireshark to show the FTP data exfiltration traffic.

Traffic from an infection filtered in Wireshark to show the FTP data exfiltration traffic.

2024-12-04 (Wednesday): #AgentTesla variant using #FTP for data exfiltration. A sanitized copy of the email distributing the malware, a #pcap from an infection run, the associated malware samples, and a list of indicators are available at www.malware-traffic-analysis.net/2024/12/04/i...

05.12.2024 01:14 β€” πŸ‘ 6    πŸ” 4    πŸ’¬ 1    πŸ“Œ 0
Malicious BumbleBee PDF using Cisco AnyConnect as a lure

Malicious BumbleBee PDF using Cisco AnyConnect as a lure

Malicious download page using Cisco AnyConnect as a lure to infect users with BumbleBee malware

Malicious download page using Cisco AnyConnect as a lure to infect users with BumbleBee malware

#BumbleBee malspam using Cisco AnyConnect as a lure. It contains a PDF with a link to a fake AnyConnect installer that opens AnyConnect on the Microsoft App Store to mask the BumbleBee infection πŸ”₯

Payload delivery URLs:
🌐 urlhaus.abuse.ch/host/95.164....

Payload:
πŸ“„ bazaar.abuse.ch/sample/b8794...

04.12.2024 10:06 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

#BruteRatel - #Latrodectus - url > .js > .msi > .dll

wscript.exe Document-v15-51-07.js

msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\fes.msi

rundll32.exe C:\Users\Admin\AppData\Roaming\avutil.dll, DLLMain

(1/3)πŸ‘‡

IOC's
github.com/pr0xylife/La...

03.12.2024 21:22 β€” πŸ‘ 20    πŸ” 8    πŸ’¬ 1    πŸ“Œ 0

I really like the freedom of BlueSky's API and hope it can be maintained. I will use the API to push more IOCs.

27.11.2024 08:05 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

T-Minus 37 days til the next season of #100DaysofYARA kicks off!!
Who’s excited and what will you be working on?
I can’t believe it but I’m excited to write rules for JavaScript πŸ˜¬πŸ˜΅β€πŸ’«
But also get to show off the new macho module from the one and only
@jacoblatonis.me

25.11.2024 21:57 β€” πŸ‘ 6    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Screenshot of malicious spam (malspam) with malware file attachment.

Screenshot of malicious spam (malspam) with malware file attachment.

Traffic from the XLoader (Formbook) infection filtered in Wireshark.

Traffic from the XLoader (Formbook) infection filtered in Wireshark.

2024-11-22 (Friday) #XLoader / #Formbook: I've been fired by my non-existent HR department. At least I got a "salary-receipt.exe" bazaar.abuse.ch/sample/003b5...

Tria.ge and Any.Run don't identify the malware, but Joe Sandbox does: www.joesandbox.com/analysis/156...

Also runs in my lab just fine

22.11.2024 19:42 β€” πŸ‘ 17    πŸ” 10    πŸ’¬ 2    πŸ“Œ 0

Welcome Brad! @malware-traffic.bsky.social

22.11.2024 19:01 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
China’s Surveillance State Is Selling Citizen Data as a Side Hustle Chinese black market operators are openly recruiting government agency insiders, paying them for access to surveillance data and then reselling it onlineβ€”no questions asked.

Very interesting story which in my opinion that shows how the Chinese surveillance state is even "knocking off" on itself when it comes to IP/Data. This is some great research from SpyCloud Labs! Very proud of the Labs Research Team! www.wired.com/story/chines...

21.11.2024 16:26 β€” πŸ‘ 8    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

For visibility - x0rz now on Blue Sky, so happy :)

18.11.2024 14:29 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

New blog drop with @selenalarson.bsky.social and the rest of the team. This one covers a lot of threats using the #ClickFix technique to lure targets to infect themselves by pasting malicious CMD/PS code. My "fave" is the chumbox #malvertising on major tech sites.
www.proofpoint.com/us/blog/thre...

18.11.2024 12:44 β€” πŸ‘ 11    πŸ” 5    πŸ’¬ 0    πŸ“Œ 1
Post image

Reuters also confirms the story about Biden allowing Ukraine to use US arms to strike inside Russia, citing three sources familiar with the matter. Ukraine plans to conduct its first long-range attacks in the coming days.
www.reuters.com/world/biden-...

17.11.2024 18:53 β€” πŸ‘ 809    πŸ” 95    πŸ’¬ 29    πŸ“Œ 14
Post image

Almost embarrassed to post this, but I've always used Fiddler or Burp for capturing things like this...

I didn't have admin rights and was trying to capture network traffic from a pop-up, so Dev Tools wasn't working

Apparently this is built into Chrome/Edge! So cool :)

edge://net-export/

17.11.2024 06:49 β€” πŸ‘ 187    πŸ” 45    πŸ’¬ 15    πŸ“Œ 3

Two great easy-to-use tools to find new follows - both worked great.

17.11.2024 01:02 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Smokeloader: The Pandora’s box of tricks, payloads and anti-analysis - BSides Portland 2022
YouTube video by BSides Portland Smokeloader: The Pandora’s box of tricks, payloads and anti-analysis - BSides Portland 2022

Smokeloader keeps crawling its way back into the limelight. If you want a primer on it, I gave a public talk on it 2 years ago

www.youtube.com/watch?v=O69e...

16.11.2024 03:41 β€” πŸ‘ 24    πŸ” 9    πŸ’¬ 1    πŸ“Œ 0

I see at least AlphV/BlackCat

06.07.2023 21:00 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

IMO: Storm-0875 (overlaps UNC3944/Scattered Spider) is the most dangerous financial threat actor right now

Some recent developments:
1. Now deploying ransomware (had been extorting orgs before)
2. In last few months targeting large/well known enterprises (not just telcos/help desk/crypto orgs)

06.07.2023 12:45 β€” πŸ‘ 8    πŸ” 5    πŸ’¬ 1    πŸ“Œ 2

Thank you - are there particular ransomware families they are deploying that you can share?

06.07.2023 17:30 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

@olevilladsen is following 20 prominent accounts