π Related IoCs could be found on GitHub:
github.com/cert-orangec...
@ocdworldwatch.bsky.social
World Watch CTI team from Orange Cyberdefense https://www.orangecyberdefense.com/global/offering/managed-services/threat-and-risk-management/world-watch
π Related IoCs could be found on GitHub:
github.com/cert-orangec...
This is a scheme describing the infection chain. 1. Email received. 2. Download a ZIP file from an actor-controlled website. 3. User clicks on an executable that sideloads a malicious DLL. 4. The malicious DLL unpacks an archive contained in the ZIP file, opens a Word document, and executes a Python script or a BAT file to fetch the final payload.
β£ The main lure deploys a full Python environment and runs a Python script responsible for fetching the next stage from a remote C2. Then it opens a decoy file in Word. C2 are now inactive but have been tied to Pure malware family.
23.09.2025 09:37 β π 0 π 0 π¬ 1 π 0β The campaigns are initiated from the legitimate noreply[@]appsheet.com address and deliver various payloads, with lures targeting corporate sales, marketing, and legal teams. We advise to hunt for emails from this sender.
23.09.2025 09:37 β π 0 π 0 π¬ 1 π 0β¨ AppSheet is a Google platform that enables no-code development of mobile, tablet, and web applications. Knowbe4, RavenMail, and MalwareHunterTeam have also previously mentioned such campaigns.
x.com/i/web/status...
ravenmail.io/blog/appshee...
blog.knowbe4.com/impersonatin...
π£π§ Since early September 2025, the Orange Cyberdefense CSIRT and CyberSOC teams have detected phishing campaigns impersonating Meta, AppSheet and Paypal, leading to malware delivery. Our team tracks this activity under the alias "Metappenzeller".
#CTI #ThreatIntel #Metappenzeller #phishing
The new version has removed these notable behaviours and is seen in campaign with fake invoices lures. New indicators of compromise (IoCs) are available on our GitHub: github.com/cert-orangec...
03.07.2025 07:43 β π 1 π 2 π¬ 0 π 0π€These detection opportunities were presented during the Botconf 2025: www.botconf.eu/wp-content/u...
03.07.2025 07:43 β π 1 π 2 π¬ 1 π 0βͺπHistorically, new MintsLoader JS samples were easy to find because the obfuscation strings consistently used text from a book, Andrew Melville by William Morison.
The associated infrastructure could be tracked thanks to specific patterns and campaign IDs in the C2 URLs: archive.org/details/cu31...
π§ Update on MintsLoader: a thread π½
MintsLoader is a JavaScript/PowerShell loader that was first detailed by OCD in 2024.
A new version has been around at least since early-June 2025.
#threatintel #cti #mintsloader
Written in C++, #NailaoLocker is relatively unsophisticated and poorly designed. The ransomware uses the β.lockedβ extension. It is loaded through DLL search-order hijacking.
20.02.2025 08:16 β π 0 π 0 π¬ 0 π 0β‘οΈThe full article on the Green Nailao cluster is available here: orangecyberdefense.com/global/blog/...
β‘οΈIOCs and Yara can be found on our GitHub: github.com/cert-orangec...
πWe publish today the result of a deep-dive investigation into a malicious campaign leveraging #ShadowPad and #PlugX to distribute a previously-undocumented ransomware, dubbed #NailaoLocker.
This campaign targeted πͺπΊ organizations during S2 2024 and is tied to Chinese TA π¨π³.
We provide a #Yara Rule to hunt for Edam Dropper, as well as related #Iocs and technical details, available on GitHub.
π€The infection chain was also analyzed by @strikereadylabs.com last week, and could be tied to π·πΊ #Sandworm APT (low confidence).
strikeready.com/blog/ru-apt-...
While monitoring recent #Emmenhtal iterations, we observed a distinct politically-aligned cluster πͺπΊ, strongly differing from usual financially motivated Emmenhtal distribs.
This cluster drops another malware we dubbed #Edam Dropperπ§
github.com/cert-orangec...
Targets: European #energy sectorπ
πFor more than 8 months, our threat researchers from OCD
have worked on mapping China's civil-militaryβindustrial complex when it comes to #cyberespionage operations.
β― Consult our newly published deep-dive report and interactive map here:
research.cert.orangecyberdefense.com/hidden-netwo...