corteximplant.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
CORTEX IMPLANT - an international cyberpunk'ish LGBTQIA+ friendly Fediverse instance for edgerunners, netrunners and cyberpunks and all who want to become one.

Administered by:

Server stats:

237
active users

#ThreatIntel

24 posts23 participants3 posts today
Christoffer S.<p>(securelist.com) New Arcane Stealer Distributed via YouTube Game Cheat Videos <a href="https://securelist.com/arcane-stealer/115919/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securelist.com/arcane-stealer/</span><span class="invisible">115919/</span></a></p><p>It's no secret that stealer logs on criminal markets often appear to also have "gamer" connections. It's thus no wonder that yet another stealer is targeting gamers.</p><p>SecureList researchers discovered a new stealer malware named Arcane being distributed through YouTube videos promoting game cheats. The campaign initially used a Phemedrone Trojan variant branded as 'VGS' before switching to Arcane in late 2024. The distribution method involves YouTube videos with links to password-protected archives containing batch files that disable Windows SmartScreen and download additional malware. Later in the campaign, the threat actors began promoting ArcanaLoader, a tool supposedly for downloading game cheats but actually delivering the Arcane stealer. The malware primarily targets Russian-speaking users in Russia, Belarus, and Kazakhstan.</p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/Gaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gaming</span></a> <a href="https://swecyb.com/tags/YouTube" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YouTube</span></a> <a href="https://swecyb.com/tags/Stealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stealer</span></a> <a href="https://swecyb.com/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://swecyb.com/tags/ArcaneStealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArcaneStealer</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@vulncheck" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>vulncheck</span></a></span> has raised $12 million in a Series A funding round to enhance its vulnerability intelligence platform. The funding, led by Ten Eleven Ventures, will help the company grow and expand internationally 🥳 </p><p><a href="https://vulncheck.com/press/series-a" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vulncheck.com/press/series-a</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p>
Renée Burton<p>Some great work from Denis Sinegubko yesterday on a VexTrio affiliate who has been compromising websites for years. This is complex research coming in three parts and aligns with some of our own. </p><p>A few highlights for me...sprinkling in some of our Infoblox work: <br>* The DollyWorld actor is a VexTrio (specifically a Los Pollos) affiliate since 2016. Given that Los Pollos dates to 2015, this is an old partner.<br>* Around November 20th, 2024, Los Pollos announced to their customers they would stop push monetization. I've written a lot on push monetization as a source of lingering evil. Whatever caused this change, it disrupted their affiliates. <br>* DollyWorld actor and the DNS C2 TXT systems we have been tracking carefully (after all, it's DNS) both switched to Monetizer TDS at that point. Coincidence? <br>* From Monetizer, both led to Propeller and delivered a variety of malicious content. <br>* I had originally used germannautica[.]com to get the VexTrio hook and then later was able to trigger participates[.]cfd (Monetizer) through the same site.<br>* Where VexTrio was just scams, the new TDS pattern also gave me malware</p><p>Most importantly -- scams pay! These affiliate actors are running for years on compromised sites and constantly updating their techniques. Why else would they keep going? </p><p><a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/scam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scam</span></a> <a href="https://infosec.exchange/tags/vextrio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vextrio</span></a> </p><p><a href="https://www.godaddy.com/resources/news/dollyway-world-domination" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">godaddy.com/resources/news/dol</span><span class="invisible">lyway-world-domination</span></a></p>
GreyNoise<p>🚨 Resurgence of in-the-wild activity targeting critical ServiceNow vulns. Overwhelming majority of traffic hitting Israel. Full analysis ⬇️ <a href="https://www.greynoise.io/blog/in-the-wild-activity-targeting-critical-servicenow-vulnerabilities" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">greynoise.io/blog/in-the-wild-</span><span class="invisible">activity-targeting-critical-servicenow-vulnerabilities</span></a> <br><a href="https://infosec.exchange/tags/ServiceNow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ServiceNow</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a></p>
cR0w :cascadia:<p>EITW 0day? Sure, Happy Tuesday. This one is worth reading.</p><p><a href="https://www.trendmicro.com/en_us/research/25/c/windows-shortcut-zero-day-exploit.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendmicro.com/en_us/research/</span><span class="invisible">25/c/windows-shortcut-zero-day-exploit.html</span></a></p><blockquote><p>Trend Zero Day Initiative™ (ZDI) identified nearly 1,000 malicious .lnk files abusing ZDI-CAN-25373, a vulnerability that allows attackers to execute hidden malicious commands on a victim’s machine by leveraging crafted shortcut files.</p><p>The attacks leverage hidden command line arguments within .lnk files to execute malicious payloads, complicating detection. The exploitation of ZDI-CAN-25373 exposes organizations to significant risks of data theft and cyber espionage.</p><p>The vulnerability has been exploited by state-sponsored APT groups from North Korea, Iran, Russia, and China. Organizations across the government, financial, telecommunications, military, and energy sectors have been affected in North America, Europe, Asia, South America, and Australia.</p><p>Organizations should immediately scan and ensure security mitigations for ZDI-CAN-25373, maintain vigilance against suspicious .lnk files, and ensure comprehensive endpoint and network protection measures are in place to detect and respond to this threat. Trend Micro customers are protected from possible attempts to exploit the vulnerability via rules and filters that were released in October 2024 and January 2025.</p></blockquote><p><a href="https://www.zerodayinitiative.com/advisories/ZDI-25-148/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zerodayinitiative.com/advisori</span><span class="invisible">es/ZDI-25-148/</span></a></p><blockquote><p>This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.</p><p>The specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user.</p></blockquote><p>Edit to add <a href="https://infosec.exchange/tags/threatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatIntel</span></a></p>
Christoffer S.<p>The cybersecurity community is on fire today! There is so much new content being pushed out today, it's quite hard to keep up!</p><p>But please keep on doing it! 🙂 </p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a></p>
nemo™ 🇺🇦<p>New stealthy malware alert! 🚨 Microsoft uncovers StilachiRAT, a RAT targeting user data with advanced evasion techniques. It steals credentials, monitors RDP sessions &amp; grabs crypto wallet info. Protect yourself! 🛡️ More info: <a href="https://cyberinsider.com/microsoft-uncovers-new-stealthy-malware-stilachirat-targeting-user-data/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberinsider.com/microsoft-unc</span><span class="invisible">overs-new-stealthy-malware-stilachirat-targeting-user-data/</span></a> <a href="https://mas.to/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mas.to/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
Ian Campbell<p>I'm super proud of my employer <span class="h-card" translate="no"><a href="https://infosec.exchange/@DomainTools" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>DomainTools</span></a></span> and our DT Investigations team under <span class="h-card" translate="no"><a href="https://infosec.exchange/@danonsecurity" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>danonsecurity</span></a></span> today. Consider this historical analysis piece on Russian disinfo actors the first of many disinformation-related pieces to come!</p><p><a href="https://masto.deoan.org/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://masto.deoan.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://masto.deoan.org/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> </p><p><a href="https://dti.domaintools.com/domain-registrars-powering-russian-disinformation/?utm_source=Mastodon&amp;utm_medium=Social&amp;utm_campaign=disinformation" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dti.domaintools.com/domain-reg</span><span class="invisible">istrars-powering-russian-disinformation/?utm_source=Mastodon&amp;utm_medium=Social&amp;utm_campaign=disinformation</span></a></p>
The Spamhaus Project<p>We strongly recommend against providing services to entities whose AS or IP networks are listed in Spamhaus (ASN-)DROP - learn more here 👉 <a href="https://www.spamhaus.org/blocklists/do-not-route-or-peer/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spamhaus.org/blocklists/do-not</span><span class="invisible">-route-or-peer/</span></a></p><p><a href="https://infosec.exchange/tags/BulletproofHosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BulletproofHosting</span></a> <a href="https://infosec.exchange/tags/DROP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DROP</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/Botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnets</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a></p>
Christoffer S.<p>Sekoia: <a href="https://blog.sekoia.io/clearfakes-new-widespread-variant-increased-web3-exploitation-for-malware-delivery/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.sekoia.io/clearfakes-new-</span><span class="invisible">widespread-variant-increased-web3-exploitation-for-malware-delivery/</span></a></p><p>A few days ago Brian Krebs wrote about ClickFix, and now Sekoia has written a technical deep dive of said malicious framework.</p><p>In the Sekoia report they analyze the evolution of ClearFake, a malicious JavaScript framework that compromises legitimate websites to deliver malware through drive-by downloads. Since its emergence in July 2023, ClearFake has evolved from displaying fake browser updates to using sophisticated social engineering tactics called 'ClickFix' that trick users into executing malicious PowerShell code. The latest variant (December 2024-February 2025) uses fake reCAPTCHA or Cloudflare Turnstile verifications alongside technical issues to deceive users. ClearFake leverages the Binance Smart Chain through a technique called 'EtherHiding' to store malicious code, making it impossible to remove. The framework has infected thousands of websites and is actively distributing Lumma Stealer and Vidar Stealer malware.</p><p><a href="https://krebsonsecurity.com/2025/03/clickfix-how-to-infect-your-pc-in-three-easy-steps/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2025/03/cl</span><span class="invisible">ickfix-how-to-infect-your-pc-in-three-easy-steps/</span></a></p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@briankrebs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>briankrebs</span></a></span> <br><span class="h-card" translate="no"><a href="https://infosec.exchange/@sekoia_io" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sekoia_io</span></a></span> </p><p><a href="https://swecyb.com/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://swecyb.com/tags/ClickFix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClickFix</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a></p>
r1cksec<p>An analysis for the latest variant of LockBit ransomware🕵️‍♂️</p><p><a href="https://chuongdong.com/reverse%20engineering/2025/03/15/Lockbit4Ransomware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">chuongdong.com/reverse%20engin</span><span class="invisible">eering/2025/03/15/Lockbit4Ransomware/</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a></p>
nemo™ 🇺🇦<p>Stay informed on the latest cybersecurity threats! 🚨 This week's recap covers router hacks, PyPI package vulnerabilities, and more. Learn how attackers are evolving and how to stay secure. 🛡️🔗 <a href="https://thehackernews.com/2025/03/thn-weekly-recap-router-hacks-pypi.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/03/thn-</span><span class="invisible">weekly-recap-router-hacks-pypi.html</span></a> <a href="https://mas.to/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mas.to/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mas.to/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
cR0w :cascadia:<p>Looks like the yesware dot com free plan is another one getting abused by scammers. Maybe not news to y'all but this is the first one I've seen from them. :-/</p><p><code>t.yesware.com</code></p><p><a href="https://infosec.exchange/tags/threatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatIntel</span></a></p>
Brian Clark<p>The new Abuse.ch hunting platform looks really useful. Another great place to get <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> and enrich your investigations with their data <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> </p><p>From: <span class="h-card" translate="no"><a href="https://ioc.exchange/@abuse_ch" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>abuse_ch</span></a></span><br><a href="https://ioc.exchange/@abuse_ch/114144366546021640" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ioc.exchange/@abuse_ch/1141443</span><span class="invisible">66546021640</span></a></p>
Christoffer S.<p>I just published the source code for my very naive <a href="https://swecyb.com/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> implementation for generating a node network based on MITRE Intrusion Sets and Techniques. It will output linked <a href="https://swecyb.com/tags/Markdown" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Markdown</span></a> files linking intrusion sets to their used techniques.</p><p>Perhaps someone finds it useful or interesting to experiment with.</p><p>Source code: <a href="https://github.com/cstromblad/markdown_node" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/cstromblad/markdown</span><span class="invisible">_node</span></a></p><p>I hinted at this in a thread started by <span class="h-card" translate="no"><a href="https://mastodon.social/@Viss" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Viss</span></a></span> where he asked for input on a few very likely malicious domains. Me <span class="h-card" translate="no"><a href="https://mastodon.social/@Viss" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Viss</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@cR0w" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cR0w</span></a></span> <span class="h-card" translate="no"><a href="https://masto.deoan.org/@neurovagrant" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>neurovagrant</span></a></span> and others did some OSINT fun work with a couple of the original domains.</p><p>It was this thread: <a href="https://mastodon.social/@Viss/114145122623079635" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.social/@Viss/11414512</span><span class="invisible">2623079635</span></a></p><p>Now I posted a picture of a node network rendered in Obsidian and I hinted that perhaps Obsidian could be used as a poor mans version of performing threat intelligence work.</p><p><a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/Obsidian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Obsidian</span></a></p>
Brian Clark<p>The free service from portmap.io is being abused to support malware C2 communications. If you don’t use it, I suggest blocking *.portmap.io via DNS, NGFW and/or web proxy.</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> </p><p>From: <span class="h-card" translate="no"><a href="https://infosec.exchange/@ScumBots" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ScumBots</span></a></span><br><a href="https://infosec.exchange/@ScumBots/114167879065509347" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ScumBots/114</span><span class="invisible">167879065509347</span></a></p>
Tim (Wadhwa-)Brown :donor:<p>A decent explanation of the Apache TomCat bug I posted a link to the PoC for earlier:</p><p><a href="https://scrapco.de/blog/analysis-of-cve-2025-24813-apache-tomcat-path-equivalence-rce.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">scrapco.de/blog/analysis-of-cv</span><span class="invisible">e-2025-24813-apache-tomcat-path-equivalence-rce.html</span></a></p><p><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a>, <a href="https://infosec.exchange/tags/tomcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tomcat</span></a>, <a href="https://infosec.exchange/tags/java" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>java</span></a></p>
Brian Clark<p>I suggest searching your <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> EntraID logs for successful sign-ins using one of these user agents identified by Proofpoint. Any successful logins are likely malicious. <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> </p><p>From: <span class="h-card" translate="no"><a href="https://infosec.exchange/@threatinsight" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>threatinsight</span></a></span><br><a href="https://infosec.exchange/@threatinsight/114162150433883955" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@threatinsigh</span><span class="invisible">t/114162150433883955</span></a></p>
Infoblox Threat Intel<p>Threat actors often have their favorite TLDs. This month we've found the following TLDs to have the highest risk. The top 5 retain their spot from last month, with the TLD .bond topping the chart with a risk score of 10. This is rare and only happens when the percentage of risky domains is at least 4.5 standard deviations above the mean. Congratulations, I guess?</p><p>An explanation and minimum-working-example of our reputation algorithm can be found here: <a href="https://blogs.infoblox.com/threat-intelligence/reliable-reputation-scoring/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blogs.infoblox.com/threat-inte</span><span class="invisible">lligence/reliable-reputation-scoring/</span></a></p><p><a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/infobloxthreatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infobloxthreatintel</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Kevin Beaumont<p>These have all been shut down. <a href="https://cyberplace.social/tags/noname" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>noname</span></a> <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://cyberplace.social/@GossiTheDog/113596971515491145" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberplace.social/@GossiTheDog</span><span class="invisible">/113596971515491145</span></a></p>