Club1337

Posts

Date Content Media
2024-06-20 12:55:22
https://ironscales.com/blog/zero-click-critical-microsoft-outlook-vulnerability.-what-you-need-to-know⚜️ @club1337
2024-06-20 04:51:41
https://dfrlab.org/2023/11/13/this-job-post-will-get-you-kidnapped/⚜️ @club1337
2024-06-19 21:51:45
https://www.washingtonpost.com/world/2024/06/19/china-online-scams-myanmar-trafficking/⚜️ @club1337
2024-06-19 19:47:20
https://rexorvc0.com/2024/06/19/Akira-The-Old-New-Style-Crime/⚜️ @club1337
2024-06-18 18:52:13
https://cybersecuritynews.com/malicious-search-solarmarker-malware/⚜️ @club1337
2024-06-18 10:35:26
None
2024-06-18 10:32:28
https://www.forbes.com/sites/daveywinder/2024/06/14/new-wi-fi-takeover-attack-all-windows-users-warned-to-update-now/⚜️ @club1337
2024-06-17 21:32:36
https://www.gdatasoftware.com/blog/2024/06/37947-badspace-backdoor⚜️ @club1337
2024-06-17 20:55:08
⚜️ @club1337 Images
2024-06-17 18:39:00
https://www.wired.com/story/epam-snowflake-ticketmaster-breach-shinyhunters/⚜️ @club1337
2024-06-17 18:20:46
https://www.bitsight.com/blog/latrodectus-are-you-coming-back#latrodectus⚜️ @club1337
2024-06-17 16:13:33
https://www.volexity.com/blog/2024/06/13/disgomoji-malware-used-to-target-indian-government/⚜️ @club1337
2024-06-17 15:23:51
None
2024-06-17 14:39:18
⚜️ @club1337 Images
2024-06-17 14:34:36
https://www.proofpoint.com/us/blog/threat-insight/security-brief-scammers-create-fraudulent-olympics-ticketing-websites⚜️ @club1337
2024-06-17 10:46:27
⚜️ @club1337 Images
2024-06-16 18:43:22
Mastering the Craft of Hacking the Human Psyche https://7h3h4ckv157.medium.com/mastering-the-craft-of-hacking-the-human-psyche-8ac825aa36cf⚜️ @club1337
2024-06-16 17:16:48
https://krebsonsecurity.com/2024/06/alleged-boss-of-scattered-spider-hacking-group-arrested/#ScatteredSpider⚜️ @club1337
2024-06-16 15:13:39
https://blog.trailofbits.com/2024/06/11/exploiting-ml-models-with-pickle-file-attacks-part-1/⚜️ @club1337
2024-06-16 00:02:22
https://www.police.gov.sg/media-room/news/20240614_two_men_extradited_from_malaysia_to_be_charged_for_offences_in_relation_to_malware_scams⚜️ @club1337
2024-06-15 21:58:15
https://www.justice.gov/usao-ndil/pr/owners-empire-market-charged-chicago-operating-430-million-dark-web-marketplace⚜️ @club1337
2024-06-15 14:37:22
https://blog.checkpoint.com/research/may-2024s-most-wanted-malware-phorpiex-botnet-unleashes-phishing-frenzy-while-lockbit3-dominates-once-again/⚜️ @club1337
2024-06-15 09:43:07
ARTful is a tool designed to dynamically modify the Android 13 + 14 runtimeWith this tool, you can dynamically change the implementation of any static method within your application or the Android Framework to affect methods called from within your application. This eliminates the requirement of using plaintext references to Android ClassLoaders to execute unexpected code and thwarts Reverse Engineering by entirely removing method cross-references.https://github.com/LaurieWired/ARTful⚜️ @club1337
2024-06-14 18:13:37
https://cloud.google.com/blog/topics/threat-intelligence/unc3944-targets-saas-applications⚜️ @club1337
2024-06-14 16:28:57
https://www.zscaler.com/blogs/security-research/technical-analysis-latest-variant-valleyrat⚜️ @club1337
2024-06-14 16:08:49
https://gbhackers.com/256000-windows-servers-msmq-rce-flaw/⚜️ @club1337
2024-06-14 15:37:17
#LockBitSupp⚜️ @club1337 Images
2024-06-14 14:38:03
https://securelist.com/2fa-phishing/112805/⚜️ @club1337
2024-06-14 02:53:36
None Images Images Images
2024-06-13 20:57:14
⚜️ @club1337 Images
2024-06-13 19:28:33
https://blog.checkpoint.com/research/may-2024s-most-wanted-malware-phorpiex-botnet-unleashes-phishing-frenzy-while-lockbit3-dominates-once-again/⚜️@club1337
2024-06-13 18:29:31
https://www.fortinet.com/blog/threat-research/new-agent-tesla-campaign-targeting-spanish-speaking-people⚜️ @club1337
2024-06-13 16:49:52
https://www.welivesecurity.com/en/eset-research/arid-viper-poisons-android-apps-with-aridspy/⚜️ @club1337 Images
2024-06-13 15:34:26
https://blog.talosintelligence.com/cosmic-leopard/⚜️ @club1337
2024-06-13 14:59:04
⚜️ @club1337 Images
2024-06-13 14:33:25
https://www.elastic.co/security-labs/dipping-into-danger⚜️ @club1337
2024-06-13 14:17:59
https://www.wiz.io/blog/dero-cryptojacking-campaign-adapts-to-evade-detection⚜️ @club1337
2024-06-13 13:25:56
https://www.gdatasoftware.com/blog/2024/06/37947-badspace-backdoor#FakeUpdates #frameworkPart of #Kongtuke / #SocGholish ⚜️ @club1337
2024-06-13 08:22:38
History of ransomware group connections and transitions v2.20https://www.mbsd.jp/files/MBSD_RansomwareMap_EN_Rev2.20.pdf⚜️ @club1337
2024-06-12 22:10:47
⚜️ @club1337 Images
2024-06-12 22:08:26
Breached is back, again, again, again, again Images
2024-06-12 21:21:27
⚜️ @club1337 Images
2024-06-12 19:04:40
https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion⚜️ @club1337
2024-06-12 18:19:11
https://heimdalsecurity.com/blog/v3b-phishing-kit-affects-european-banks/⚜️ @club1337
2024-06-12 18:04:33
⚜️ @club1337
2024-06-12 18:00:00
Ukrainian 🇺🇦 #CyberPolice arrests #Conti and #LockBit #ransomware crypter specialist. The man has been arrested in Kharkiv region for supporting #Russian 🇷🇺 #Conti/#LockBit groups with #crypt services obfuscating #malware to look like legit files.https://www.bleepingcomputer.com/news/security/police-arrest-conti-and-lockbit-ransomware-crypter-specialist/https://cyberpolice.gov.ua/news/atakuvaly-providne-pidpryyemstvo-u-niderlandax-ta-belgiyi-policzejski-vykryly-posobnyka-rosijskyx-xakeriv-4010/⚜️ @club1337
2024-06-12 16:39:16
https://symantec-enterprise-blogs.security.com/threat-intelligence/black-basta-ransomware-zero-day⚜️ @club1337
2024-06-12 15:34:58
https://www.trellix.com/blogs/research/ransomhouse-am-see/⚜️ @club1337
2024-06-12 14:02:08
⚜️ @club1337 Images
2024-06-11 23:31:07
https://www.zscaler.com/blogs/security-research/brief-history-smokeloader-part-1⚜️ @club1337
2024-06-11 21:32:34
https://securelist.com/biometric-terminal-vulnerabilities/112800/⚜️ @club1337
2024-06-11 18:33:35
https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/⚜️ @club1337
2024-06-11 16:42:45
https://www.trendmicro.com/en_us/research/24/f/noodle-rat-reviewing-the-new-backdoor-used-by-chinese-speaking-g.html⚜️ @club1337
2024-06-11 15:13:16
https://www.404media.co/ai-call-center-software-is-powering-a-scam-call-center/⚜️ @club1337
2024-04-02 20:27:30
https://habr.com/ru/companies/f_a_c_c_t/articles/803339/
2024-04-02 14:04:51
https://research.checkpoint.com/2024/29676/
2024-04-01 22:02:31
https://cyble.com/blog/warzonerat-returns-with-multi-stage-attack-post-fbi-seizure/
2024-04-01 21:03:01
https://research.nccgroup.com/2024/03/28/android-malware-vultur-expands-its-wingspan/
2024-04-01 20:03:12
https://www.rapid7.com/blog/post/2024/03/28/stories-from-the-soc-part-1-idat-loader-to-bruteratel/
2024-04-01 19:07:57
https://www.oligo.security/blog/shadowray-attack-ai-workloads-actively-exploited-in-the-wild
2024-04-01 18:01:27
https://krebsonsecurity.com/2024/03/recent-mfa-bombing-attacks-targeting-apple-users/
2024-04-01 17:56:41
https://thedfirreport.com/2024/04/01/from-onenote-to-ransomnote-an-ice-cold-intrusion/
2024-04-01 17:40:06
https://www.jamf.com/blog/infostealers-pose-threat-to-macos/
2024-04-01 13:17:18
None Images
2024-03-30 06:28:55
Backdoor in upstream xz/liblzma leading to ssh server compromisehttps://www.openwall.com/lists/oss-security/2024/03/29/4
2024-03-29 03:41:36
https://krebsonsecurity.com/2024/03/thread-hijacking-phishes-that-prey-on-your-curiosity/
2024-03-27 16:32:53
https://github.com/NationalSecurityAgency/ghidra/releases/tag/Ghidra_11.0.2_build
2024-03-27 16:32:44
https://medium.com/@aleksamajkic/fake-sms-how-deep-does-the-rabbit-hole-really-go-17e25c42f986
2024-03-26 18:13:26
https://www.wired.com/story/streaming-bots-spotify
2024-03-26 09:12:43
https://checkmarx.com/blog/over-170k-users-affected-by-attack-using-fake-python-infrastructure/
2024-03-25 23:23:28
https://home.treasury.gov/news/press-releases/jy2204
2024-03-25 23:17:41
https://www.justice.gov/opa/pr/seven-hackers-associated-chinese-government-charged-computer-intrusions-targeting-perceived
2024-03-25 23:16:31
#APT31
2024-03-25 23:15:14
https://home.treasury.gov/news/press-releases/jy2205
2024-03-25 12:06:44
#CL0P #ransomware Images
2024-03-24 21:21:19
https://unit42.paloaltonetworks.com/strelastealer-campaign/⚜️ Subscribe @club1337
2024-03-23 21:26:42
https://zerodayengineering.com/research/pwn2own-2021-vm-escape.htmlVM Escape Exploit for Parallels Desktop Hypervisor (Pwn2Own 2021) source code + video walkthroughA virtual machine escape exploit will typically require kernel privileges in the guest OS. In this exploit it off-loading the reverse-engineered toolgate protocol implementation to a Python module, while keeping low-level kernel code minimal, just enough to implement the attack interface - a nod to the principle of least privilege in systematic software engineering, which is missed a lot in non-trivial exploit development.ⓒ Alisa Shevchenko⚜️ Subscribe @club1337
2024-03-23 14:27:32
https://medium.com/tenable-techblog/uac-bypass-by-mocking-trusted-directories-24a96675f6e
2024-03-22 15:45:03
https://www.zetter-zeroday.com/apple-chips/
2024-03-22 15:12:31
Ransomware Map⚜️ Subscribe @club1337
2024-03-22 15:12:20
#ransomware⚜️ Subscribe @club1337 Images
2024-03-22 13:24:57
https://www.mandiant.com/resources/blog/initial-access-brokers-exploit-f5-screenconnect
2024-03-21 19:38:22
http://nemesis555nchzn2dogee6mlc7xxgeeshqirmh3yzn4lo5cnd4s5a4yd.onionNemesis Market ⚰️⚜️ Subscribe @club1337 Images
2024-03-21 17:38:03
https://therecord.media/after-lockbit-takedown-its-purported-leader-vows-to-hack-on⚜️ @club1337
2024-03-21 17:37:45
https://podcasts.apple.com/us/podcast/click-here/id1225077306?i=1000649673110⚜️ Subscribe @club1337⚜️ https://t.me/club1337
2024-03-21 00:19:48
https://perception-point.io/blog/operation-phantomblu-new-and-evasive-method-delivers-netsupport-rat/
2024-03-20 21:22:52
https://www.theguardian.com/law/2024/mar/15/diogo-santos-coelho-pleads-uk-block-us-extradition-cybercrime-raidforums
2024-03-13 16:18:25
None Images
2024-03-13 15:47:22
https://www.menlosecurity.com/blog/swindled-blackcat-affiliate-wants-money-from-change-healthcare-ransom
2024-03-11 18:44:16
⚜️ Subscribe @club1337⚜️ https://t.me/club1337 Images
2024-03-11 04:06:26
Constantly updated list of links to blog posts, write-ups and papers related to cybersecurity, reverse engineering and exploitationhttps://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md#cybersecurity #infosec⚜️ Subscribe @club1337⚜️ https://t.me/club1337
2024-03-10 04:09:44
https://krebsonsecurity.com/2024/03/a-close-up-look-at-the-consumer-data-broker-radaris/
2024-03-10 03:44:13
None
2024-03-06 23:32:58
https://github.com/IFGHou/Unicornscan
2024-03-04 02:43:05
None
2024-02-28 20:20:38
None Images
2024-02-28 20:20:35
“We take security seriously...”                              A    B    s     o     l                u     t     e     l   y   n                o                    t                     ・              。 ・゚        。°*.    。*・。
2024-02-28 05:34:45
https://dev.ua/ru/news/mark-sokolovsky-1704742867#raccoon #stealer@club1337
2024-02-27 17:39:00
None Images
2024-02-27 17:37:04
https://podcasts.apple.com/us/podcast/108-exclusive-fbi-director-wray-talks-takedown-operations/id1225077306?i=1000647199773#FBI #DyingEmber #hacking #operation
2024-02-23 04:21:54
https://www.reuters.com/technology/cybersecurity/ukraine-arrests-father-son-duo-lockbit-cybercrime-bust-2024-02-21/
2024-02-22 22:17:39
None Images
2024-02-22 13:49:17
https://resources.prodaft.com/opcronos
2024-02-22 13:23:33
https://youtu.be/-7Swd1ZetiQ?si=_6fWFoVXGagFhSvc@club1337
2024-02-22 13:23:22
#iS00N@club1337 Images
2024-02-22 13:16:11
User.xml from an ITW exploited #ScreenConnect instance@club1337 Images
2024-02-22 13:13:55
https://redsense.com/publications/lockbit-story-a-three-year-investigative-journey/
2024-02-21 23:34:59
https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
2024-02-21 21:56:43
КОТ В ОЧКАХ 😂 Images
2024-02-21 17:22:07
https://www.chainalysis.com/blog/lockbit-takedown-sanctions-february-2024/
2024-02-21 17:16:43
🤡🤡🤡 Images
2024-02-21 03:51:07
@club1337 Images
2024-02-21 01:04:26
https://github.com/I-S00N/I-S00NTranslation: https://drive.proton.me/urls/C7GAHF5YBR#nTc32vpxdMrQ@club1337
2024-02-21 00:37:04
ДО и ПОСЛЕ Images
2024-02-21 00:15:04
https://www.facct.ru/media-center/press-releases/sugarlocker-ransomware/
2024-02-20 19:13:27
Pro #hacker #tip:strings.exe | findstr /i passw
2024-02-20 19:11:45
#alfateam #APT33 nice job keeping your files safe!@club1337 Images
2024-02-20 13:48:39
None Images
2024-02-20 12:17:23
None Images
2024-02-20 06:41:34
@club1337 Images
2024-02-09 13:30:54
None Images
2024-02-08 20:36:06
None
2024-02-08 05:30:29
https://www.youtube.com/watch?v=wTl4vEednkQ
2024-02-07 17:56:34
https://krebsonsecurity.com/2024/02/from-cybercrime-saul-goodman-to-the-russian-gru/
2024-02-07 15:36:52
https://www.chainalysis.com/blog/ransomware-2024/
2024-02-07 15:34:49
None Images
2024-02-07 15:33:29
None Images
2024-02-02 02:34:39
#BTC-e Aliaksandr #Klimenkahttps://www.justice.gov/opa/pr/foreign-national-charged-international-money-laundering-conspiracy-and-role-operation
2024-02-02 02:20:27
#Phrack 71More on http://phrack.org/ Images
2024-01-29 19:51:27
#ransomware Images
2024-01-26 01:37:50
None Images
2024-01-25 19:01:03
https://www.justice.gov/opa/pr/russian-national-sentenced-involvement-development-and-deployment-trickbot-malware
2024-01-25 14:26:01
None Images
2024-01-25 14:25:31
None Images
2023-12-31 14:30:43
Happy New Year!! Images
2023-12-22 13:18:47
None Images
2023-12-21 17:56:38
FUCKING LEGEND! #FreeKurtaj Images
2023-12-21 17:07:40
https://www.bbc.com/news/technology-67663128
2023-12-20 16:05:07
#WAZAWAKA https://resources.prodaft.com/wazawaka-report
2023-12-19 13:58:47
The FBI developed a decryption tool that allowed FBI field offices across the country and law enforcement partners around the world to offer over 500 affected victims the capability to restore their systems. https://www.justice.gov/opa/pr/justice-department-disrupts-prolific-alphvblackcat-ransomware-variant
2023-12-16 02:37:03
https://g0njxa.medium.com/approaching-stealers-devs-summary-refused-talks-ccb478c7e6a6
2023-12-01 15:14:39
https://github.com/persistent-security/smshell Images
2023-11-28 22:31:25
https://www.youtube.com/watch?v=8yLtHCbnF44
2023-11-28 22:30:47
#ransomware Images
2023-11-22 01:08:08
#killnet #killmilk https://www.gazeta.ru/tech/2023/11/21/17878753.shtml
2023-11-10 19:05:48
None Images
2023-11-02 22:19:37
None Images
2023-10-29 17:49:48
None Images
2023-10-27 15:13:15
https://habr.com/ru/companies/bastion/articles/765490/
2023-10-13 00:31:31
None Images
2023-10-03 22:38:42
None Images
2023-10-03 22:38:07
https://techcrunch.com/2023/10/03/fbi-most-wanted-russian-hacker-reveals-why-he-burned-his-passport/?tpcc=tcplustwitter
2023-09-14 14:46:24
https://www.youtube.com/watch?v=PLOPs05EZPw
2023-08-30 18:11:03
https://www.wired.com/story/trickbot-trickleaks-bentley/
2023-08-15 13:54:41
https://analyst1.com/ransomware-diaries-volume-3-lockbits-secrets/
2023-08-07 15:00:21
https://start.me/p/wMrA5z/cyber-threat-intelligence
2023-07-19 16:45:13
https://www.rapid7.com/blog/post/2023/07/18/etr-critical-zero-day-vulnerability-in-citrix-netscaler-adc-and-netscaler-gateway/
2023-07-19 16:37:18
None Images
2023-07-19 16:35:13
None
2023-06-28 12:56:58
https://www.fontanka.ru/2023/06/28/72443381/
2023-06-15 17:32:16
https://www.justice.gov/opa/pr/russian-national-arrested-and-charged-conspiring-commit-lockbit-ransomware-attacks-against-us
2023-06-01 16:16:33
https://securelist.com/operation-triangulation/109842/
2023-05-27 12:43:53
TOX ВСЁ.
2023-05-18 11:29:35
https://lenta.ru/news/2023/05/18/wazawaka/
2023-05-18 11:28:51
МИШАНЯ 1337 Images
2023-05-09 22:31:55
None Images
2023-04-21 17:05:36
https://infosec.exchange/@briankrebs/110228216661785002
2023-04-10 11:48:33
https://informnapalm.org/52587-vzlom-apt-28-26165/
2023-04-05 19:28:16
https://krebsonsecurity.com/2023/04/fbi-seizes-bot-shop-genesis-market-amid-arrests-targeting-operators-suppliers/
2023-04-05 15:00:53
None Images
2023-04-05 14:59:18
https://genesis7zoveavupiiwnrycmaq6uro3kn5h2be3el7wdnbjti2ln2wid.onion Images
2023-04-05 07:55:22
SubSeven Legacy Official Source Code RepositorySubSeven Legacy is a complete remake of the infamous SubSeven Backdoor (also known as Sub7), a popular remote access trojan from the late 90s.#sub7https://github.com/DarkCoderSc/SubSeven