Vitali Kremez(@VK_Intel) 's Twitter Profileg
Vitali Kremez

@VK_Intel

Ethical Hacker | Reverse Engineer | CEO @AdvIntel | Malware Course Author "Zero2Hero" / "Zero2Automated" | Former .gov Cybercrime | Threat Seeker Award

ID:3332934374

linkhttps://vkremez.com calendar_today25-08-2015 03:03:37

4,6K Tweets

45,8K Followers

91 Following

Follow People
Vitali Kremez(@VK_Intel) 's Twitter Profile Photo

Offsecurity: First time flying as a private pilot single engine land from east -> west coast of Florida.

Aircraft: Cessna 172N

IFR training and rotorcraft add-on next!

account_circle
Vitali Kremez(@VK_Intel) 's Twitter Profile Photo

🔥Breaking Blog: AdvIntel's State of aka ' ' Displays Over Million 🌎Compromised Machines Through 2⃣0⃣2⃣2⃣
Insight:

*⃣Emotet infection chain is currently attributed to & ransomware chains.

advintel.io/post/advintel-…

🔥Breaking Blog: AdvIntel's State of #Emotet aka '#SpmTools' Displays Over Million 🌎Compromised Machines Through 2⃣0⃣2⃣2⃣ Insight: *⃣Emotet infection chain is currently attributed to #Quantum & #BlackCat ransomware chains. advintel.io/post/advintel-…
account_circle
BleepingComputer(@BleepinComputer) 's Twitter Profile Photo

Ionut Ilascu Someone is hitting Cobalt Strike servers used by former members of the Conti ransomware gang with messages urging to stop Russia's war:

“Stop the war!”
“15000+ dead Russian soldiers!”
“Be a Russian patriot!”
'Stop Putin!'

@Ionut_Ilascu Someone is hitting Cobalt Strike servers used by former members of the Conti ransomware gang with messages urging to stop Russia's war: “Stop the war!” “15000+ dead Russian soldiers!” “Be a Russian patriot!” 'Stop Putin!'
account_circle
Vitali Kremez(@VK_Intel) 's Twitter Profile Photo

📌We have observed the 'Anti-Putin' messages from Cobalt Strike flooding activities mapped to ex-Conti cybercrime enterprise members.

account_circle
Vitali Kremez(@VK_Intel) 's Twitter Profile Photo

Insight:⚡️ loader-as-a-service infection metrics globally for 2022 of ~1,300,000 unique bot_ids / top targeted infected by loader (including honeypot activity). Still alive but on a general decline.

The public report is incoming.

Insight:⚡️#Emotet loader-as-a-service infection metrics globally for 2022 of ~1,300,000 unique bot_ids / top targeted infected by loader (including honeypot activity). Still alive but on a general decline. The public report is incoming.
account_circle
Patrick Gray(@riskybusiness) 's Twitter Profile Photo

We're publishing so much great stuff in coming days.

There's another Between Two Nerds episode with Tom Uren and thaddeus e. grugq [email protected], plus Catalin Cimpanu interviews Vitali Kremez about his call that Ransomware as a Service is dying.

Risky Biz News RSS risky.biz/subscribe

account_circle
Vitali Kremez(@VK_Intel) 's Twitter Profile Photo

⚡️Timely report on the latest Cobalt Strike domain fronting technique leveraging tyk[.]io.

Many ex-Conti groups leverage this domain fronting technique for Cobalt Strike beacon resolver/traffic.

Watch out for tyk[.]io traffic.

shells.systems/oh-my-api-abus…

account_circle
Virus Bulletin(@virusbtn) 's Twitter Profile Photo

Advanced Intel's Vitali Kremez has published a BazarCall advisory. The “BazarCall” style attack, or call back phishing, is an attack vector that utilizes targeted phishing methodology and first emerged in 2020/2021 as a tool of Ryuk (later rebranded Conti). advintel.io/post/bazarcall…

Advanced Intel's @VK_Intel has published a BazarCall advisory. The “BazarCall” style attack, or call back phishing, is an attack vector that utilizes targeted phishing methodology and first emerged in 2020/2021 as a tool of Ryuk (later rebranded Conti). advintel.io/post/bazarcall…
account_circle
Lawrence Abrams(@LawrenceAbrams) 's Twitter Profile Photo

These three ex-Conti extortion gangs are responsible for the surge of 'BazarCall' callback phishing schemes.
bleepingcomputer.com/news/security/…

account_circle