Anton Cherepanov(@cherepanov74) 's Twitter Profileg
Anton Cherepanov

@cherepanov74

Malware researcher at ESET Slovakia. Opinions are my own.

ID:1381601046

calendar_today26-04-2013 10:44:12

1,3K Tweets

4,4K Followers

854 Following

Helthydriver(@Helthydriver) 's Twitter Profile Photo

Two days ago I had the pleasure of presenting our latest research at iVerify about BLASTPASS Exploit Chain at in Singapore. (blackhat.com/asia-24/briefi…)

During the talk I presented how forensic analysis led to the discovery of the sample, the amount of steps

account_circle
Gabby Roncone 🇺🇦 🇵🇸(@gabby_roncone) 's Twitter Profile Photo

Today, Mandiant / Google is opening up a Can o’ Sandworms. I’m incredibly proud to have led the year+ long effort with a brilliant group of colleagues to graduate Sandworm into APT44. cloud.google.com/blog/topics/th…

account_circle
Volexity(@Volexity) 's Twitter Profile Photo

Our latest blog post details Volexity's identification & incident response associated with the Palo Alto Networks GlobalProtect vuln, assigned CVE-2024-3400, that the team found being exploited in the wild.

Read more here: volexity.com/blog/2024/04/1…

account_circle
John(@Big_Bad_W0lf_) 's Twitter Profile Photo

🔥 Hot 🔥 off the press, a new Mandiant blog detailing several case studies of lateral movement / post-ex activity we’ve observed following successful exploitation of Ivanti CS appliances. cloud.google.com/blog/topics/th…

account_circle
Helthydriver(@Helthydriver) 's Twitter Profile Photo

Early fall last year we received an iTunes Backup: And I found THE *needle* in the haystack! A sample of NSO Pegasus BLASTPASS Exploit Chain.

Have a look at this blogpost which reveals some of my early steps of the analysis.

iverify.io/post/clipping-…

account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

’s monitoring of shows that the activity of this notorious -as-a-service (CaaS) has reached new heights. In H2 2023, the number of AceCryptor attack attempts we detected tripled when compared to the first half of 2023. welivesecurity.com/en/eset-resear… 1/6

#ESETresearch’s monitoring of #AceCryptor shows that the activity of this notorious #cryptor-as-a-service (CaaS) has reached new heights. In H2 2023, the number of AceCryptor attack attempts we detected tripled when compared to the first half of 2023. welivesecurity.com/en/eset-resear… 1/6
account_circle
J. A. Guerrero-Saade(@juanandres_gs) 's Twitter Profile Photo

It's been an interesting weekend! Eagle-eyed Tom Hegel spotted what appears to be a new variant of AcidRain. Notably this sample was compiled for Linux x86 devices, we are calling it 'AcidPour'. Those of you that analyzed AcidRain will recognize some of the strings. Analysis 🧵

It's been an interesting weekend! Eagle-eyed @TomHegel spotted what appears to be a new variant of AcidRain. Notably this sample was compiled for Linux x86 devices, we are calling it 'AcidPour'. Those of you that analyzed AcidRain will recognize some of the strings. Analysis 🧵
account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

has discovered a new campaign by 🇨🇳China-aligned , leveraging the Monlam Festival to target Tibetans. The campaign included a targeted watering hole, compromised news website, and an additional supply-chain attack ... welivesecurity.com/en/eset-resear… 1/7

account_circle
HaxRob(@haxrob) 's Twitter Profile Photo

I recently found two very interesting Linux binaries uploaded to Virustotal.

I call this malware 'GTPDOOR'.

GTPDOOR is a 'magic/wakeup' packet backdoor that uses a novel C2 transport protocol: GTP (GPRS Tunnelling Protocol), silently listening on the GRX network (1/n) 🧵

I recently found two very interesting Linux binaries uploaded to Virustotal. I call this malware 'GTPDOOR'. GTPDOOR is a 'magic/wakeup' packet backdoor that uses a novel C2 transport protocol: GTP (GPRS Tunnelling Protocol), silently listening on the GRX network (1/n) 🧵
account_circle
Avast Threat Labs(@AvastThreatLabs) 's Twitter Profile Photo

Lazarus is back with a new variant of their infamous FudModule rootkit!

Ditching their old BYOVD techniques, Lazarus upgraded to exploiting a much stealthier admin-to-kernel zero-day for CVE-2024-21338 (addressed in the February Patch Tuesday update).

decoded.avast.io/janvojtesek/la…

account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

discovered Operation Texonto, a disinformation campaign intended to demoralize Ukrainians. We detected two spam waves: November and late December 2023. The emails warn about drug or food shortages, or suggest amputating a limb to avoid military. 🇺🇦🇷🇺 1/5

#BREAKING #ESETresearch discovered Operation Texonto, a disinformation campaign intended to demoralize Ukrainians. We detected two spam waves: November and late December 2023. The emails warn about drug or food shortages, or suggest amputating a limb to avoid military. 🇺🇦🇷🇺 1/5
account_circle
John Hultquist(@JohnHultquist) 's Twitter Profile Photo

Action by DOJ on a botnet used by APT28 for C2. Similar to the recent action against Volt Typhoon. These impacts don’t last forever, but these are imminent threats to elections and critical infrastructure and DOJ is adding friction. Outstanding. justice.gov/opa/pr/justice…

account_circle
Tom Hegel(@TomHegel) 's Twitter Profile Photo

New fantastic report -- Chinese APT intrusion into Ministry of Defence (MOD) of the Netherlands.

ncsc.nl/documenten/pub…

New fantastic report -- Chinese APT intrusion into Ministry of Defence (MOD) of the Netherlands. ncsc.nl/documenten/pub…
account_circle
Shane Huntley(@ShaneHuntley) 's Twitter Profile Photo

Announcing the latest report from Threat Analysis Group documents the rise of commercial surveillance vendors and the industry that threatens free speech, the free press and the open internet

blog.google/threat-analysi…

Some highlights below. 🧵

account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

has discovered a China-aligned APT group, which we named , that leverages adversary-in-the-middle (AitM) to deliver the NSPX30 implant via software updates. NSPX30 is a sophisticated implant evolving since at least 2005. facundo Mz welivesecurity.com/en/eset-resear… 1/6

account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

has documented a growing series of OilRig downloaders using legitimate cloud service providers for C&C communication, all deployed against a small group of especially interesting, repeatedly victimized targets in Israel. welivesecurity.com/en/eset-resear… Zuzana Hromcova 1/7

account_circle
ESET Research(@ESETresearch) 's Twitter Profile Photo

warns about malicious Python packages in the official @PyPI repository that target Windows and Linux. This cluster shares metadata or has similar payloads, and seems different from the one we reported in May: x.com/esetresearch/s…. Marc-Etienne M.Léveillé 1/6

#ESETresearch warns about malicious Python packages in the official @PyPI repository that target Windows and Linux. This cluster shares metadata or has similar payloads, and seems different from the one we reported in May: x.com/esetresearch/s…. @marc_etienne_ 1/6
account_circle
BINARLY🔬(@binarly_io) 's Twitter Profile Photo

🚨 Breaking: Binarly reveals widespread vulnerabilities in UEFI firmware image parsing components. Major device manufacturers on x86 and ARM devices at risk.

🔬Details from our research at :
binarly.io/posts/finding_…

account_circle
Microsoft Threat Intelligence(@MsftSecIntel) 's Twitter Profile Photo

Microsoft has uncovered a supply chain attack by North Korean threat actor Diamond Sleet (ZINC) involving the modification of an installer file from software maker CyberLink. The payload calls back to attacker infrastructure for instructions. Learn more: msft.it/6013iHoQF

account_circle