GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

LockBit have apparently reappeared, claiming they have hit the FBI. #threatintel

grey, to China

Rumint is that the Change Healthcare was Chinese espionage that was caught and they overreacted and turned off all systems thinking ransomware was going to be deployed.

This fits with Chinese targeting of healthcare and pharmacies in the past. My assessment is that it could also be Russian long term staging or espionage as they are also known to target healthcare and pharmacies.

#threatintel #rumor #change_healthcare #china #russia #apt

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Netcompany (7k employees - end to end IT services in North Europe) has a data breach, where their source code and certificates have gone walkies to a data leak group called Zyndicate.

https://www.version2.dk/artikel/hackere-laekker-kildekode-og-passwords-fra-netcompany-truer-den-danske-stat

#threatintel

RedPacketSecurity, to OSINT
fellows, to random
@fellows@cyberplace.social avatar

Just a friendly reminder that Googleweblight[.]com is still being used by malicious individuals/groups as a trusted URL in their phishing/malware emails.

Even though Google discontinued the service way back in 2022, it still lives on.

Apparently Google Web Light’s sole purpose now is for deceptive URL redirections for fake DocuSign emails. I guess that's one of the reasons why Google needed to buy Mandiant.

#ThreatIntel

fellows, to random
@fellows@cyberplace.social avatar

Haven't come across these guys before…

Exactag[.]com being used as the URL in phishing/malware emails I've seen over the last 24 hours. Email is pretending to be a Microsoft Office 365 mail delivery report. Sample Below.

Google says “the Exactag platform allows you to reshape and future-proof your measurement through unique data collection and cutting-edge algorithms.” Which I think in simpler terms translates to ‘a place where malicious actors can hide their malicious URLs’

#ThreatIntel

M4tw3R, to random
GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Birchall Foodservice has a ransomware incident ongoing.

Although they say no evidence of data exfil, Black Basta have data exfil on their portal. #threatintel

grey, to random
GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Huge US healthcare provider Change Healthcare has a “cybersecurity incident” going on for 15 hours and has shut down systems. https://techcrunch.com/2024/02/21/change-healthcare-cyberattack/

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

Reuters reports the Change Healthcare outage, which is still ongoing almost a week later, was not caused by a “nation state” as claimed by the victim - but it’s an AlphV ransomware incident. https://www.reuters.com/technology/cybersecurity/cyber-security-outage-change-healthcare-continues-sixth-straight-day-2024-02-26/

#threatintel

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

AlphV ransomware group have claimed the ongoing Change Healthcare incident which is causing problems across the US. #threatintel

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

The Change Healthcare incident is rumbling on. They’ve now acknowledged it is AlphV ransomware group, not a nation state as they prior claimed. https://techcrunch.com/2024/02/29/unitedhealth-change-healthcare-ransomware-alphv-blackcat-pharmacy-outages/

#threatintel

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

New ransomware group, Mogilevich

http://dkgn45pinr7nwvdaehemcrpgcjqf4fooit3c4gjw6dhzrp443ctvnoad.onion

One victim so far, a car manufacturing supplier. #threatintel

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

Mogilevich ransomware (extortion) group claim their latest victim is Epic Games.
#threatintel

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

They’re also trying to extort the Irish government. #threatintel

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

Irish government say no evidence of a breach by this group.

https://therecord.media/ireland-dfa-no-evidence-of-cybersecurity-breach

#threatintel

GossiTheDog, (edited )
@GossiTheDog@cyberplace.social avatar

Epic Games tell me there is “currently zero evidence” of a breach by this group, apparently Mogilevich are full of shit.

They’re @MogilevichSupport on Telegram if you want to ask them.

#threatintel

fellows, to random
@fellows@cyberplace.social avatar

Just a friendly reminder that malicious groups/individuals like to use URLs that point back to Cloudflare's IPFS system in their malicious emails (this isn't something new). Cloudflare-ipfs[.]com is the domain to watch out for.

Seeing a slight uptick in malicious email using Cloudflare IPFS again. Specifically ones pretending to be a “Salary Upgrade” email where the user is asked to click a link to confirm their new salary information for 2024.

#ThreatIntel

GossiTheDog, (edited ) to random
@GossiTheDog@cyberplace.social avatar
GossiTheDog,
@GossiTheDog@cyberplace.social avatar

Equilend have been added to LockBit’s portal. #threatintel

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

LockBit have given Equilend another day. #threatintel

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

NoName057(16) are targeting the UK today, so I shall start monitoring them and naming their targets and attack types.

Their targeting: https://raw.githubusercontent.com/GossiTheDog/Monitoring/main/NoName/targets_2023_12_07_11am.txt

Currently:
pa.eastcambs.gov.uk
politics.leics.gov.uk
www.liverpool.gov.uk
www.mil.be
www.bollington-tc.gov.uk
www.cranbrooktowncouncil.gov.uk
cert.be
my.swiftcard.org.uk
www.monarchie.be
www.premier.be
www.david-clarinval.be
www.dekamer.be
www.senaat.be

#threatintel #noname

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

#NoName DDoS targets - why not have 5 countries.

New C2 5.252.23.100 - fake London VPS company again

Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_20_12pm.txt

#threatintel

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

#NoName DDoS targets, Ukraine and Japan. 2 year war anniversary.

New C2 38.180.101.98

Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_02_22_11am.txt

#threatintel

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

I stopped #NoName monitoring and disruption over a week ago as I’ve been too busy.

I’ve just noticed from telegram they don’t appear to have had a public client since Friday, apparently somebody else has been taking down their C2 servers. Good.

#threatintel

GossiTheDog, (edited )
@GossiTheDog@cyberplace.social avatar
GossiTheDog,
@GossiTheDog@cyberplace.social avatar

#NoName DDoS targets, Denmark again.

www.toldst.dk
www.moviatrafik.dk
dinoffentligetransport.dk
ufst.dk
www.bornholms-lufthavn.dk
www.trm.dk
www.cph.dk
www.bane.dk
motorst.dk
gaeldst.dk
vurdst.dk
api.cph.dk
www.mitid.dk
danishshipping.dk
netbutik.postnord.dk
logistics.postnord.dk
www.kolding.dk

Botnet config: https://github.com/GossiTheDog/Monitoring/blob/main/NoName/targets_2024_03_02_11am.txt

#threatintel

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • osvaldo12
  • DreamBathrooms
  • mdbf
  • InstantRegret
  • ngwrru68w68
  • magazineikmin
  • everett
  • thenastyranch
  • Youngstown
  • slotface
  • cisconetworking
  • kavyap
  • ethstaker
  • JUstTest
  • modclub
  • GTA5RPClips
  • khanakhh
  • tacticalgear
  • Durango
  • rosin
  • normalnudes
  • Leos
  • provamag3
  • tester
  • cubers
  • anitta
  • lostlight
  • All magazines