/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Costin Raiu

@craiu
30 posts
2025-11-22
Random Friday news: CrowdStrike says it caught an insider sharing screenshots with ShinyHunters and fired them last month. Allegedly, ShinyHunters paid the employee $25K for access and attempted to also buy private reports. Story: https://x.com/...
2025-11-22 View on X
BleepingComputer

CrowdStrike confirms that an insider shared screenshots from internal systems with unnamed threat actors but says its systems were not breached

Sergiu Gatlan / BleepingComputer :

2025-06-19
Scammers pretending to be Predatory Sparrow are already trying to take advantage of the Nobitex hack. “Send crypto, you get back 10x-100x”. Address to block: TU8MxsYqYtpovxBLqxgFyoDP6omTExWgPq [image]
2025-06-19 View on X
TechCrunch

Nobitex, Iran's largest crypto exchange, says it was hacked, and pro-Israel group Predatory Sparrow takes credit; Elliptic: the hackers stole and “burned” $90M+

Iran's largest crypto exchange, Nobitex, said Wednesday that it was hacked and funds have been drained from its hot wallet.

2025-06-18
The Predatory Sparrow group just burned $47M of cryptocurrency taken from Iran Nobitex exchange into the “vanity” address TKFuckiRGCTerroristsNoBiTEXy2r7mNX. 108375 transactions in a couple of minutes - https://usdt.tokenview.io/...
2025-06-18 View on X
CyberScoop

A cyberattack claimed by pro-Israel hacktivist group Predatory Sparrow has reportedly disrupted services at Iran's state-owned Bank Sepah, including its website

The attack introduces a clear cyber element with immediate consequences for the country's critical infrastructure amid a growing conflict between Israel and Iran.

2024-07-20
Some people report that the files responsible for the CrowdStrike crashes (Eg. C-00000291-00000000-00000032.sys) are full of zeroes. This is not the case for any of the machines I fixed by hand today. One example is
2024-07-20 View on X
Wall Street Journal

A profile of CrowdStrike, founded in 2011 and used by 300 companies in the Fortune 500; Gartner: CrowdStrike has ~15% of the global security software market

The little-known company is very popular in Corporate America, contributing to the severity of the global IT outage

The potentially faulty Crowdstrike CSagent.sys hit VT last night. Compiled on July 9th. https://www.virustotal.com/... [image]
2024-07-20 View on X
The Verge

BSODs hit thousands of Windows PCs due to “a defect” in an update from CrowdStrike, taking banks, airlines, and more businesses offline; Microsoft is aware

or CrowdStrike Microsoft : HELPFUL LINKS  —  Get notified of outages that impact you  —  Building reliable applications on Azure The Record : IT teams scramble to recover from Crow...

It looks just like the other C-00* files in the same folder, starting with a 0xAAAAAAAA header. [image]
2024-07-20 View on X
The Verge

A workaround to fix the BSOD caused by CrowdStrike's faulty update involves booting Windows in Safe Mode and deleting the security firm's “C-00000291*.sys” file

Deleting this file named C-00000291-00000000-00000032.sys fixed the BSoD and allowed the machine to boot. YMMV. #crashstrike #crashscade
2024-07-20 View on X
The Verge

A workaround to fix the BSOD caused by CrowdStrike's faulty update involves booting Windows in Safe Mode and deleting the security firm's “C-00000291*.sys” file

Some people report that the files responsible for the CrowdStrike crashes (Eg. C-00000291-00000000-00000032.sys) are full of zeroes. This is not the case for any of the machines I fixed by hand today. One example is
2024-07-20 View on X
The Verge

A workaround to fix the BSOD caused by CrowdStrike's faulty update involves booting Windows in Safe Mode and deleting the security firm's “C-00000291*.sys” file

The potentially faulty Crowdstrike CSagent.sys hit VT last night. Compiled on July 9th. https://www.virustotal.com/... [image]
2024-07-20 View on X
Wall Street Journal

A profile of CrowdStrike, founded in 2011 and used by 300 companies in the Fortune 500; Gartner: CrowdStrike has ~15% of the global security software market

The little-known company is very popular in Corporate America, contributing to the severity of the global IT outage

It looks just like the other C-00* files in the same folder, starting with a 0xAAAAAAAA header. [image]
2024-07-20 View on X
Wall Street Journal

A profile of CrowdStrike, founded in 2011 and used by 300 companies in the Fortune 500; Gartner: CrowdStrike has ~15% of the global security software market

The little-known company is very popular in Corporate America, contributing to the severity of the global IT outage

Deleting this file named C-00000291-00000000-00000032.sys fixed the BSoD and allowed the machine to boot. YMMV. #crashstrike #crashscade
2024-07-20 View on X
Wall Street Journal

A profile of CrowdStrike, founded in 2011 and used by 300 companies in the Fortune 500; Gartner: CrowdStrike has ~15% of the global security software market

The little-known company is very popular in Corporate America, contributing to the severity of the global IT outage

2024-07-19
The potentially faulty Crowdstrike CSagent.sys hit VT last night. Compiled on July 9th. https://www.virustotal.com/... [image]
2024-07-19 View on X
The Verge

BSODs hit thousands of Windows PCs due to “a defect” in an update from CrowdStrike, taking banks, airlines, and more businesses offline; Microsoft is aware

Thousands of Windows machines are experiencing a Blue Screen of Death (BSOD) issue at boot today, impacting banks …

2022-08-11
Kudos to #Cisco for publishing details of their security breach by initial access broker (IAB) with ties to #UNC2447, #Lapsus$ and #Yanluowang. There are so many lessons to be drawn from this highlighted part about the initial access: https://twitter.com/...
2022-08-11 View on X
BleepingComputer

Cisco confirms the Yanluowang ransomware group breached its network in May 2022; Yanluowang claimed to have stolen 2.75GB of data, or ~3.1K files including NDAs

Cisco confirmed today that the Yanluowang ransomware group breached its corporate network in late May and that the actor tried … Source: Cisco Talos Intelligence Group .

2021-07-27
Always interesting to keep an eye on iOS bugs for which “Apple is aware this issue may have been actively exploited” and reported by “an anonymous researcher” 🤔
2021-07-27 View on X
The Record

Apple updates iOS, iPadOS, and macOS to address a zero-day flaw that was reportedly actively exploited, making it the 13th zero-day Apple has patched this year

Apple has released patches today for iOS, iPadOS, and macOS to address a zero-day vulnerability that the company says has been exploited in the wild.

2021-04-14
Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild by an unknown APT: https://securelist.com/...
2021-04-14 View on X
BleepingComputer

In its April batch of patches, Microsoft fixes 108 flaws, including 19 “critical” flaws, five 0-days, and four NSA-discovered critical Exchange flaws

Today is Microsoft's April 2021 Patch Tuesday, and with it comes five zero-day vulnerabilities and more Critical Microsoft Exchange vulnerabilities.

Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310) used in the wild by an unknown APT: https://securelist.com/...
2021-04-14 View on X
VICE

The DOJ says the FBI performed a court-approved operation to “copy and remove malicious web shells” on hundreds of hacked Exchange servers across the US

The FBI obtained court approval to access vulnerable computers across the United States.  —  Joseph Cox

2021-03-11
Out of the 140 known C2 servers we are tracking at OVH that are used by APT and sophisticated crime groups, approximately 64% are still online. The affected 36% include several APTs: Charming Kitten, APT39, Bahamut and OceanLotus.
2021-03-11 View on X
BleepingComputer

Data center operator OVH says a fire destroyed some of its sites in France, affecting cyber threat intelligence company Bad Packets, game maker Rust, and others

Ax Sharma / BleepingComputer :

2021-02-13
This new Bloomberg story be like: “alright guys, listen, we weren't entirely correct about that supermicro bug, but we weren't entirely wrong either because, Lenovo, and, intel, and chips encrypted in motherboard and did you btw hear about the bios thing at pentagon?”
2021-02-13 View on X
Bloomberg

Sources: US investigators say hardware and firmware of Supermicro servers were tampered with as late as 2018, via chips with backdoors sending data to China

It has been two and a half years since … John Gruber / Daring Fireball : Bloomberg, at Long Last, Follows up on ‘The Big Hack’, and It's Nothing but a Pile of Sophistic Horseshit T...

2020-12-20
We are releasing some new findings in the #Solarwinds #Sunburst #darkhalo #unc2452 story. Our analysis plus an opensource tool that decodes and matches the UIDs from the CNAME records against publicly available pDNS data: https://securelist.com/...
2020-12-20 View on X
Reuters

An analysis of publicly available web records shows SolarWinds hackers accessed the networks at Cox Communications and the local government in Pima County, AZ

including the highest reaches of the U.S. government — is certain of exactly what the hackers had infiltrated, let alone the full extent of what was taken. https://www.bloomberg.co...

We are releasing some new findings in the #Solarwinds #Sunburst #darkhalo #unc2452 story. Our analysis plus an opensource tool that decodes and matches the UIDs from the CNAME records against publicly available pDNS data: https://securelist.com/...
2020-12-20 View on X
Wired

Experts say the SolarWinds hack shows that the US still has no good answers to combat “supply chain” attacks, which are “ridiculously difficult” to detect

Despite years of warning, the US still has no good answer for the sort of “supply chain” attack that let Russia run wild.