/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Thomas Roccia

@fr0gger_
6 posts
2024-12-12
🚨 Secret Blizzard hijacked Storm-0156 infrastructure for espionage in South Asia. In Ukraine, they used Amadey bots & PowerShell backdoors to deploy Tavdig & KazuarV2 malware! @MsftSecIntel Check out the 2-part blog 👇 1️⃣ https://www.microsoft.com/... 2️⃣ https://www.microsoft.com/... [image]
2024-12-12 View on X
TechCrunch

Microsoft says Russia-backed hacking group Secret Blizzard targeted Ukraine's military using other cybercriminals' tools, “to make attribution more difficult”

A Russian-government backed hacking group targeted Ukraine's military using tools and infrastructure developed by cybercriminals, according to new research.

2024-10-30
📢 New @MsftSecIntel threat report. 🇷🇺 Russian threat actor Midnight Blizzard (NOBELIUM) launched a large-scale spear-phishing campaign using signed RDP files, targeting 100+ organizations, mainly in the UK, Europe, Australia, and Japan #threatintel https://www.microsoft.com/... [image]
2024-10-30 View on X
Bloomberg

Microsoft says Russian hackers have sent “highly targeted spearphishing emails” to thousands of US officials, defense workers, and others during the past week

- Thousands targeted in spearphishing campaign during last week  — Hackers said to impersonate Microsoft employees in some emails

2024-04-03
Kudos to the amazing researchers that published their analysis: - https://gynvael.coldwind.pl/ ... by @gynvael - https://gist.github.com/... by @thesamesam@social.treehouse.systems - https://boehs.org/... by @eb@social.coop - https://www.openwall.com/... by @AndresFreundTec -...
2024-04-03 View on X
research!rsc

A timeline of the attack on open-source project XZ Utils, which began in late 2021 and led to a backdoor with RCE in Linux distros Debian, Red Hat, and others

Over a period of over two years, an attacker using the name “Jia Tan” worked as a diligent, effective contributor to the xz compression library …

🤯 The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! I hope it helps to make sense of the information out there. Please treat the information “as is” while the analysis... [image]
2024-04-03 View on X
research!rsc

A timeline of the attack on open-source project XZ Utils, which began in late 2021 and led to a backdoor with RCE in Linux distros Debian, Red Hat, and others

Over a period of over two years, an attacker using the name “Jia Tan” worked as a diligent, effective contributor to the xz compression library …

2024-04-01
🤯 The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! I hope it helps to make sense of the information out there. Please treat the information “as is” while the analysis... [image]
2024-04-01 View on X
Security Boulevard

Microsoft engineer Andres Freund accidentally found the malicious code in versions of the XZ Utils compression tool, likely preventing thousands of infections

Yesterday's discovery of the xz backdoor was an accident.  But what a fortunate accident it was.

2023-12-30
🚨 New @MsftSecIntel report “Threat Actors misusing App Installer” 👇 💼 Storm-0569, Storm-1113, Storm-1674 and Sangria Tempest using App Installer to spread malware since Nov 2023. ☠️ Malicious MSIX packages pushed via fake ads & phishing on Microsoft Teams. 🛡️... [image]
2023-12-30 View on X
XDA Developers

Microsoft disables Windows App Installer's ms-appinstaller after the URI scheme was used to spread malware; Microsoft disabled and re-enabled the scheme in 2022

While I was there this was used to deliver malware and had no basic security thought put into it, so they disabled the feature.  —  After I left they reenabled it, it got misused f...