home.social

Search

1000 results for “alien”

  1. Disclosing new PebbleDash-based tools

    Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...

    Pulse ID: 6a05af0979e3cc1214a50d4e
    Pulse Link: otx.alienvault.com/pulse/6a05a
    Pulse Author: AlienVault
    Created: 2026-05-14 11:16:25

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault

  2. my beautiful son caught in the middle of an intraplanetary diplomatic crisis

    #art #digitalArt #drawing #alien

  3. 💻 I nuovi Dell e Alienware sbarcano in Europa: prestazioni premium, design aggiornato e prezzi da 999 euro. La sfida è aperta. #Dell #Alienware

    🔗 tomshw.it/hardware/alienware-1

  4. Boop Beep: the bot says it's #selfPromo time!

    Like my #art ? Like #stickers ? Like #mailArt ?
    Become a supporter on Ko-fi to get all of the above!
    ko-fi.com/alien_sunset/tiers

    you can find more ways to support me at alien-sunset.neocities.org

  5. Boop Beep: the bot says it's #selfPromo time!

    Like my #art ? Like #stickers ? Like #mailArt ?
    Become a supporter on Ko-fi to get all of the above!
    ko-fi.com/alien_sunset/tiers

    you can find more ways to support me at alien-sunset.neocities.org

  6. Boop Beep: the bot says it's #selfPromo time!

    Like my #art ? Like #stickers ? Like #mailArt ?
    Become a supporter on Ko-fi to get all of the above!
    ko-fi.com/alien_sunset/tiers

    you can find more ways to support me at alien-sunset.neocities.org

  7. Boop Beep: the bot says it's #selfPromo time!

    Like my #art ? Like #stickers ? Like #mailArt ?
    Become a supporter on Ko-fi to get all of the above!
    ko-fi.com/alien_sunset/tiers

    you can find more ways to support me at alien-sunset.neocities.org

  8. Boop Beep: the bot says it's #selfPromo time!

    Like my #art ? Like #stickers ? Like #mailArt ?
    Become a supporter on Ko-fi to get all of the above!
    ko-fi.com/alien_sunset/tiers

    you can find more ways to support me at alien-sunset.neocities.org

  9. Python Backdoor Threat Analysis Following an AI Deepfake Impersonation Campaign

    A sophisticated campaign linked to APT37 delivers Python-based backdoors through spear-phishing emails containing malicious LNK files disguised as legitimate documents. Attackers use themes including airline e-tickets, North Korea research invitations, and impersonation of defense and police officials to induce execution. The LNK files employ environment variable-based obfuscation techniques to download additional BAT files, which establish a Python runtime environment and execute compiled Python bytecode disguised with .cat extensions. The malware functions as a remote command execution backdoor, communicating with C2 servers to receive commands and exfiltrate results. Persistence is maintained through scheduled tasks executing at one-minute intervals. The campaign shows strong tactical similarities to previous APT37 operations, including infrastructure patterns, script obfuscation methods, and the abuse of legitimate tools.

    Pulse ID: 6a04a9a090a64de310cb0568
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:41:04

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #APT37 #BackDoor #CyberSecurity #Email #InfoSec #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #Python #RAT #RemoteCommandExecution #SpearPhishing #bot #AlienVault

  10. ClickFix Evolves with PySoxy Proxying

    A sophisticated ClickFix campaign was observed in April 2026 deploying PySoxy, a decade-old open-source Python SOCKS5 proxy tool, to establish encrypted proxy access on compromised hosts. The attack chain begins with social engineering that tricks users into executing obfuscated PowerShell commands, which then establishes scheduled task persistence and deploys an in-memory PowerShell-based command-and-control agent. Following domain reconnaissance activities, attackers deploy PySoxy to create a redundant encrypted access channel. The persistence mechanism continues attempting re-execution even after initial connections are blocked, demonstrating how single ClickFix executions can evolve into modular post-exploitation chains. This development represents a significant evolution from simple one-time execution to durable access with multiple redundant pathways, requiring comprehensive remediation beyond blocking initial callbacks.

    Pulse ID: 6a04a9a171b2ad5ef57d9993
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:41:05

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #OTX #OpenThreatExchange #PowerShell #Proxy #Python #RAT #RCE #SocialEngineering #bot #socks5 #AlienVault

  11. Thus Spoke…The Gentlemen

    On May 4th, 2026, The Gentlemen RaaS administrator acknowledged that an internal backend database called Rocket had been leaked, exposing nine accounts including zeta88, the program's effective administrator. The leak revealed internal discussions detailing initial access methods through Fortinet and Cisco edge appliances, NTLM relay, and credential logs, along with the group's role divisions and toolsets. Evidence shows evaluation of CVEs including CVE-2024-55591, CVE-2025-32433, and CVE-2025-33073. Leaked ransom negotiations showed a successful payment of 190,000 USD. The group reused stolen data from a UK software consultancy to attack a Turkish company, employing dual-pressure tactics during negotiations. Analysis of ransomware samples identified eight distinct affiliate TOX IDs, indicating the administrator actively participates in infections alongside managing the RaaS program.

    Pulse ID: 6a04aad1cd2da41f0087f85d
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:46:09

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cisco #CyberSecurity #Edge #ICS #InfoSec #LUA #OTX #OpenThreatExchange #RAT #RaaS #RansomWare #Turkish #UK #bot #AlienVault

  12. A decade ago I made a tune that sounded so UFO-like to me, and had just heard about the Anunnaki: the title seemed obvious, the dubplate part referring to the undiscovered jewel nature of the audio!

    deepnbeeperbass.bandcamp.com/a

    A solid bass layer, trippy synths and skittering, warping amens make this an experience not to be messed with.

    This release is a 2026 ReMaster and difference in audio quality is distinctive.

    ENJOY!

    =)

    #dubstep
    #bass
    #oneforty
    #halftime
    #alien

  13. Alienator 93 (1993) - Crack: Mayhem - #Commodore64
    SideWinder (1988) - Crack: Champs - #Amiga
    Hideous! (1992) - Crack: Alphaflight - #Commodore64
    Big Sea (1994) - Crack: Mongols - #Amiga

  14. Aliens: #NiUS Vorsicht vor Massenverblödungswaffen der Rechtsextremen

  15. Aliens: #NiUS Vorsicht vor Massenverblödungswaffen der Rechtsextremen