home.social

#ioc — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #ioc, aggregated by home.social.

  1. New indicators for: Vidar (+1), SalatStealer (+1), RemcosRAT (+1), Ghost RAT (+1), GhostSocks (+1), ERMAC (+1) and Tofsee (+1). vuldb.com/actor #apt #cti #ioc

  2. New indicators for: Vidar (+1), SalatStealer (+1), RemcosRAT (+1), Ghost RAT (+1), GhostSocks (+1), ERMAC (+1) and Tofsee (+1). vuldb.com/actor #apt #cti #ioc

  3. New indicators for: Vidar (+1), SalatStealer (+1), RemcosRAT (+1), Ghost RAT (+1), GhostSocks (+1), ERMAC (+1) and Tofsee (+1). vuldb.com/actor #apt #cti #ioc

  4. New indicators for: Vidar (+1), SalatStealer (+1), RemcosRAT (+1), Ghost RAT (+1), GhostSocks (+1), ERMAC (+1) and Tofsee (+1). vuldb.com/actor #apt #cti #ioc

  5. New indicators for: Vidar (+1), SalatStealer (+1), RemcosRAT (+1), Ghost RAT (+1), GhostSocks (+1), ERMAC (+1) and Tofsee (+1). vuldb.com/actor #apt #cti #ioc

  6. I got 29 of these alerts over a 3½ hour period overnight, all from IP addresses in Iran.
    Since access to the public internet has been blocked for most people in Iran since January, this is probably government-backed Iranian hackers credential-stuffing Synology boxes. I would imagine there is probably some specific reason they're targeting Synology boxes, perhaps having to do with recently patched CVEs.
    If you have Synology devices, make sure your security is tight!
    #Iran #Synology #IOC #infosec

  7. I got 29 of these alerts over a 3½ hour period overnight, all from IP addresses in Iran.
    Since access to the public internet has been blocked for most people in Iran since January, this is probably government-backed Iranian hackers credential-stuffing Synology boxes. I would imagine there is probably some specific reason they're targeting Synology boxes, perhaps having to do with recently patched CVEs.
    If you have Synology devices, make sure your security is tight!
    #Iran #Synology #IOC #infosec

  8. I got 29 of these alerts over a 3½ hour period overnight, all from IP addresses in Iran.
    Since access to the public internet has been blocked for most people in Iran since January, this is probably government-backed Iranian hackers credential-stuffing Synology boxes. I would imagine there is probably some specific reason they're targeting Synology boxes, perhaps having to do with recently patched CVEs.
    If you have Synology devices, make sure your security is tight!
    #Iran #Synology #IOC #infosec

  9. I got 29 of these alerts over a 3½ hour period overnight, all from IP addresses in Iran.
    Since access to the public internet has been blocked for most people in Iran since January, this is probably government-backed Iranian hackers credential-stuffing Synology boxes. I would imagine there is probably some specific reason they're targeting Synology boxes, perhaps having to do with recently patched CVEs.
    If you have Synology devices, make sure your security is tight!
    #Iran #Synology #IOC #infosec

  10. I got 29 of these alerts over a 3½ hour period overnight, all from IP addresses in Iran.
    Since access to the public internet has been blocked for most people in Iran since January, this is probably government-backed Iranian hackers credential-stuffing Synology boxes. I would imagine there is probably some specific reason they're targeting Synology boxes, perhaps having to do with recently patched CVEs.
    If you have Synology devices, make sure your security is tight!
    #Iran #Synology #IOC #infosec

  11. 📢 REF6598 : Obsidian détourné pour déployer le RAT PHANTOMPULSE via ingénierie sociale
    📝 ## 🔍 Contexte

    Publié le 14 avril 2026 par Elastic Security Labs (auteurs : Salim Bitam, Samir Bousseaden, Daniel Stepanic), cet article détaille la ca...
    📖 cyberveille : cyberveille.ch/posts/2026-05-1
    🌐 source : elastic.co/security-labs/phant
    #IOC #Obsidian #Cyberveille

  12. 📢 Doppelgänger : analyse complète de l'infrastructure d'opérations d'influence russe SDA/Structura
    📝 ## 🌐 Contexte

    Publié le 11 mai 2026 par DomainTools sur leur portail de recherche, ce rapport constitue une...
    📖 cyberveille : cyberveille.ch/posts/2026-05-1
    🌐 source : dti.domaintools.com/research/s
    #IOC #Keitaro #Cyberveille

  13. »Freizeitläufer, die eine langfristige Perspektive für das freie Laufen im #Cantianstadion sicherstellen wollen und nicht auf die Weisheit von #DOSB und #IOC vertrauen, können dem Volksbegehren #NOlympia ihre Stimme geben, das eine Volksabstimmung über Berlins #Olympiabewerbung erreichen will.« 👍
    gleimviertel.de/archives/35167
    #NOlympiaBerlin

  14. »Freizeitläufer, die eine langfristige Perspektive für das freie Laufen im #Cantianstadion sicherstellen wollen und nicht auf die Weisheit von #DOSB und #IOC vertrauen, können dem Volksbegehren #NOlympia ihre Stimme geben, das eine Volksabstimmung über Berlins #Olympiabewerbung erreichen will.« 👍
    gleimviertel.de/archives/35167
    #NOlympiaBerlin

  15. »Freizeitläufer, die eine langfristige Perspektive für das freie Laufen im #Cantianstadion sicherstellen wollen und nicht auf die Weisheit von #DOSB und #IOC vertrauen, können dem Volksbegehren #NOlympia ihre Stimme geben, das eine Volksabstimmung über Berlins #Olympiabewerbung erreichen will.« 👍
    gleimviertel.de/archives/35167
    #NOlympiaBerlin

  16. »Freizeitläufer, die eine langfristige Perspektive für das freie Laufen im #Cantianstadion sicherstellen wollen und nicht auf die Weisheit von #DOSB und #IOC vertrauen, können dem Volksbegehren #NOlympia ihre Stimme geben, das eine Volksabstimmung über Berlins #Olympiabewerbung erreichen will.« 👍
    gleimviertel.de/archives/35167
    #NOlympiaBerlin

  17. »Freizeitläufer, die eine langfristige Perspektive für das freie Laufen im #Cantianstadion sicherstellen wollen und nicht auf die Weisheit von #DOSB und #IOC vertrauen, können dem Volksbegehren #NOlympia ihre Stimme geben, das eine Volksabstimmung über Berlins #Olympiabewerbung erreichen will.« 👍
    gleimviertel.de/archives/35167
    #NOlympiaBerlin

  18. Updated threat actors: SystemBC (+1), Nexcorium (+2), World Leaks (+3), Nexus Team (+2), Formbook (+1), Keenadu (+2) and Head Mare (+3). vuldb.com/actor #apt #cti #ioc

  19. Updated threat actors: SystemBC (+1), Nexcorium (+2), World Leaks (+3), Nexus Team (+2), Formbook (+1), Keenadu (+2) and Head Mare (+3). vuldb.com/actor #apt #cti #ioc

  20. Updated threat actors: SystemBC (+1), Nexcorium (+2), World Leaks (+3), Nexus Team (+2), Formbook (+1), Keenadu (+2) and Head Mare (+3). vuldb.com/actor #apt #cti #ioc

  21. Updated threat actors: SystemBC (+1), Nexcorium (+2), World Leaks (+3), Nexus Team (+2), Formbook (+1), Keenadu (+2) and Head Mare (+3). vuldb.com/actor #apt #cti #ioc

  22. Updated threat actors: SystemBC (+1), Nexcorium (+2), World Leaks (+3), Nexus Team (+2), Formbook (+1), Keenadu (+2) and Head Mare (+3). vuldb.com/actor #apt #cti #ioc

  23. 📢 Post-mortem : compromission de la chaîne d'approvisionnement npm de TanStack (mai 2026)
    📝 ## 🔍 Contexte

    Le 11 mai 2026, TanStack a publié un post-mortem détaillé d'une **compromission de chaîne d'approvisionnement npm** sur...
    📖 cyberveille : cyberveille.ch/posts/2026-05-1
    🌐 source : tanstack.com/blog/npm-supply-c
    #GitHub_Actions #IOC #Cyberveille

  24. We have improved indicators: SmartApeSG (+2), ValleyRAT (+1), DCRat (+2), Remcos (+1), Havoc (+2), NetSupportManager RAT (+2) and Brute Ratel C4 (+1). vuldb.com/actor #apt #cti #ioc

  25. We have improved indicators: SmartApeSG (+2), ValleyRAT (+1), DCRat (+2), Remcos (+1), Havoc (+2), NetSupportManager RAT (+2) and Brute Ratel C4 (+1). vuldb.com/actor #apt #cti #ioc

  26. We have improved indicators: SmartApeSG (+2), ValleyRAT (+1), DCRat (+2), Remcos (+1), Havoc (+2), NetSupportManager RAT (+2) and Brute Ratel C4 (+1). vuldb.com/actor #apt #cti #ioc

  27. We have improved indicators: SmartApeSG (+2), ValleyRAT (+1), DCRat (+2), Remcos (+1), Havoc (+2), NetSupportManager RAT (+2) and Brute Ratel C4 (+1). vuldb.com/actor #apt #cti #ioc

  28. We have improved indicators: SmartApeSG (+2), ValleyRAT (+1), DCRat (+2), Remcos (+1), Havoc (+2), NetSupportManager RAT (+2) and Brute Ratel C4 (+1). vuldb.com/actor #apt #cti #ioc

  29. 📢 Campagne Mini Shai-Hulud : TanStack, UiPath, Mistral AI et d'autres packages npm/PyPI compromis
    📝 ## 🗓️ Contexte

    Le 11 mai 2026, Wiz publie une analyse technique détaillant une **attaque...
    📖 cyberveille : cyberveille.ch/posts/2026-05-1
    🌐 source : wiz.io/blog/mini-shai-hulud-st
    #GitHub_Actions #IOC #Cyberveille

  30. 📢 Campagne NPM malveillante : 38 paquets ciblant Apple, Google et Alibaba via dependency confusion
    📝 ## 🔍 Contexte

    Le 5 mai 2026, Panther Threat Research publie une analyse détaill...
    📖 cyberveille : cyberveille.ch/posts/2026-05-1
    🌐 source : panther.com/blog/frankly-malic
    #IOC #TTP #Cyberveille

  31. 📢 PamDOORa : un backdoor Linux basé sur PAM vendu sur un forum cybercriminel russe
    📝 ## 🔍 Contexte

    Publié le 7 mai 2026 par Assaf Morag (Flare), cet article analyse un outil malveillant nommé **PamDOORa...
    📖 cyberveille : cyberveille.ch/posts/2026-05-1
    🌐 source : flare.io/learn/resources/blog/
    #IOC #Linux_persistence #Cyberveille

  32. 📢 Un botnet DDoS ciblant les serveurs de jeux vidéo déployé via un honeypot Jenkins
    📝 ## 🔍 Contexte

    Publié le 29 avril 2026 par Darktrace (blog Inside the SOC), cet article présent...
    📖 cyberveille : cyberveille.ch/posts/2026-05-1
    🌐 source : darktrace.com/blog/darktrace-m
    #DDoS #IOC #Cyberveille

  33. We have added indicators: Gafgyt (+1), Vidar (+13), DCRat (+1), Evilginx (+2), AdaptixC2 (+2), XWorm (+2) and Stealc (+1). vuldb.com/actor #apt #cti #ioc

  34. We have added indicators: Gafgyt (+1), Vidar (+13), DCRat (+1), Evilginx (+2), AdaptixC2 (+2), XWorm (+2) and Stealc (+1). vuldb.com/actor #apt #cti #ioc

  35. We have added indicators: Gafgyt (+1), Vidar (+13), DCRat (+1), Evilginx (+2), AdaptixC2 (+2), XWorm (+2) and Stealc (+1). vuldb.com/actor #apt #cti #ioc

  36. We have added indicators: Gafgyt (+1), Vidar (+13), DCRat (+1), Evilginx (+2), AdaptixC2 (+2), XWorm (+2) and Stealc (+1). vuldb.com/actor #apt #cti #ioc

  37. We have added indicators: Gafgyt (+1), Vidar (+13), DCRat (+1), Evilginx (+2), AdaptixC2 (+2), XWorm (+2) and Stealc (+1). vuldb.com/actor #apt #cti #ioc

  38. We have updated indicators: Havoc (+1), Quasar RAT (+1), Meterpreter (+5), Cobalt Strike (+6), DCRat (+1), Evilginx (+2) and NetSupportManager RAT (+1). vuldb.com/actor #apt #cti #ioc

  39. We have updated indicators: Havoc (+1), Quasar RAT (+1), Meterpreter (+5), Cobalt Strike (+6), DCRat (+1), Evilginx (+2) and NetSupportManager RAT (+1). vuldb.com/actor #apt #cti #ioc

  40. We have updated indicators: Havoc (+1), Quasar RAT (+1), Meterpreter (+5), Cobalt Strike (+6), DCRat (+1), Evilginx (+2) and NetSupportManager RAT (+1). vuldb.com/actor #apt #cti #ioc

  41. We have updated indicators: Havoc (+1), Quasar RAT (+1), Meterpreter (+5), Cobalt Strike (+6), DCRat (+1), Evilginx (+2) and NetSupportManager RAT (+1). vuldb.com/actor #apt #cti #ioc

  42. We have updated indicators: Havoc (+1), Quasar RAT (+1), Meterpreter (+5), Cobalt Strike (+6), DCRat (+1), Evilginx (+2) and NetSupportManager RAT (+1). vuldb.com/actor #apt #cti #ioc

  43. International Olympic Committee Rescinds Restrictions on Belarus Athletes

    International Olympic Committee Rescinds Restrictions on Belarus Athletes The International Olympic Committee on Friday said that it no…
    #Belarus #BY #Europe #Europa #EU #2028OlympicGamesCoverage-LosAngeles #belarus #IOC #Russia #worldaquatics
    europesays.com/2978062/