home.social

#malwareresearch — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #malwareresearch, aggregated by home.social.

  1. Proton Reports Malicious Proton VPN Impersonators in Chrome Web Store

    Impact reportedly included:
    • Credential harvesting
    • Personal data collection
    • Potential traffic relay
    • Abuse of brand trust
    Repeated reporting allegedly led to delayed removal.

    Security takeaways:
    • Extension ecosystems remain high-risk
    • Search-based brand targeting is effective for attackers
    • Store review latency increases exposure window

    Community question:
    Should browser vendors implement stricter publisher verification or cryptographic signing tied to corporate identity?

    Source: cyberinsider.com/proton-warns-

    Engage below and follow @technadu for threat ecosystem analysis and digital trust reporting.

    #ThreatIntel #BrowserSecurity #ExtensionSecurity #ProtonVPN #CyberRisk #AppStoreSecurity #Infosec #MalwareResearch

  2. TrustConnect = RAT disguised as RMM.
    Discovered by Proofpoint.
    Technical observations:
    • Centralized multi-customer C2
    • API-driven agent registration (/api/agents/register)
    • WebSocket RDP streaming
    • EV certificate abuse (revoked Feb 6, 2026)
    • Branded payload generation per org token
    • Rapid infra pivot → “DocConnect” (SignalR integration)
    Subscription model: $300/month via BTC/USDT.
    Operators tracked victims across tenants.
    This is MaaS evolving toward operational maturity — automation, AI-assisted site generation, and SaaS-style lifecycle management.

    How should defenders adjust detection logic when malware is digitally signed and infrastructure rotates quickly?

    Source: proofpoint.com/us/blog/threat-

    Engage below.
    Follow TechNadu for technical threat intelligence coverage.

    #ThreatIntelligence #ReverseEngineering #MalwareResearch #RAT #MaaS #SOC #DFIR #CyberOperations #DetectionEngineering

  3. CTM360 identifies an active campaign leveraging Google Groups and Google-hosted redirect chains to deliver Lumma Stealer (Windows) and a trojanized Chromium fork branded “Ninja Browser” (Linux).
    Technical highlights:
    • 950MB padded executable (null-byte inflation)
    • AutoIt loader reconstruction
    • Memory-resident payload execution
    • Multipart/form-data POST exfiltration
    • Malicious extension “NinjaBrowserMonetisation”
    • XOR + Base56-like JS obfuscation
    • Scheduled task persistence
    • Russian search engine default modification

    This campaign reinforces a critical shift: SaaS platforms are now delivery infrastructure.
    Defensive priorities:
    – IoC blocking at firewall + EDR
    – Redirect chain inspection
    – Extension audit controls
    – Endpoint scheduled task monitoring

    How are you adjusting detection engineering for SaaS-based malware distribution?
    Engage below.

    Source: ctm360.com/reports/ninja-brows

    Follow @technadu for ongoing threat intelligence coverage.

    #ThreatIntel #MalwareResearch #DetectionEngineering #SOCOperations #EDR #CloudSecurity #SaaSAbuse #LummaStealer #LinuxThreats #CTM360 #IncidentResponse

  4. CTM360 identifies an active campaign leveraging Google Groups and Google-hosted redirect chains to deliver Lumma Stealer (Windows) and a trojanized Chromium fork branded “Ninja Browser” (Linux).
    Technical highlights:
    • 950MB padded executable (null-byte inflation)
    • AutoIt loader reconstruction
    • Memory-resident payload execution
    • Multipart/form-data POST exfiltration
    • Malicious extension “NinjaBrowserMonetisation”
    • XOR + Base56-like JS obfuscation
    • Scheduled task persistence
    • Russian search engine default modification

    This campaign reinforces a critical shift: SaaS platforms are now delivery infrastructure.
    Defensive priorities:
    – IoC blocking at firewall + EDR
    – Redirect chain inspection
    – Extension audit controls
    – Endpoint scheduled task monitoring

    How are you adjusting detection engineering for SaaS-based malware distribution?
    Engage below.

    Source: ctm360.com/reports/ninja-brows

    Follow @technadu for ongoing threat intelligence coverage.

    #ThreatIntel #MalwareResearch #DetectionEngineering #SOCOperations #EDR #CloudSecurity #SaaSAbuse #LummaStealer #LinuxThreats #CTM360 #IncidentResponse

  5. CTM360 identifies an active campaign leveraging Google Groups and Google-hosted redirect chains to deliver Lumma Stealer (Windows) and a trojanized Chromium fork branded “Ninja Browser” (Linux).
    Technical highlights:
    • 950MB padded executable (null-byte inflation)
    • AutoIt loader reconstruction
    • Memory-resident payload execution
    • Multipart/form-data POST exfiltration
    • Malicious extension “NinjaBrowserMonetisation”
    • XOR + Base56-like JS obfuscation
    • Scheduled task persistence
    • Russian search engine default modification

    This campaign reinforces a critical shift: SaaS platforms are now delivery infrastructure.
    Defensive priorities:
    – IoC blocking at firewall + EDR
    – Redirect chain inspection
    – Extension audit controls
    – Endpoint scheduled task monitoring

    How are you adjusting detection engineering for SaaS-based malware distribution?
    Engage below.

    Source: ctm360.com/reports/ninja-brows

    Follow @technadu for ongoing threat intelligence coverage.

    #ThreatIntel #MalwareResearch #DetectionEngineering #SOCOperations #EDR #CloudSecurity #SaaSAbuse #LummaStealer #LinuxThreats #CTM360 #IncidentResponse

  6. CTM360 identifies an active campaign leveraging Google Groups and Google-hosted redirect chains to deliver Lumma Stealer (Windows) and a trojanized Chromium fork branded “Ninja Browser” (Linux).
    Technical highlights:
    • 950MB padded executable (null-byte inflation)
    • AutoIt loader reconstruction
    • Memory-resident payload execution
    • Multipart/form-data POST exfiltration
    • Malicious extension “NinjaBrowserMonetisation”
    • XOR + Base56-like JS obfuscation
    • Scheduled task persistence
    • Russian search engine default modification

    This campaign reinforces a critical shift: SaaS platforms are now delivery infrastructure.
    Defensive priorities:
    – IoC blocking at firewall + EDR
    – Redirect chain inspection
    – Extension audit controls
    – Endpoint scheduled task monitoring

    How are you adjusting detection engineering for SaaS-based malware distribution?
    Engage below.

    Source: ctm360.com/reports/ninja-brows

    Follow @technadu for ongoing threat intelligence coverage.

    #ThreatIntel #MalwareResearch #DetectionEngineering #SOCOperations #EDR #CloudSecurity #SaaSAbuse #LummaStealer #LinuxThreats #CTM360 #IncidentResponse

  7. Hey there! I stumbled upon a fresh sample of Formbook info-stealer malware. During analysis I found this malware hides its payload into a vulnerable WordPress website.
    Read the article to know more.
    #FormBook #Stealer #MalwareAnalysis #MalwareResearch #CTI #ThreatIntel #InfoSec ashishranax.github.io/posts/Fo