home.social

#sandworm — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #sandworm, aggregated by home.social.

  1. 🐛🤖 "Shai-Hulud-themed malware" in PyTorch Lightning? Really? What's next, a Bene Gesserit ransomware? This is just another excuse for a #cybersecurity company to throw #buzzwords like multimodal and AI at us while riding the #sandworm of #fearmongering. 📈🔒
    semgrep.dev/blog/2026/maliciou #ShaiHuludMalware #PyTorchLightning #HackerNews #ngated

  2. 🐛🤖 "Shai-Hulud-themed malware" in PyTorch Lightning? Really? What's next, a Bene Gesserit ransomware? This is just another excuse for a #cybersecurity company to throw #buzzwords like multimodal and AI at us while riding the #sandworm of #fearmongering. 📈🔒
    semgrep.dev/blog/2026/maliciou #ShaiHuludMalware #PyTorchLightning #HackerNews #ngated

  3. 🐛🤖 "Shai-Hulud-themed malware" in PyTorch Lightning? Really? What's next, a Bene Gesserit ransomware? This is just another excuse for a #cybersecurity company to throw #buzzwords like multimodal and AI at us while riding the #sandworm of #fearmongering. 📈🔒
    semgrep.dev/blog/2026/maliciou #ShaiHuludMalware #PyTorchLightning #HackerNews #ngated

  4. 🐛🤖 "Shai-Hulud-themed malware" in PyTorch Lightning? Really? What's next, a Bene Gesserit ransomware? This is just another excuse for a #cybersecurity company to throw #buzzwords like multimodal and AI at us while riding the #sandworm of #fearmongering. 📈🔒
    semgrep.dev/blog/2026/maliciou #ShaiHuludMalware #PyTorchLightning #HackerNews #ngated

  5. 🐛🤖 "Shai-Hulud-themed malware" in PyTorch Lightning? Really? What's next, a Bene Gesserit ransomware? This is just another excuse for a #cybersecurity company to throw #buzzwords like multimodal and AI at us while riding the #sandworm of #fearmongering. 📈🔒
    semgrep.dev/blog/2026/maliciou #ShaiHuludMalware #PyTorchLightning #HackerNews #ngated

  6. Energy Sector Incident Report

    On December 29, 2025, coordinated destructive cyberattacks targeted Poland's energy infrastructure during severe winter weather. Approximately 30 wind and solar farms, a manufacturing company, and a combined heat and power plant serving nearly 500,000 customers were affected. Attackers exploited vulnerable FortiGate perimeter devices using stolen credentials and default passwords to access industrial control systems. Multiple types of wiper malware, including DynoWiper and LazyWiper, were deployed to destroy data across IT and OT environments. While renewable facilities lost communication with distribution operators without affecting electricity generation, the incidents demonstrated significant capability to cause physical disruption. Infrastructure analysis revealed connections to threat clusters known as Static Tundra, Ghost Blizzard, and potentially Sandworm, marking a notable escalation in cyber-sabotage operations.

    Pulse ID: 69f32ac81834d5a878e8fac0
    Pulse Link: otx.alienvault.com/pulse/69f32
    Pulse Author: AlienVault
    Created: 2026-04-30 10:11:20

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberAttack #CyberAttacks #CyberSecurity #IndustrialControlSystems #InfoSec #Malware #Manufacturing #OTX #OpenThreatExchange #Password #Passwords #Poland #RAT #Sandworm #Word #Worm #bot #AlienVault

  7. Energy Sector Incident Report

    On December 29, 2025, coordinated destructive cyberattacks targeted Poland's energy infrastructure during severe winter weather. Approximately 30 wind and solar farms, a manufacturing company, and a combined heat and power plant serving nearly 500,000 customers were affected. Attackers exploited vulnerable FortiGate perimeter devices using stolen credentials and default passwords to access industrial control systems. Multiple types of wiper malware, including DynoWiper and LazyWiper, were deployed to destroy data across IT and OT environments. While renewable facilities lost communication with distribution operators without affecting electricity generation, the incidents demonstrated significant capability to cause physical disruption. Infrastructure analysis revealed connections to threat clusters known as Static Tundra, Ghost Blizzard, and potentially Sandworm, marking a notable escalation in cyber-sabotage operations.

    Pulse ID: 69f32ac81834d5a878e8fac0
    Pulse Link: otx.alienvault.com/pulse/69f32
    Pulse Author: AlienVault
    Created: 2026-04-30 10:11:20

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberAttack #CyberAttacks #CyberSecurity #IndustrialControlSystems #InfoSec #Malware #Manufacturing #OTX #OpenThreatExchange #Password #Passwords #Poland #RAT #Sandworm #Word #Worm #bot #AlienVault

  8. Energy Sector Incident Report

    On December 29, 2025, coordinated destructive cyberattacks targeted Poland's energy infrastructure during severe winter weather. Approximately 30 wind and solar farms, a manufacturing company, and a combined heat and power plant serving nearly 500,000 customers were affected. Attackers exploited vulnerable FortiGate perimeter devices using stolen credentials and default passwords to access industrial control systems. Multiple types of wiper malware, including DynoWiper and LazyWiper, were deployed to destroy data across IT and OT environments. While renewable facilities lost communication with distribution operators without affecting electricity generation, the incidents demonstrated significant capability to cause physical disruption. Infrastructure analysis revealed connections to threat clusters known as Static Tundra, Ghost Blizzard, and potentially Sandworm, marking a notable escalation in cyber-sabotage operations.

    Pulse ID: 69f32ac81834d5a878e8fac0
    Pulse Link: otx.alienvault.com/pulse/69f32
    Pulse Author: AlienVault
    Created: 2026-04-30 10:11:20

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberAttack #CyberAttacks #CyberSecurity #IndustrialControlSystems #InfoSec #Malware #Manufacturing #OTX #OpenThreatExchange #Password #Passwords #Poland #RAT #Sandworm #Word #Worm #bot #AlienVault

  9. Energy Sector Incident Report

    On December 29, 2025, coordinated destructive cyberattacks targeted Poland's energy infrastructure during severe winter weather. Approximately 30 wind and solar farms, a manufacturing company, and a combined heat and power plant serving nearly 500,000 customers were affected. Attackers exploited vulnerable FortiGate perimeter devices using stolen credentials and default passwords to access industrial control systems. Multiple types of wiper malware, including DynoWiper and LazyWiper, were deployed to destroy data across IT and OT environments. While renewable facilities lost communication with distribution operators without affecting electricity generation, the incidents demonstrated significant capability to cause physical disruption. Infrastructure analysis revealed connections to threat clusters known as Static Tundra, Ghost Blizzard, and potentially Sandworm, marking a notable escalation in cyber-sabotage operations.

    Pulse ID: 69f32ac81834d5a878e8fac0
    Pulse Link: otx.alienvault.com/pulse/69f32
    Pulse Author: AlienVault
    Created: 2026-04-30 10:11:20

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberAttack #CyberAttacks #CyberSecurity #IndustrialControlSystems #InfoSec #Malware #Manufacturing #OTX #OpenThreatExchange #Password #Passwords #Poland #RAT #Sandworm #Word #Worm #bot #AlienVault

  10. Energy Sector Incident Report

    On December 29, 2025, coordinated destructive cyberattacks targeted Poland's energy infrastructure during severe winter weather. Approximately 30 wind and solar farms, a manufacturing company, and a combined heat and power plant serving nearly 500,000 customers were affected. Attackers exploited vulnerable FortiGate perimeter devices using stolen credentials and default passwords to access industrial control systems. Multiple types of wiper malware, including DynoWiper and LazyWiper, were deployed to destroy data across IT and OT environments. While renewable facilities lost communication with distribution operators without affecting electricity generation, the incidents demonstrated significant capability to cause physical disruption. Infrastructure analysis revealed connections to threat clusters known as Static Tundra, Ghost Blizzard, and potentially Sandworm, marking a notable escalation in cyber-sabotage operations.

    Pulse ID: 69f32ac81834d5a878e8fac0
    Pulse Link: otx.alienvault.com/pulse/69f32
    Pulse Author: AlienVault
    Created: 2026-04-30 10:11:20

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberAttack #CyberAttacks #CyberSecurity #IndustrialControlSystems #InfoSec #Malware #Manufacturing #OTX #OpenThreatExchange #Password #Passwords #Poland #RAT #Sandworm #Word #Worm #bot #AlienVault

  11. Analysis of Attack Activities Using SSH+TOR Tunnels to Achieve Covert Persistence

    APT-C-13 (Sandworm), also known as FROZENBARENTS, is a state-sponsored advanced persistent threat group conducting global cyber espionage operations. The organization recently deployed malicious campaigns using nested SSH and TOR tunnel infrastructure to establish covert remote access channels. Attackers distribute ZIP archives containing weaponized LNK files via spearphishing emails, which extract and execute payloads that create scheduled tasks disguised as legitimate software. The attack establishes dual-encrypted anonymous tunnels using obfs4 protocol to bypass deep packet inspection, while mapping sensitive ports (SMB/445, RDP/3389) to Onion domains for persistent backdoor access. The campaign leverages sophisticated anti-analysis techniques including sandbox detection, file disguise, and process masquerading to evade detection and maintain long-term unauthorized control over compromised systems for intelligence collection.

    Pulse ID: 69f1f50a5410ca637c84368c
    Pulse Link: otx.alienvault.com/pulse/69f1f
    Pulse Author: AlienVault
    Created: 2026-04-29 12:09:46

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #CyberSecurity #Email #Espionage #InfoSec #LNK #OTX #Onion #OpenThreatExchange #Phishing #RAT #RDP #SMB #SSH #Sandworm #SpearPhishing #Worm #ZIP #bot #AlienVault

  12. 疑似APT-C-13(Sandworm)组织利用SSH+TOR隧道实现隐蔽持久化的攻击活动分析-安全资讯-360官网

    Pulse ID: 69f1f472cc1acc636d7983ef
    Pulse Link: otx.alienvault.com/pulse/69f1f
    Pulse Author: CyberHunter_NL
    Created: 2026-04-29 12:07:14

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #OTX #OpenThreatExchange #SSH #Sandworm #Worm #bot #CyberHunter_NL

  13. Attack Activity Analysis Using SSH+TOR Tunnels for Covert Persistence

    APT-C-13 (Sandworm), also known as FROZENBARENTS, is a state-sponsored advanced persistent threat group conducting global cyber espionage targeting government agencies, diplomatic departments, energy enterprises, and research organizations. Recently detected samples reveal the group's use of nested SSH and TOR tunnel architecture to establish covert communication channels. The attack begins with spear-phishing emails delivering malicious LNK files disguised as PDF documents. Upon execution, the payload deploys TOR hidden services mapping internal ports (SMB/445, RDP/3389) to onion domains, while SSH services with public key authentication provide encrypted remote access. The malware employs obfs4 protocol to obfuscate TOR traffic, evading deep packet inspection. Persistence is achieved through scheduled tasks masquerading as legitimate applications like Opera GX and Dropbox, establishing an anonymous shadow management infrastructure for sustained intelligence collection.

    Pulse ID: 69f06b1eeeb1fca735cb0bb8
    Pulse Link: otx.alienvault.com/pulse/69f06
    Pulse Author: AlienVault
    Created: 2026-04-28 08:09:02

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #Dropbox #Email #Espionage #Government #InfoSec #LNK #Malware #OTX #Onion #OpenThreatExchange #Opera #PDF #Phishing #RDP #SMB #SSH #Sandworm #SpearPhishing #Worm #bot #AlienVault

  14. Europe’s Power Grid Faces Hybrid Warfare Threat

    European electricity infrastructure has become a target of sustained hybrid warfare, and a new report from Eurelectric, the…
    #Europe #EU #CriticalInfrastructure #cyberattack #DTEK #EURELECTRIC #European #Fingrid #gridresilience #HybridWarfare #Sandworm
    europesays.com/europe/3489/

  15. Jeśli ktoś chce zerknąć do świeżo wydanego raportu firmy Dragos dotyczącego ataku na polski sektor energetyczny, to link znajdzie poniżej. Wskazywana przez badaczy grupa Electrum to nic innego jak Sandworm (wg nazewnictwa stosowanego przez ESET) czy po prostu APT44, czyli ślady prowadzą do Rosji. Ale szczegółów brak, same ogólniki. Sugeruję poczekać na publikację polskiego CERT-u, która ma szansę pojawić się już jutro.

    5943619.hs-sites.com/hubfs/Rep

    #cyberbezpieczenstwo #apt44 #sandworm

  16. 🔐 🖥️ 🌐 🛡️ Russian state-sponsored hackers are moving away from security vulnerabilities and breaking into critical infrastructure through misconfigured devices, warns Amazon Threat Intelligence. ⚠️ 🏭 🔍

    Read: hackread.com/amazon-russia-gru

    #CyberSecurity #Russia #Sandworm #APT44 #Amazon

  17. 🚀🐛 Oh no! A #sandworm named Shai-Hulud decided to slither into our #dev machine and throw a #party on our #GitHub org. But don’t worry, we've got a fancy timeline of how "invincible" our #AI #agents were and how we’re "building next" the ultimate road to... nowhere! 🤖📉
    trigger.dev/blog/shai-hulud-po #mishap #tech #humor #HackerNews #ngated

  18. The russian-backed Seashell Blizzard aka #APT44 or #Sandworm is behind a stealthy “BadPilot” campaign focused on gaining persistent network access. Detect adversary activity targeting critical sectors with #Sigma rules from SOC Prime Platform.
    socprime.com/blog/seashell-bli

  19. 🚨🚀 Breaking news: an article claims to uncover the mind-blowing connection between Lawrence of Arabia and #Dune, but surprise! 🚫 It's locked tighter than a sandworm's jaws. Who needs content when you have a "403 Forbidden" error page to ponder instead? 😂🌵
    reactormag.com/lawrence-of-ara #BreakingNews #LawrenceOfArabia #403Forbidden #ErrorPage #Sandworm #HackerNews #ngated

  20. #CERTUA warns defenders of targeted activity to launch cyber-attacks against the critical infrastructure sector in Ukraine and beyond linked to UAC-0212, a subcluster of #Sandworm #APT. Detect intrusions with #Sigma rules from SOC Prime Platform.
    socprime.com/blog/detecting-ua

  21. #CERTUA warns defenders of targeted activity to launch cyber-attacks against the critical infrastructure sector in Ukraine and beyond linked to UAC-0212, a subcluster of #Sandworm #APT. Detect intrusions with #Sigma rules from SOC Prime Platform.
    socprime.com/blog/detecting-ua

  22. #CERTUA warns defenders of targeted activity to launch cyber-attacks against the critical infrastructure sector in Ukraine and beyond linked to UAC-0212, a subcluster of #Sandworm #APT. Detect intrusions with #Sigma rules from SOC Prime Platform.
    socprime.com/blog/detecting-ua

  23. Happy Wednesday everyone!

    This resources has been popping up on my feed everywhere so I took a look at it and I see why! When he is not instructing the #SANS FOR589, Will Thomas is creating highly valuable resources like the Russian APT Tool Matrix.

    Will has taken the time to correlate the tools of Russian #APTs such as #CozyBear and #Sandworm and even supplied the aliases that go along with them as well. This is a great resource if you are an organization who is APT focused to prioritize your threat hunting! Thanks a ton Will!

    Enjoy and Happy Hunting!

    Russian APT Tool Matrix:
    github.com/BushidoUK/Russian-A

    Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #readoftheday #HappyHunting Cyborg Security, Now Part of Intel 471

  24. Mandiant graduates the Russian cyberespionage Sandworm to APT44. Sandworm is publicly attributed to Unit 74455 of the Russian Main Intelligence Directorate (GRU) by the US Government. APT44 conducts missions like collecting intelligence, sabotaging networks, or conducting information operations. Mandiant's threat actor profile (40 page report) of APT44 offers a look at how cyberwarfare will be played out in future conflicts. IOC included. 🔗 cloud.google.com/blog/topics/t

    #Sandworm #cyberespionage #Russia #APT #APT44 #threatintel #RussiaUkraineWar #IOC

  25. #KRITIS Sektor #Energie

    #Sandworm Disrupts #Power in Ukraine Using a Novel Attack Against Operational Technology

    "While we were unable to identify the SCIL commands executed, we believe they were probably commands to open #CircuitBreakers in the victim’s #substation environments."
    mandiant.com/resources/blog/sa

  26. I recently finished reading the book #Sandworm by Andy Greenberg.

    I think one of the main thing I will take from that book is a scene where it is explained how a company responsible for selling accounting software were (ab)used to distribute #NotPetya around the world. It is then explained how the company did not have #APT or Nation States as part of their threat model because "we are not big or significant enough to be interesting to them".

    The take away then being: "You probably can't exclude Nation States from your threat model".

    #security