home.social

#trellix — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #trellix, aggregated by home.social.

  1. Donuts and Beagles: Fake Claude site spreads backdoor

    A fraudulent website impersonating Anthropic's Claude AI platform has been distributing a previously undocumented backdoor called Beagle through malvertising campaigns. The attack begins when victims download a fictitious tool named Claude-Pro Relay from claude-pro[.]com, delivered as a 505 MB ZIP archive. The infection chain utilizes DLL sideloading, exploiting a signed G DATA antivirus updater to load malicious code. The technique mirrors PlugX delivery methods but deploys different payloads. Beagle supports eight commands including shell execution, file transfer, and directory listing, communicating with C2 servers using AES encryption. Related samples dating to February 2026 have been identified, with some variants delivering AdaptixC2 framework. Additional domains impersonated security vendors like Trellix, CrowdStrike, and SentinelOne. The infrastructure spans Cloudflare for distribution and Alibaba Cloud for command and control.

    Pulse ID: 69fcc63f1dce161fc2f8380c
    Pulse Link: otx.alienvault.com/pulse/69fcc
    Pulse Author: AlienVault
    Created: 2026-05-07 17:05:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #Cloud #CrowdStrike #CyberSecurity #Encryption #InfoSec #Malvertising #OTX #OpenThreatExchange #PlugX #SentinelOne #SideLoading #Trellix #ZIP #bot #AlienVault

  2. Donuts and Beagles: Fake Claude site spreads backdoor

    A fraudulent website impersonating Anthropic's Claude AI platform has been distributing a previously undocumented backdoor called Beagle through malvertising campaigns. The attack begins when victims download a fictitious tool named Claude-Pro Relay from claude-pro[.]com, delivered as a 505 MB ZIP archive. The infection chain utilizes DLL sideloading, exploiting a signed G DATA antivirus updater to load malicious code. The technique mirrors PlugX delivery methods but deploys different payloads. Beagle supports eight commands including shell execution, file transfer, and directory listing, communicating with C2 servers using AES encryption. Related samples dating to February 2026 have been identified, with some variants delivering AdaptixC2 framework. Additional domains impersonated security vendors like Trellix, CrowdStrike, and SentinelOne. The infrastructure spans Cloudflare for distribution and Alibaba Cloud for command and control.

    Pulse ID: 69fcc63f1dce161fc2f8380c
    Pulse Link: otx.alienvault.com/pulse/69fcc
    Pulse Author: AlienVault
    Created: 2026-05-07 17:05:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #Cloud #CrowdStrike #CyberSecurity #Encryption #InfoSec #Malvertising #OTX #OpenThreatExchange #PlugX #SentinelOne #SideLoading #Trellix #ZIP #bot #AlienVault

  3. Donuts and Beagles: Fake Claude site spreads backdoor

    A fraudulent website impersonating Anthropic's Claude AI platform has been distributing a previously undocumented backdoor called Beagle through malvertising campaigns. The attack begins when victims download a fictitious tool named Claude-Pro Relay from claude-pro[.]com, delivered as a 505 MB ZIP archive. The infection chain utilizes DLL sideloading, exploiting a signed G DATA antivirus updater to load malicious code. The technique mirrors PlugX delivery methods but deploys different payloads. Beagle supports eight commands including shell execution, file transfer, and directory listing, communicating with C2 servers using AES encryption. Related samples dating to February 2026 have been identified, with some variants delivering AdaptixC2 framework. Additional domains impersonated security vendors like Trellix, CrowdStrike, and SentinelOne. The infrastructure spans Cloudflare for distribution and Alibaba Cloud for command and control.

    Pulse ID: 69fcc63f1dce161fc2f8380c
    Pulse Link: otx.alienvault.com/pulse/69fcc
    Pulse Author: AlienVault
    Created: 2026-05-07 17:05:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #Cloud #CrowdStrike #CyberSecurity #Encryption #InfoSec #Malvertising #OTX #OpenThreatExchange #PlugX #SentinelOne #SideLoading #Trellix #ZIP #bot #AlienVault

  4. Donuts and Beagles: Fake Claude site spreads backdoor

    A fraudulent website impersonating Anthropic's Claude AI platform has been distributing a previously undocumented backdoor called Beagle through malvertising campaigns. The attack begins when victims download a fictitious tool named Claude-Pro Relay from claude-pro[.]com, delivered as a 505 MB ZIP archive. The infection chain utilizes DLL sideloading, exploiting a signed G DATA antivirus updater to load malicious code. The technique mirrors PlugX delivery methods but deploys different payloads. Beagle supports eight commands including shell execution, file transfer, and directory listing, communicating with C2 servers using AES encryption. Related samples dating to February 2026 have been identified, with some variants delivering AdaptixC2 framework. Additional domains impersonated security vendors like Trellix, CrowdStrike, and SentinelOne. The infrastructure spans Cloudflare for distribution and Alibaba Cloud for command and control.

    Pulse ID: 69fcc63f1dce161fc2f8380c
    Pulse Link: otx.alienvault.com/pulse/69fcc
    Pulse Author: AlienVault
    Created: 2026-05-07 17:05:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #Cloud #CrowdStrike #CyberSecurity #Encryption #InfoSec #Malvertising #OTX #OpenThreatExchange #PlugX #SentinelOne #SideLoading #Trellix #ZIP #bot #AlienVault

  5. Donuts and Beagles: Fake Claude site spreads backdoor

    A fraudulent website impersonating Anthropic's Claude AI platform has been distributing a previously undocumented backdoor called Beagle through malvertising campaigns. The attack begins when victims download a fictitious tool named Claude-Pro Relay from claude-pro[.]com, delivered as a 505 MB ZIP archive. The infection chain utilizes DLL sideloading, exploiting a signed G DATA antivirus updater to load malicious code. The technique mirrors PlugX delivery methods but deploys different payloads. Beagle supports eight commands including shell execution, file transfer, and directory listing, communicating with C2 servers using AES encryption. Related samples dating to February 2026 have been identified, with some variants delivering AdaptixC2 framework. Additional domains impersonated security vendors like Trellix, CrowdStrike, and SentinelOne. The infrastructure spans Cloudflare for distribution and Alibaba Cloud for command and control.

    Pulse ID: 69fcc63f1dce161fc2f8380c
    Pulse Link: otx.alienvault.com/pulse/69fcc
    Pulse Author: AlienVault
    Created: 2026-05-07 17:05:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BackDoor #Cloud #CrowdStrike #CyberSecurity #Encryption #InfoSec #Malvertising #OTX #OpenThreatExchange #PlugX #SentinelOne #SideLoading #Trellix #ZIP #bot #AlienVault

  6. I said this when #Windows Subsystem for #Linux (WSL) first came out. It is inevitable. It is in fact a Linux world, obvs in the data center but also for end users (where Android is # 1.) Steve Job's greatest move was going #BSD, which too, is just another *nix distro.

    The new divide? The only thing clear about that is that it is #AI related. Because I see it in students already.

    Where do #LLM or neural nets fit into the OS? One controversy locally at #UCSD is #Trellix.

    xda-developers.com/windows-bei

  7. I said this when #Windows Subsystem for #Linux (WSL) first came out. It is inevitable. It is in fact a Linux world, obvs in the data center but also for end users (where Android is # 1.) Steve Job's greatest move was going #BSD, which too, is just another *nix distro.

    The new divide? The only thing clear about that is that it is #AI related. Because I see it in students already.

    Where do #LLM or neural nets fit into the OS? One controversy locally at #UCSD is #Trellix.

    xda-developers.com/windows-bei

  8. I said this when #Windows Subsystem for #Linux (WSL) first came out. It is inevitable. It is in fact a Linux world, obvs in the data center but also for end users (where Android is # 1.) Steve Job's greatest move was going #BSD, which too, is just another *nix distro.

    The new divide? The only thing clear about that is that it is #AI related. Because I see it in students already.

    Where do #LLM or neural nets fit into the OS? One controversy locally at #UCSD is #Trellix.

    xda-developers.com/windows-bei

  9. I said this when #Windows Subsystem for #Linux (WSL) first came out. It is inevitable. It is in fact a Linux world, obvs in the data center but also for end users (where Android is # 1.) Steve Job's greatest move was going #BSD, which too, is just another *nix distro.

    The new divide? The only thing clear about that is that it is #AI related. Because I see it in students already.

    Where do #LLM or neural nets fit into the OS? One controversy locally at #UCSD is #Trellix.

    xda-developers.com/windows-bei

  10. I said this when #Windows Subsystem for #Linux (WSL) first came out. It is inevitable. It is in fact a Linux world, obvs in the data center but also for end users (where Android is # 1.) Steve Job's greatest move was going #BSD, which too, is just another *nix distro.

    The new divide? The only thing clear about that is that it is #AI related. Because I see it in students already.

    Where do #LLM or neural nets fit into the OS? One controversy locally at #UCSD is #Trellix.

    xda-developers.com/windows-bei