social.anoxinon.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Die offizielle Mastodon Instanz des Vereins Anoxinon e.V.

Serverstatistik:

1,1 Tsd.
aktive Profile

#rat

15 Beiträge15 Beteiligte2 Beiträge heute

Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools

The Lotus Blossom espionage group has been conducting cyber espionage campaigns targeting government, manufacturing, telecommunications, and media sectors in the Philippines, Vietnam, Hong Kong, and Taiwan. The group employs various versions of the Sagerunex backdoor, including new variants that use cloud services like Dropbox, Twitter, and Zimbra for command and control. Lotus Blossom utilizes multiple hacking tools and techniques to maintain long-term persistence in compromised networks. The attacks involve multi-stage operations, including reconnaissance, lateral movement, and data exfiltration. The group has been active since at least 2012 and continues to evolve its tactics and malware to evade detection.

Pulse ID: 67f038f22c3d7acc43c35cb7
Pulse Link: otx.alienvault.com/pulse/67f03
Pulse Author: AlienVault
Created: 2025-04-04 19:54:26

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
Antwortete im Thread

@LinuxAndYarn @GossiTheDog I've to applaud #WSJ for showing how much #Apple is shafting #consumers with overpriced #parts, because even if the #battery had only 10% tariff there's no reason for a #replacement part to cost more than $50.

infosec.space/@kkarhan/1142895

The landmine-sniffing rats are continuing their slow and steady task of demining Cambodia (and other places). Here's an article about a rat named Ronin setting a record for most mines discovered (109). The previous record holder had cleared 71 landmines by the time of his retirement.

#rat #rats #HeroRats

bbc.com/news/articles/c2ewxjjw

The rat, on a lead, sniffing around soil with a red DANGER sign in the background.
www.bbc.comRonin the rat sets new landmine-sniffing recordRonin, a giant African pouched rat, is the first rodent to uncover more than 100 mines in Cambodia.

Hackers Use WRECKSTEEL to Steal Information from Computers

Ukrainian government agencies are facing targeted cyberattacks which are gained
by threat actor named UAC-0219 using information stealer WRECKSTEEL.

Pulse ID: 67ef237e2f35b330c2ab021c
Pulse Link: otx.alienvault.com/pulse/67ef2
Pulse Author: cryptocti
Created: 2025-04-04 00:10:38

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

#fedihelp #Rat erbeten:
Ich spiele jetzt seit einem Jahr #Ukulele und habe mich (fast) durch 2 Lehrbücher mit Videos gearbeitet. Leider gibt es den Nachfolgeband noch nicht.
Könnt ihr #Lehrbücher empfehlen, die nicht nur die absoluten Basics* abdecken? Mit Video wäre optimal, notfalls geht es aber hoffentlich auch ohne. Ich möchte nicht auf der Stelle treten, bis das nächste Buch erscheint...

#ThrowbackThursday to my second flat felt plushie I created 2 years ago when I had just come up with the concept and the name “Pocket Pals” and I was still very new to sewing, having started 2 months earlier.
The stitching is wonky, the thread I used for the embroidery and assembly was way too thick, but I actually still really love this little guy! I think the overall design is pretty well made!

#handmade#throwback#rat

Operation FishMedley targeting governments, NGOs, and think tanks

ESET researchers have uncovered a global espionage operation called Operation FishMedley, conducted by the FishMonger APT group, which is operated by the Chinese contractor I-SOON. The campaign targeted governments, NGOs, and think tanks across Asia, Europe, and the United States during 2022. The attackers used implants like ShadowPad, SodaMaster, and Spyder, which are common or exclusive to China-aligned threat actors. The operation involved sophisticated tactics including lateral movement, credential theft, and custom malware deployment. Seven victims were identified across various countries and sectors. The analysis provides technical details on the malware used, initial access methods, and command and control infrastructure.

Pulse ID: 67dd406f6ba9eecd280aa95e
Pulse Link: otx.alienvault.com/pulse/67dd4
Pulse Author: AlienVault
Created: 2025-03-21 10:33:19

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
#Asia#China#Chinese