101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

508
active users

#ssload

0 posts0 participants0 posts today
Brad<p>Post I wrote for my employer at <a href="https://www.linkedin.com/posts/unit42_ssload-cobaltstrike-timelythreatintel-activity-7187091840968351744-xqe-" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/posts/unit42_sslo</span><span class="invisible">ad-cobaltstrike-timelythreatintel-activity-7187091840968351744-xqe-</span></a> and <a href="https://twitter.com/Unit42_Intel/status/1781326222019932535" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/Unit42_Intel/statu</span><span class="invisible">s/1781326222019932535</span></a></p><p>024-04-18 (Thursday): <a href="https://infosec.exchange/tags/SSLoad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSLoad</span></a> infection leads to <a href="https://infosec.exchange/tags/CobaltStrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CobaltStrike</span></a> DLL. In this case we saw no follow-up Cobalt Strike C2 traffic. List of indicators available at <a href="https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2024-04-18-IOCs-from-SSLoad-infection-with-Cobalt-Strike-DLL.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/PaloAltoNetworks/Un</span><span class="invisible">it42-timely-threat-intel/blob/main/2024-04-18-IOCs-from-SSLoad-infection-with-Cobalt-Strike-DLL.txt</span></a></p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of the <a href="https://infosec.exchange/tags/SSLoad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSLoad</span></a> infection traffic leading to the <a href="https://infosec.exchange/tags/CobaltStrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CobaltStrike</span></a> DLL along with the associated malware/artifacts are available at <a href="https://malware-traffic-analysis.net/2024/04/18/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">024/04/18/index.html</span></a></p>
Brad<p>A social media post I authored for my employer at <a href="https://www.linkedin.com/posts/unit42_contactforms-ssload-wirshark-activity-7185786751922192384-JPBX" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/posts/unit42_cont</span><span class="invisible">actforms-ssload-wirshark-activity-7185786751922192384-JPBX</span></a> and <a href="https://twitter.com/Unit42_Intel/status/1780021135813337366" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/Unit42_Intel/statu</span><span class="invisible">s/1780021135813337366</span></a></p><p>2024-04-15 (Monday): <a href="https://infosec.exchange/tags/ContactForms" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ContactForms</span></a> campaign pushing <a href="https://infosec.exchange/tags/SSLoad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSLoad</span></a> malware as early as Thursday, 2024-04-11. List of indicators available at <a href="https://github.com/PaloAltoNetworks/Unit42-timely-threat-intel/blob/main/2024-04-15-IOC-for-Contact-Forms-campaign-SSLoad-activity.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/PaloAltoNetworks/Un</span><span class="invisible">it42-timely-threat-intel/blob/main/2024-04-15-IOC-for-Contact-Forms-campaign-SSLoad-activity.txt</span></a></p><p>A <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a> of the <a href="https://infosec.exchange/tags/SSLoad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSLoad</span></a> malware infection traffic, along with the associated malware and artifacts, is available at <a href="https://malware-traffic-analysis.net/2024/04/15/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">024/04/15/index.html</span></a></p>