101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

518
active users

#c2

1 post1 participant0 posts today
cryptax<p>DanaBleed: DanaBot C2 Server Memory Leak Bug from <a href="https://www.zscaler.com/blogs/security-research/danableed-danabot-c2-server-memory-leak-bug" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">zscaler.com/blogs/security-res</span><span class="invisible">earch/danableed-danabot-c2-server-memory-leak-bug</span></a></p><p>The security researchers used a bug in an updated version of DanaBot, where a new buffer was allocated but not initialized and thus contained some process information of the C2 like username, IP address, victim etc.</p><p>Well done! That was clever.</p><p>cc: <span class="h-card" translate="no"><a href="https://infosec.exchange/@VirusBulletin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>VirusBulletin</span></a></span> </p><p><a href="https://mastodon.social/tags/danabot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>danabot</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mastodon.social/tags/c2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>c2</span></a></p>

Mastodon communities, be vigilant! Bad actors are creating accounts within the Fediverse and then using them to distribute malware. We identified one such case in which the threat actor had gone undetected since 2022. That Mastodon instance was one with a climate change focus. The threat actor was distributing an information stealer through their account.

We are happy to have helped the instance owner figure out why they have been on blocklists intermittently for the last few years, but also get that particular threat out of their Mastodon instance and safe for users.

There are undoubtedly many more of these across the Fediverse. Hopefully more awareness can get them detected and shut down faster.

For our fellow security nerds... this was #vidar malware with sha256 975932eeda7cc3feea07bc1f8576e1e73e4e001c6fe477c8df7272ee2e0ba20d
and a c2 IP 78[.]47[.]227[.]68 from the instance.
there is still at least one more Mastodon instance impacted that we are trying to reach.

#malware #stealer #mastodon #threatintel #cybercrime #threatintelligence #cybersecurity #infosec #infoblox #infobloxthreatintel #fakeaccounts #c2

🐧 True Linux phone seekers rejoice: JOLLA C2 phone 1st look & Sailfish OS 5.0 preview! ⛵ 📲

Jolla represents the features and update highlights people asked for.

◉New camera capabilities ◉Landscape / portrait mode ◉Expandable storage
◉True alternative for the domination of iOS (Apple) & Android (Google)
◉Get a glimpse of upcoming for the ultimate Sailfish experience via C2 phone

youtu.be/OVyOmaVySZc

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

Found this user on the @internetarchive hosting images with embedded base64 encoded #malware between <<BASE64_START>> and <<BASE64_END>> flags. The malware is used to download an inject the next stage payload into another process. The campaign I observed involved #RemcosRAT

User page: archive.org/details/@nodetecto
Remcos: hxxps://petshopsirena[.]mk/a.txt
#c2 : 45.95.169[.]135:2404

I found samples dropping others such as #agenttesla and #formbook as well.

archive.orgInternet Archive: Digital Library of Free & Borrowable Books, Movies, Music & Wayback Machine