101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

502
active users

#XLoader

0 posts0 participants0 posts today
James_inthe_box<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@k3ym0" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>k3ym0</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@FortiGuardLabs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>FortiGuardLabs</span></a></span> <a href="https://infosec.exchange/tags/xloader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xloader</span></a> ;)</p>
James_inthe_box<p>Hey <span class="h-card" translate="no"><a href="https://infosec.exchange/@da_667" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>da_667</span></a></span> ...you seen this UA with <a href="https://infosec.exchange/tags/xloader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xloader</span></a> yet?</p><p>&lt;url method="POST" uri="/k2i2/" host="www\.gayhxi\.info" user_agent="Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/538.1 (KHTML, like Gecko) FoxyWhore Safari/538.1"/&gt;</p>
James_inthe_box<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@pawel_lukasik" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>pawel_lukasik</span></a></span> These have been <a href="https://infosec.exchange/tags/xloader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xloader</span></a> as of late.</p>
Brad<p>2024-08-12 (Monday): <a href="https://infosec.exchange/tags/XLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XLoader</span></a>/#Formbook infection. As I've been restoring older pages on my blog with the new password scheme for the zip archives, I'm astounded at the amount of pages and details I used to post.</p><p>With that in mind, I did a blog post more in the old style, with images and IOCs listed on the blog page.</p><p>Details at: <a href="https://www.malware-traffic-analysis.net/2024/08/12/index.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malware-traffic-analysis.net/2</span><span class="invisible">024/08/12/index.html</span></a></p>
Infoblox Threat Intel<p>We just released a landscape review of Registered DGAs. We review the many ways threat actors are leveraging these algorithms -- including malware, phishing, scams, porns, you name it. Our RDGA detectors find tens of thousands of domains every day, and we've seen the use continue to rise over the last several years. Most folks aren't even aware since actors are doing this in DNS and it often isn't obvious. <a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/RDGA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RDGA</span></a> <a href="https://infosec.exchange/tags/DGA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DGA</span></a> <a href="https://infosec.exchange/tags/DDGA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDGA</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/scams" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scams</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/infobloxthreatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infobloxthreatintel</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatactor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatactor</span></a> <a href="https://infosec.exchange/tags/c2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>c2</span></a> <a href="https://infosec.exchange/tags/revolverrabbit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>revolverrabbit</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/cyberintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberintelligence</span></a> <a href="https://infosec.exchange/tags/xloader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xloader</span></a> <a href="https://infosec.exchange/tags/formbook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>formbook</span></a> <a href="https://infosec.exchange/tags/abusedtld" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>abusedtld</span></a> <a href="https://insights.infoblox.com/resources-research-report/infoblox-research-report-registered-dgas-the-prolific-new-menace-no-one-is-talking-about" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">insights.infoblox.com/resource</span><span class="invisible">s-research-report/infoblox-research-report-registered-dgas-the-prolific-new-menace-no-one-is-talking-about</span></a></p>
Freemind<p>The malware pays homage to the League of Legends character Jinx, prominently featuring the character on its advertising poster and command-and-control login panel. JinxLoader’s primary purpose is straightforward – loading malware.</p><p><a href="https://mastodon.online/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.online/tags/Formbook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Formbook</span></a> <a href="https://mastodon.online/tags/JinxLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JinxLoader</span></a> <a href="https://mastodon.online/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mastodon.online/tags/Xloader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Xloader</span></a></p><p><a href="https://cybersec84.wordpress.com/2024/01/01/jinxloader-new-malware-front-for-formbook-and-xloader-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersec84.wordpress.com/2024/</span><span class="invisible">01/01/jinxloader-new-malware-front-for-formbook-and-xloader-attacks/</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>📨 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> list of resources for week #34/2023 is out! It includes the following and much more:</p><p>Before jumping into this week’s infosec news, I wanted to let you guys know that this newsletter has just achieved its 1,000th subscriber! 🥳 I’m so humbled and grateful to all of you who regularly read this list.</p><p>➝ 🇫🇷 🔓 <a href="https://infosec.exchange/tags/Databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Databreach</span></a> at French govt agency exposes info of 10 million people<br>➝ 🔓 <a href="https://infosec.exchange/tags/Kroll" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kroll</span></a> data breach exposes info of <a href="https://infosec.exchange/tags/FTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FTX</span></a>, <a href="https://infosec.exchange/tags/BlockFi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlockFi</span></a>, <a href="https://infosec.exchange/tags/Genesis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Genesis</span></a> creditors<br>➝ 🏆 🔓 <a href="https://infosec.exchange/tags/MOVEit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MOVEit</span></a>, the biggest hack of the year, by the numbers<br>➝ 🇫🇮 🔓 HUS confirms data breach by ex-staff member, hundreds of patients' data compromised<br>➝ 🇩🇰 🔓 <a href="https://infosec.exchange/tags/Hosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hosting</span></a> firm says it lost all customer data after <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> attack<br>➝ 🔓 🐥 Scraped data of 2.6 million <a href="https://infosec.exchange/tags/Duolingo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Duolingo</span></a> users released on hacking forum<br>➝ 🔓 <a href="https://infosec.exchange/tags/Ivanti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ivanti</span></a> warns of new actively exploited <a href="https://infosec.exchange/tags/MobileIron" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileIron</span></a> zero-day bug<br>➝ 🇯🇵 ⌚️ Japanese watchmaker <a href="https://infosec.exchange/tags/Seiko" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Seiko</span></a> breached by <a href="https://infosec.exchange/tags/BlackCat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackCat</span></a> ransomware gang<br>➝ 🇺🇸 🔓 <a href="https://infosec.exchange/tags/Tesla" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tesla</span></a> notifies employees of data breach<br>➝ 🇰🇵 North Korean APT Hacks Internet Infrastructure Provider via ManageEngine Flaw<br>➝ 🇨🇳 <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> says Chinese hacking crew is targeting <a href="https://infosec.exchange/tags/Taiwan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Taiwan</span></a><br>➝ 🇺🇸 💰 <a href="https://infosec.exchange/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a> Finds 1,580 Bitcoin in <a href="https://infosec.exchange/tags/Crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Crypto</span></a> Wallets Linked to North Korean Hackers<br>➝ 🇦🇺 💰 Australian Lender Latitude Financial Reports AU$76 Million <a href="https://infosec.exchange/tags/Cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattack</span></a> Costs<br>➝ 🇰🇵 🇰🇷 North Korean hackers target US-South Korea military drills, police say<br>➝ 🇺🇸 🚀 <a href="https://infosec.exchange/tags/Pentagon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentagon</span></a> urges US space companies to stay vigilant against foreign intelligence<br>➝ 🇬🇧 ⚖️ Two <a href="https://infosec.exchange/tags/LAPSUS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LAPSUS</span></a>$ Hackers Convicted in London Court for High-Profile Tech Firm Hacks<br>➝ 🇺🇸 🇷🇺 Two founders behind Russian crypto mixer Tornado Cash charged by US federal courts<br>➝ 🇺🇸 🇪🇺 US tech firms offer data protections for Europeans to comply with EU big tech rules<br>➝ 🇧🇷 🗳️ Brazilian Hacker Claims <a href="https://infosec.exchange/tags/Bolsonaro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bolsonaro</span></a> Asked Him to Hack Into the Voting System Ahead of 2022 Vote<br>➝ 🩹 🦈 <a href="https://infosec.exchange/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a>: Patches for Recent <a href="https://infosec.exchange/tags/Barracuda" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Barracuda</span></a> ESG Zero-Day Ineffective<br>➝ 🦠 New <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> Turns <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> and <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> Devices into Proxy Nodes<br>➝ 🍏 📝 New Variant of <a href="https://infosec.exchange/tags/XLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XLoader</span></a> macOS Malware Disguised as 'OfficeNote' Productivity App<br>➝ 🪪 🇸🇾 Researchers Uncover Real Identity of CypherRAT and CraxsRAT Malware Developer<br>➝ 🤖 🔐 <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> Workspace Introduces New AI-Powered Security Controls<br>➝ 🔐 🌀 <a href="https://infosec.exchange/tags/Bitwarden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bitwarden</span></a> releases free and open-source E2EE Secrets Manager<br>➝ 💬 🔐 Meta plans to roll out default end-to-end encryption for Messenger by the end of the year<br>➝ 💡 🛜 TP-Link smart bulbs can let hackers steal your WiFi password<br>➝ 🔓 📂 <a href="https://infosec.exchange/tags/WinRAR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WinRAR</span></a> flaw lets hackers run programs when you open RAR archives</p> <p>📚 This week's recommended reading is: "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World" by Bruce Schneier</p> <p>Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-week-342023" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/infosec-mashup-week-342023</span></a></p>
TechHelpKB.com 📚<p><a href="https://mastodon.social/tags/XLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XLoader</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> has targeted <a href="https://mastodon.social/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> since 2015, but it was recently updated. It now pretends to be an <a href="https://mastodon.social/tags/Office" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Office</span></a> application, so it can infect users’ machines and steal information from their clipboards and browsers. <a href="https://tchlp.com/3PclOIr" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">tchlp.com/3PclOIr</span><span class="invisible"></span></a></p>
TechHelpKB.com 📚<p><a href="https://mastodon.social/tags/Researchers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Researchers</span></a> have discovered a new <a href="https://mastodon.social/tags/variant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>variant</span></a> of the <a href="https://mastodon.social/tags/XLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XLoader</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> that is better at dodging <a href="https://mastodon.social/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a>’s <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> measures as it tries to steal sensitive information from <a href="https://mastodon.social/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> devices. <a href="https://tchlp.com/47GTe9v" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">tchlp.com/47GTe9v</span><span class="invisible"></span></a></p>