Pulling the Thread: Pivoting on DPRK IT Worker Infrastructure
A simple naming pattern search on DPRK-linked infrastructure — and one domain that kept giving.
A simple naming pattern search on DPRK-linked infrastructure — and one domain that kept giving.
How a suspicious filename led to 88 phishing domains, a shared hosting cluster, and an operator who probably should have used a different email address.
War is reshaping Iran’s cyber operations. IRGC fragmentation, a near-total internet shutdown, and the loss of senior commanders are creating compounded uncer...
Cybercriminals and nation-state actors are converging on the same TTPs—not because they collaborate, but because efficiency is universal. They’re all playing...
Little talk about dotnet and its use in malware
How Turla tries to avoid attribution
Write up about the packer used by multiple threat actors during the past few months
To what point is attribution useful ?
Unpacking IcedID in order to extract the C2 domain name
How Homograph attacks are done using Unicode
A comprehensive Ryuk threat analysis
WriteUp of the satan challenge from Barbhack 2022
SharkyCTF is a CTF organized during Sat, 09 May 2020 — Sun, 10 May 2020 . I participated with my CTF Team T-Regex and I was able to solve some challenges in ...
Analysis of a custom malware loader