Profile avatar
caproni.fr
Head of Sekoia Threat Detection & Research (TDR) team • Cyber Threat Intelligence • Detection Engineering • SOC Platform 🇫🇷 🇪🇺 • Hip-Hop • Basketball
79 posts 458 followers 183 following
Prolific Poster

Using our #honeypots, we uncovered an unreported #botnet that has been operational since at least the end of November 2023. This #PolarEdge botnet has been focusing on #edge devices, particularly those made by #Cisco, #Asus, #QNAP, and #Synology. https://buff.ly/4ibOEo8

Cyber threats impacting the financial sector: focus on the main actors We're thrilled to announce the release of the latest strategic report by Sekoia #TDR. This analysis highlights key cyber threats to the #financial sector in 2024. https://buff.ly/3D3IZl7

🔍 Large-scale detection engineering: part two! 🚀 In this article, we explore an innovative approach that transforms the execution of automated actions via CI/CD pipelines, enabling effective scaling and alignment with developer and DevOps practices.

🚨To strengthen the #investigation and #detection capabilities of the Sekoia.io Threat Detection & Research (TDR) team, we are looking for a Senior Technical Threat Researcher! www.welcometothejungle.com/fr/companies... #CTI #DetectionEngineering

TDR analysts analysed the supply chain attack targeting Chrome browser extensions, which potentially affected hundreds of thousands of end users in December 2024. https://buff.ly/4auQ0HN

Around 1,000 malicious domains are hosting webpages impersonating Reddit and WeTransfer, redirecting users to download password-protected archives These archives contain an AutoIT dropper, we internally named #SelfAU3 Dropper at @sekoia.io, which executes #Lumma Stealer IoCs ⬇️

🔍 TDR analysts discovered a new Adversary-in-the-Middle (#AiTM) #phishing kit, specifically targeting Microsoft 365 accounts and circumventing 2-step verification: Sneaky 2FA https://blog.sekoia.io/sneaky-2fa-exposing-a-new-aitm-phishing-as-a-service/ #detection #sneaky2fa

🇷🇺 #DoubleTap Campaign: #Russia-nexus APT possibly related to #APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations https://buff.ly/3WEwPG7

A look back at #PlugX #worm “sovereign disinfection” campaign

Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation

Banshee: The Stealer That "Stole Code" From MacOS XProtect

Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit

Malicious npm Campaign Targets Ethereum Developers with Fake Hardhat Packages

“Can you try a game I made?” Fake game sites lead to information stealers

🎉 Happy New Year! Hopefully, we'll see as many people as possible here in 2025🤞

“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising

Effective Phishing Campaign Targeting European Companies and Institutions

Hidden in Plain Sight: TA397’s (aka #Bitter) New Attack Chain Delivers Espionage RATs

Dragos Industrial Ransomware Analysis: Q3 2024

Perfctl malware exploiting exposed Portainer agent and using new SSH persistence

A Look Back: The Evolution of Latin American #eCrime Malware in 2024 The evolution of LATAM-based #malware in 2024 highlights the adaptability and ingenuity of its developers, who continue to refine their tools to sustain successful eCrime campaigns.

NodeLoader Used to Deliver Malware

Inside a New OT/IoT Cyberweapon: IOCONTROL

Xloader deep dive: Link-based malware delivery via SharePoint impersonation

Lookout Discovers New Chinese Surveillance Tool Used by Public Security

🇨🇳 Likely China-based Attackers Target High-profile Organizations in Southeast Asia

🇷🇺 Frequent freeloader part II: Russian actor Secret Blizzard (aka #Turla) using tools of other groups to attack Ukraine

Inside Zloader’s Latest Trick: DNS Tunneling

A Kernel Land Rootkit Loader for FK_Undead

New ‘Termite’ ransomware group claims responsibility for Blue Yonder cyberattack

Cleo Software Actively Being Exploited in the Wild

Meeten Malware: A Cross-Platform Threat to Crypto Wallets on macOS and Windows

CERT Wavestone - 2024 Report: Trends, analysis, and lessons for 2025 from a year of incident response

This research examines recent #BlueAlpha (#Gamaredon) activity targeting Ukraine. BlueAlpha — linked to #FSB Centre 18 — has been observed abusing Cloudflare Tunnels to conceal GammaDrop staging infrastructure.

Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels

Large U.S. organization was the subject of a four-month-long intrusion by China-based attackers

MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks

Storm-1811 exploits #RMM tools to drop #BlackBasta ransomware

#RobotDropper Automates the Delivery of Multiple #Infostealers

#DroidBot: Insights from a new Turkish MaaS fraud operation | Cleafy Labs

Stellar Discovery of A New Cluster of Andromeda/Gamarue C2

How 🇷🇺 #Turla used the infrastructure of 🇵🇰 #APT36 to install backdoors and collect intelligence on targets of interest in South Asia.

Hunting Payroll Pirates: Silent Push Tracks HR Redirect Phishing Scam

#Gafgyt Malware Broadens Its Scope in Recent Attacks

Repeat offenders drive bulk of tech support scams via Google Ads | Malwarebytes

🦝 The new episode of @intel471.bsky.social "Cybercrime Exposed" podcast produced by @jkirk.bsky.social tells the story of #Raccoon Stealer and, more broadly, reveals how the #infostealer ecosystem operates. Featuring @crep1x.bsky.social from @sekoia.io! intel471.com/resources/po...

#SmokeLoader Attack Targets Companies in Taiwan | FortiGuard Labs

Did you miss the #VB2024 conference? The videos of the talks are online!

U.S. government says #SaltTyphoon is still in #telecom networks