eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

217
active users

#c2

2 posts2 participants0 posts today
Linux ✅<p>📲 Jolla C2 on Linux -älypuhelinten googleton kärkivalinta. Nyt ilahduttavia uutisia heille jotka eivät fanittaneet vuosimaksullisuutta: Sailfish OS -päivitykset toimitetaan tästä lähtien ilmaiseksi kaikille! ✅ </p><p>👉 <a href="https://forum.sailfishos.org/t/long-term-sailfish-os-updates-free-of-charge-for-all-jolla-c2/23491" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forum.sailfishos.org/t/long-te</span><span class="invisible">rm-sailfish-os-updates-free-of-charge-for-all-jolla-c2/23491</span></a></p><p><a href="https://mementomori.social/tags/Jolla" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jolla</span></a> <a href="https://mementomori.social/tags/C2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C2</span></a> <a href="https://mementomori.social/tags/SailfishOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SailfishOS</span></a> <a href="https://mementomori.social/tags/mobiili" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobiili</span></a> <a href="https://mementomori.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://mementomori.social/tags/Suomi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suomi</span></a> <a href="https://mementomori.social/tags/puhelimet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>puhelimet</span></a> <a href="https://mementomori.social/tags/smartphone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smartphone</span></a> <a href="https://mementomori.social/tags/Tampella" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tampella</span></a> <a href="https://mementomori.social/tags/Tampere" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tampere</span></a> <span class="h-card" translate="no"><a href="https://techhub.social/@jolla" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jolla</span></a></span></p>
Miguel Afonso Caetano<p>"While Bill C-2 does not explicitly state that it is paving the way for new and expanded data-sharing with the United States or other countries, the legislation contains references to the potential for “agreement[s] or arrangement[s]” with a foreign state, and references elsewhere the potential that persons in Canada may become compelled by the laws of a foreign state to disclose information.2 Other data and surveillance powers in Bill C-2 read like they could have been drafted by U.S. officials. </p><p>Furthermore, in response to questions at a technical briefing on Bill C-2 by Justice Canada on June 9, 2025, Justice Canada officials acknowledged to the persons present at the briefing that the intent of certain provisions within Bill C-2 is to enable Canada to implement and ratify a new data-sharing treaty, publicly known as the “Second Additional Protocol” to the Budapest Convention (“2AP”). The briefing acknowledged that other cross-border “cooperation” tools were foreseeable.</p><p>The federal government’s quiet acknowledgement that new provisions in Bill C-2 are being introduced to implement the 2AP treaty raises broader questions about the full extent of Bill C-2’s impacts as it concerns data-sharing with U.S. law enforcement authorities."</p><p><a href="https://citizenlab.ca/2025/06/a-preliminary-analysis-of-bill-c-2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">citizenlab.ca/2025/06/a-prelim</span><span class="invisible">inary-analysis-of-bill-c-2/</span></a></p><p><a href="https://tldr.nettime.org/tags/Canada" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Canada</span></a> <a href="https://tldr.nettime.org/tags/DataSharing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataSharing</span></a> <a href="https://tldr.nettime.org/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> <a href="https://tldr.nettime.org/tags/C2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C2</span></a> <a href="https://tldr.nettime.org/tags/DataProtection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataProtection</span></a> <a href="https://tldr.nettime.org/tags/Privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Privacy</span></a> <a href="https://tldr.nettime.org/tags/Surveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Surveillance</span></a></p>
🌈 ☯️Teresita🐧👭<p><a href="https://techhub.social/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a> <a href="https://techhub.social/tags/C2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C2</span></a></p>
🌈 ☯️Teresita🐧👭<p><a href="https://techhub.social/tags/Tariffs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tariffs</span></a> <a href="https://techhub.social/tags/C2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C2</span></a></p>
Infoblox Threat Intel<p>Lumma Stealer is currently one of the most popular malware. Campaigns involving this info stealer have a notable presence in DNS. We’ve been tracking a threat actor that deploys large number of domains to advertise file share links dropping Lumma Stealer. These campaigns are interesting because the actor uses traffic distribution system (TDS), cloaking, and web tracking technology (e.g. Matomo, Bablosoft) to hide and protect the malicious content. Here are recent examples of the TDS and landing page domains.<br> <br>:::TDS + Cloaking:::<br>am4[.]myidmcrack[.]site<br>bjnhuy[.]shop<br>filefetch[.]click<br>mplopop[.]shop<br>oyoclean[.]sbs<br>psldi3z[.]com<br>readyf1[.]click<br>volopi[.]cfd<br> <br>:::Landing Page:::<br>14redirect[.]cfd<br>downf[.]lol<br>fbfgsnew[.]com<br>icjvueszx[.]com<br>lkjpoisjnil[.]site<br>sikoip[.]cfd<br>zulmie[.]cfd<br> <br> <br>An attack that we investigated today showed a new Lumma Stealer payload and C2 domain that is only a day old.<br> <br>:::Lumma Stealer executable SHA256::: df148680db17e221e6c4e8aed89b4d3623f4a8ad86a3a4d43c64d6b1768c5406<br> <br>:::Text sites containing Lumma Stealer configuration details:::<br>hXXps://rentry[.]co/feouewe5/raw<br>hXXps://pastebin[.]com/raw/uh1GCpxx<br> <br>:::Newly created Lumma Stealer C2:::<br>hXXps://urbjanjungle[.]tech/api</p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/lummastealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lummastealer</span></a> <a href="https://infosec.exchange/tags/c2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>c2</span></a> <a href="https://infosec.exchange/tags/tds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tds</span></a> <a href="https://infosec.exchange/tags/tracker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tracker</span></a> <a href="https://infosec.exchange/tags/cloaking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloaking</span></a> <a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mastodon</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/infobloxthreatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infobloxthreatintel</span></a></p>
Sarah<p>Cette lecture parle de comment les groupes de libération en Afrique du Sud ont créé des systèmes de communication sécurisés pour appuyer leur combat contre l'oppression, tout en mettant en avant l'importance de se rassembler et de mieux contrôler la technologie.<br>Mais je me pose cette question : Comment est-ce que ces leçons du passé peuvent aider les mouvements d’aujourd’hui à gérer la surveillance numérique tout en cherchant à rester transparents? <a href="https://com3065-h25.masto.host/tags/mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mastodon</span></a> <a href="https://com3065-h25.masto.host/tags/C2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C2</span></a>🥶</p>
Worlddefensereport<p>Indra Leads EU’s Smaug Project to Enhance Underwater Threat Detection </p><p><a href="https://defensemirror.com/news/38833/Indra_Leads_EU___s_Smaug_Project_to_Enhance_Underwater_Threat_Detection" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">defensemirror.com/news/38833/I</span><span class="invisible">ndra_Leads_EU___s_Smaug_Project_to_Enhance_Underwater_Threat_Detection</span></a><br> <br>@IndraCompany<br> <a href="https://mstdn.social/tags/Smaug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Smaug</span></a> <a href="https://mstdn.social/tags/EU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EU</span></a> <a href="https://mstdn.social/tags/underwaterthreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>underwaterthreat</span></a> <a href="https://mstdn.social/tags/Ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ai</span></a> <a href="https://mstdn.social/tags/hydrophone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hydrophone</span></a> <a href="https://mstdn.social/tags/sonar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sonar</span></a> <a href="https://mstdn.social/tags/robot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>robot</span></a> <a href="https://mstdn.social/tags/autonomous" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>autonomous</span></a> <a href="https://mstdn.social/tags/C2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C2</span></a> <a href="https://mstdn.social/tags/maritimeborder" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>maritimeborder</span></a></p>
defensedaily<p>Indra Leads EU’s Smaug Project to Enhance Underwater Threat Detection </p><p><a href="https://defensemirror.com/news/38833/Indra_Leads_EU___s_Smaug_Project_to_Enhance_Underwater_Threat_Detection" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">defensemirror.com/news/38833/I</span><span class="invisible">ndra_Leads_EU___s_Smaug_Project_to_Enhance_Underwater_Threat_Detection</span></a><br> <br>@IndraCompany<br> <a href="https://mstdn.social/tags/Smaug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Smaug</span></a> <a href="https://mstdn.social/tags/EU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EU</span></a> <a href="https://mstdn.social/tags/underwaterthreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>underwaterthreat</span></a> <a href="https://mstdn.social/tags/Ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ai</span></a> <a href="https://mstdn.social/tags/hydrophone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hydrophone</span></a> <a href="https://mstdn.social/tags/sonar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sonar</span></a> <a href="https://mstdn.social/tags/robot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>robot</span></a> <a href="https://mstdn.social/tags/autonomous" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>autonomous</span></a> <a href="https://mstdn.social/tags/C2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C2</span></a> <a href="https://mstdn.social/tags/maritimeborder" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>maritimeborder</span></a></p>
Infoblox Threat Intel<p>Mastodon communities, be vigilant! Bad actors are creating accounts within the Fediverse and then using them to distribute malware. We identified one such case in which the threat actor had gone undetected since 2022. That Mastodon instance was one with a climate change focus. The threat actor was distributing an information stealer through their account. <br> <br>We are happy to have helped the instance owner figure out why they have been on blocklists intermittently for the last few years, but also get that particular threat out of their Mastodon instance and safe for users. <br> <br>There are undoubtedly many more of these across the Fediverse. Hopefully more awareness can get them detected and shut down faster. <br> <br>For our fellow security nerds... this was <a href="https://infosec.exchange/tags/vidar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vidar</span></a> malware with sha256 975932eeda7cc3feea07bc1f8576e1e73e4e001c6fe477c8df7272ee2e0ba20d <br>and a c2 IP 78[.]47[.]227[.]68 from the instance. <br>there is still at least one more Mastodon instance impacted that we are trying to reach. <br> <br><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/stealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stealer</span></a> <a href="https://infosec.exchange/tags/mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mastodon</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/infobloxthreatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infobloxthreatintel</span></a> <a href="https://infosec.exchange/tags/fakeaccounts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fakeaccounts</span></a> <a href="https://infosec.exchange/tags/c2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>c2</span></a></p>
Dave Spector<p>Good grief. Where are the god damned adults? Is there never a time when these people are not beguiled and mesmerized by shiny, techno-babble wrapped BS? </p><p>At least in the 80s with SDI they literally knew they were just burning taxpayer $ on a pipe dream they knew they would never implement…</p><p>Next up: LARPing A Canticle for Liebowitz.</p><p>I claim dibs on the holy shopping list. <br><a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/C2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C2</span></a> <a href="https://mastodon.social/tags/nukes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nukes</span></a><br> <br><a href="https://www.airandspaceforces.com/stratcom-boss-ai-nuclear-command-control/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">airandspaceforces.com/stratcom</span><span class="invisible">-boss-ai-nuclear-command-control/</span></a></p>
Infoblox Threat Intel<p>Infoblox Threat Intel recently discovered an active <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> campaign targeting individuals associated with <a href="https://infosec.exchange/tags/crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crypto</span></a> currencies. Using hijacked accounts, the threat actor messages individuals on social media and offers a contract to fix an incomplete app. A follow-up message will contain a link to a public GitBucket repo filled with broken code. <br>If the victim downloads the project and tries to repair the code, the error.js function will run and silently steal credentials and passwords from the victim’s device.</p><p>PSA: never run code you don’t trust ! <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> </p><p>https://bitbucket[.]org/ffuturemaker/blockchaintp/src/main/server/utils/error[.]js</p><p><a href="https://infosec.exchange/tags/c2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>c2</span></a> : 45[.]137.213.30:1224</p><p><a href="https://infosec.exchange/tags/Infoblox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infoblox</span></a> <a href="https://infosec.exchange/tags/InfobloxThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfobloxThreatIntel</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Linux ✅<p>⛵ 📲 Jolla's new C2 phones now being delivered to owners hands +a fresh Sailfish OS 5.0.0.21 upgrade named "Tampella" 🏭</p><p>"Tampella" is an idyllic location in the city of Tampere (where Jolla's roots situate) 🌞</p><p>◉Browser engine upgraded to ESR91<br>◉UI translation update<br>◉Blocking of incoming calls from preset numbers<br>◉Internet sharing (hotspot) fix<br>◉New ambiences<br>◉...much more!</p><p>👉 <a href="https://forum.sailfishos.org/t/release-notes-tampella-5-0-0-21-for-jolla-c2/20558" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forum.sailfishos.org/t/release</span><span class="invisible">-notes-tampella-5-0-0-21-for-jolla-c2/20558</span></a></p><p><a href="https://linuxrocks.online/tags/Jolla" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jolla</span></a> <a href="https://linuxrocks.online/tags/SailfishOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SailfishOS</span></a> <a href="https://linuxrocks.online/tags/mobile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobile</span></a> <a href="https://linuxrocks.online/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://linuxrocks.online/tags/phones" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phones</span></a> <a href="https://linuxrocks.online/tags/C2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C2</span></a> <a href="https://linuxrocks.online/tags/Tampere" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tampere</span></a> <a href="https://linuxrocks.online/tags/Tampella" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tampella</span></a> <a href="https://linuxrocks.online/tags/Suomi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Suomi</span></a> <a href="https://linuxrocks.online/tags/Finland" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Finland</span></a> <span class="h-card" translate="no"><a href="https://techhub.social/@jolla" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jolla</span></a></span></p>
Infoblox Threat Intel<p>The banking trojan, Octo2, now employs a Domain Generation Algorithm (DGA)!<br> <br>The new variant of the Octo (ExobotCompact) banking trojan, Octo2, is targeting mobile users with several new advanced features. This malware is known for disguising itself as legitimate apps, taking control of the victim’s device to steal sensitive information and commit on-device fraud. For now, the malware has been seen in the wild in Italy, Poland, Moldova, and Hungary, masquerading as apps like NordVPN and Google Chrome. Unfortunately, given its history, it is expected to become global soon.<br> <br>This new variant, investigated by ThreatFabric, features enhanced functionalities, including a Domain Generation Algorithm (DGA) that dynamically changes its command-and-control (C2) server addresses, making it significantly harder to detect.<br> <br>Here are some domains associated with this new variant that we have in our collection:</p><p>5106c5dbc9e0d004489af35abec41027[.]info<br>7729f264dc01834757c9f06f2d313e28[.]com<br>a414602e421935fd057be3c06a3d080c[.]info<br>53cd7bfaebd095ad083c34f007469ff5[.]biz<br>5fa5009fb05a5cee1abd7a2dbb6eb948[.]net<br>8921267492331aabcb4394c801d4e490[.]shop<br>bbad1dcadd801af41da97ecf292b147f[.]xyz<br>c80530d100da2e953c21c55d7cb4b86a[.]info<br>ffce9e39ccdfbe3f1e88806545321ad7[.]org<br> <br>ThreatFabric report: <a href="https://www.threatfabric.com/blogs/octo2-european-banks-already-under-attack-by-new-malware-variant" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">threatfabric.com/blogs/octo2-e</span><span class="invisible">uropean-banks-already-under-attack-by-new-malware-variant</span></a></p><p><a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/InfobloxThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfobloxThreatIntel</span></a> <a href="https://infosec.exchange/tags/Infoblox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infoblox</span></a> <a href="https://infosec.exchange/tags/Octo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Octo</span></a> <a href="https://infosec.exchange/tags/Octo2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Octo2</span></a> <a href="https://infosec.exchange/tags/ExobotCompact" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ExobotCompact</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/IOCs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOCs</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/dga" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dga</span></a> <a href="https://infosec.exchange/tags/c2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>c2</span></a> <a href="https://infosec.exchange/tags/Trojan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trojan</span></a></p>
Linux ✅<p>🐧 True Linux phone seekers rejoice: JOLLA C2 phone 1st look &amp; Sailfish OS 5.0 preview! ⛵ 📲</p><p>Jolla represents the features and update highlights people asked for.</p><p>◉New camera capabilities ◉Landscape / portrait mode ◉Expandable storage<br>◉True alternative for the domination of iOS (Apple) &amp; Android (Google) <br>◉Get a glimpse of upcoming for the ultimate Sailfish experience via C2 phone</p><p>►<a href="https://youtu.be/OVyOmaVySZc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/OVyOmaVySZc</span><span class="invisible"></span></a></p><p><a href="https://linuxrocks.online/tags/Jolla" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jolla</span></a> <a href="https://linuxrocks.online/tags/SailfishOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SailfishOS</span></a> <a href="https://linuxrocks.online/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://linuxrocks.online/tags/smartphone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smartphone</span></a> <a href="https://linuxrocks.online/tags/C2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C2</span></a> <a href="https://linuxrocks.online/tags/privacyfromFinland" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacyfromFinland</span></a></p>
Infoblox Threat Intel<p>We just released a landscape review of Registered DGAs. We review the many ways threat actors are leveraging these algorithms -- including malware, phishing, scams, porns, you name it. Our RDGA detectors find tens of thousands of domains every day, and we've seen the use continue to rise over the last several years. Most folks aren't even aware since actors are doing this in DNS and it often isn't obvious. <a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/RDGA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RDGA</span></a> <a href="https://infosec.exchange/tags/DGA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DGA</span></a> <a href="https://infosec.exchange/tags/DDGA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDGA</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/scams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>scams</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/infobloxthreatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infobloxthreatintel</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/threatactor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatactor</span></a> <a href="https://infosec.exchange/tags/c2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>c2</span></a> <a href="https://infosec.exchange/tags/revolverrabbit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>revolverrabbit</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/cyberintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberintelligence</span></a> <a href="https://infosec.exchange/tags/xloader" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xloader</span></a> <a href="https://infosec.exchange/tags/formbook" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>formbook</span></a> <a href="https://infosec.exchange/tags/abusedtld" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>abusedtld</span></a> <a href="https://insights.infoblox.com/resources-research-report/infoblox-research-report-registered-dgas-the-prolific-new-menace-no-one-is-talking-about" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">insights.infoblox.com/resource</span><span class="invisible">s-research-report/infoblox-research-report-registered-dgas-the-prolific-new-menace-no-one-is-talking-about</span></a></p>
Julian-Ferdinand Vögele<p>After researchers reported on SolarMarker in 2021, the threat actor rapidly rebuilt a multi-tiered <a href="https://infosec.exchange/tags/C2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C2</span></a> infrastructure, and the central core has remained active since its inception.</p>
JB<p>I never made an <a href="https://mastodon.sdf.org/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a>, so:<br><a href="https://mastodon.sdf.org/tags/Boston" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Boston</span></a> (MA)-ish area <a href="https://mastodon.sdf.org/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> geek (<a href="https://mastodon.sdf.org/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a>), working in academia.<br><a href="https://mastodon.sdf.org/tags/SquareDancer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SquareDancer</span></a> (<a href="https://mastodon.sdf.org/tags/mwsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mwsd</span></a>)(<a href="https://mastodon.sdf.org/tags/c2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>c2</span></a>)(<a href="https://mastodon.sdf.org/tags/TechSquares" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechSquares</span></a> )<br><a href="https://mastodon.sdf.org/tags/Narrowboat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Narrowboat</span></a> and (UK) canal obsessive.<br><a href="https://mastodon.sdf.org/tags/sciencefiction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sciencefiction</span></a> fan. (<a href="https://mastodon.sdf.org/tags/arisia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>arisia</span></a>).<br>Not going anywhere near Line, despite being too damned ensconced in FB. Trying to quit Reddit for Lemmy.</p>
Chase :loading:<p>Realized that I never did an <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> so here goes.</p><p>My name is Chase or Charles from <a href="https://infosec.exchange/tags/Dallas" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Dallas</span></a> i’ve been in <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> for almost a decade. I started out in helpdesk in college and moved onto <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> and then <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> and malware reverse engineering. After my stint on the <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> side of the house I moved to <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> and <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> by getting my <a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> and <a href="https://infosec.exchange/tags/OSCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCE</span></a> and worked there for 4 years where I got to do a lot of fun stuff like write a <a href="https://infosec.exchange/tags/c2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>c2</span></a> and find a number of <a href="https://infosec.exchange/tags/0days" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>0days</span></a>. Now I’m the CTO of Vector0 where we are building an attack surface management platform. </p><p>Outside of work while at home I mainly spend time <a href="https://infosec.exchange/tags/gaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gaming</span></a> or doing projects around my house and spending time in my pool. Otherwise I try to get as far away from a screen as possible by traveling and hiking/camping in places where I can’t be reached.</p>
mle✨<p>🌊 <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> 
HI! I'm a security researcher interested in weird things on the Internet. In particular, I love following rabbit holes around phishing emails and infrastructure, C2s, and botnets. 
<br>I got my start in tech in data science, where I helped colleagues find users who were doing "weird" and "interesting" things with our company's software. They wanted to find users who were pushing the boundaries of the software, not doing nefarious things, necessarily.
<br>TL;DR I've spent most of my career looking for weird stuff in data. 
<br>Now, I'm especially interested in applications of data science methods–including but NOT limited to AI/ML–to problems in the infosec space. 
<br>Excited to see the community here and get to know others with similar interests!<br>
<a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a>
<a href="https://infosec.exchange/tags/c2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>c2</span></a>
<a href="https://infosec.exchange/tags/botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botnet</span></a> 
<a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a>
<a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a>
<a href="https://infosec.exchange/tags/machinelearning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>machinelearning</span></a></p>