eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

217
active users

#ioc

9 posts8 participants0 posts today
VulDB :verified:<p>Added more indicators for: AdaptixC2 (+1), MimiKatz (+1), Meterpreter (+1), Eye Pyramid (+1), DeimosC2 (+1), GuLoader (+1) and RemcosRAT (+1). <a href="https://vuldb.com/?actor" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vuldb.com/?actor</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a></p>
The Japan Times<p>Thomas Bach's eventful 12-year tenure as president of the International Olympic Committee comes to an end on Monday. His top challenges included Russia's doping program and the pandemic-hit Tokyo Games. <a href="https://www.japantimes.co.jp/olympics/2025/06/22/thomas-bach-challenges/?utm_medium=Social&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">japantimes.co.jp/olympics/2025</span><span class="invisible">/06/22/thomas-bach-challenges/?utm_medium=Social&amp;utm_source=mastodon</span></a> <a href="https://mastodon.social/tags/olympics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>olympics</span></a> <a href="https://mastodon.social/tags/thomasbach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>thomasbach</span></a> <a href="https://mastodon.social/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a> <a href="https://mastodon.social/tags/2020tokyoolympics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>2020tokyoolympics</span></a> <a href="https://mastodon.social/tags/russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>russia</span></a></p>
The Japan Times<p>As the gender furor that engulfed boxing at the 2024 Paris Olympics rumbles on, the IOC is weighing reintroducing testing. <a href="https://www.japantimes.co.jp/olympics/2025/06/21/ioc-testing-gender/?utm_medium=Social&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">japantimes.co.jp/olympics/2025</span><span class="invisible">/06/21/ioc-testing-gender/?utm_medium=Social&amp;utm_source=mastodon</span></a> <a href="https://mastodon.social/tags/olympics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>olympics</span></a> <a href="https://mastodon.social/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a> <a href="https://mastodon.social/tags/transgender" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>transgender</span></a> <a href="https://mastodon.social/tags/lgbtq" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lgbtq</span></a> <a href="https://mastodon.social/tags/kirstycoventry" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kirstycoventry</span></a></p>
VulDB :verified:<p>Added some indicators for: NjRAT (+1), Rhadamanthys (+1), Venom RAT (+2), XWorm (+5), Meterpreter (+1), MooBot (+2) and BianLian (+2). <a href="https://vuldb.com/?actor" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vuldb.com/?actor</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a></p>
VulDB :verified:<p>Added indicators for: SpyMax (+1), FAKEUPDATES (+1), DeimosC2 (+1), NetSupport (+1), Orcus RAT (+1), RapperBot (+7) and Stealc (+1). <a href="https://vuldb.com/?actor" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vuldb.com/?actor</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a></p>
VulDB :verified:<p>New indicators for: FAKEUPDATES (+1), Lumma Stealer (+1), Stealerium (+1), Agent Tesla (+1), Socks5 Systemz (+1), DeimosC2 (+1) and Bashlite (+1). <a href="https://vuldb.com/?actor" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vuldb.com/?actor</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a></p>
VulDB :verified:<p>Updated threat actors: Houdini (+2), Brute Ratel C4 (+1), PowerShell (+1), Vidar (+2), FAKEUPDATES (+1), Mozi (+3) and Lumma Stealer (+4). <a href="https://vuldb.com/?actor" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vuldb.com/?actor</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a></p>
VulDB :verified:<p>We have improved indicators: Lumma Stealer (+3), xorbot (+2), Eye Pyramid (+1), Broomstick (+1), Bashlite (+1), Ghost RAT (+1) and RemcosRAT (+1). <a href="https://vuldb.com/?actor" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vuldb.com/?actor</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a></p>
Devorppa<p>I note that the <a href="https://aus.social/tags/soccer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>soccer</span></a> <a href="https://aus.social/tags/worldcup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>worldcup</span></a> and the 2028 <a href="https://aus.social/tags/Olympics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Olympics</span></a> are scheduled to be held in the <a href="https://aus.social/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a></p><p>I wonder how long it will take for athletes across the non-USA world to start saying … ‘if they don’t move it then I’ll pass on this one’. </p><p>It won’t be <a href="https://aus.social/tags/FIFA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FIFA</span></a> or the <a href="https://aus.social/tags/IOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOC</span></a> that make the first move. I suspect they will be dragged kicking and screaming by athletes - especially the highly paid and high profile athletes who have their own profile that they can use to get their views known.</p><p>And, of course, public opinion will be shaped by those athletes, not the peak organisations …</p>
VulDB :verified:<p>We have added indicators: Gafgyt (+1), AdaptixC2 (+1), Bashlite (+1), DCRat (+1), Koi Loader (+1), Rhadamanthys (+1) and XWorm (+3). <a href="https://vuldb.com/?actor" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vuldb.com/?actor</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a></p>
VulDB :verified:<p>New free CTI indicators in our GitHub repository: <a href="https://github.com/vuldb/cyber_threat_intelligence" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/vuldb/cyber_threat_</span><span class="invisible">intelligence</span></a> <a href="https://infosec.exchange/tags/vuldb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vuldb</span></a> <a href="https://infosec.exchange/tags/github" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>github</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a> <a href="https://infosec.exchange/tags/ttp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ttp</span></a> <a href="https://infosec.exchange/tags/ioa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioa</span></a></p>
VulDB :verified:<p>We have updated indicators: Latrodectus (+2), P2Pinfect (+1), Gafgyt (+1), WarmCookie (+1), Bashlite (+1), Chaos (+1) and Katz Stealer (+2). <a href="https://vuldb.com/?actor" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vuldb.com/?actor</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a></p>
VulDB :verified:<p>We have updated these actors: Sality (+1), Ircbot (+1), DCRat (+1), QakBot (+2), Nimplant (+1), Metasploit (+1) and FAKEUPDATES (+1). <a href="https://vuldb.com/?actor" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vuldb.com/?actor</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a></p>
VulDB :verified:<p>Improved indicators: AdaptixC2 (+1), Havoc (+1), WarmCookie (+1), XWorm (+2), SectopRAT (+4), ValleyRAT (+1) and RMS (+1). <a href="https://vuldb.com/?actor" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vuldb.com/?actor</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a></p>
VulDB :verified:<p>Indicators added for: N-W0rm (+1), AdaptixC2 (+2), QakBot (+3), DeimosC2 (+1), BianLian (+2), MimiKatz (+1) and Hajime (+18). <a href="https://vuldb.com/?actor" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vuldb.com/?actor</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a></p>
:mastodon: decio<p><strong>SVG phishing campaign delivers infostealer</strong></p><p>A few days ago, the excellent <strong>Risky Biz</strong> newsletter highlighted the growing abuse of the <strong>SVG format</strong> in malicious campaigns.<br><br>⬇️ <br><a href="https://risky.biz/risky-bulletin-svg-use-for-phishing-explodes-in-2025/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">risky.biz/risky-bulletin-svg-u</span><span class="invisible">se-for-phishing-explodes-in-2025/</span></a></p><p>We’ve seen several of them since the beginning of the year — with a noticeable spike last week.</p><p>The latest one is in <strong>German</strong> and aims to deploy an <strong>infostealer</strong>, through a well-crafted invoice-themed lure.</p> <p><strong>✉️ The lure: a professional-looking invoice</strong></p><p>The victim receives an email (often from a legitimate company address that has been hacked) with a subject line like:</p><blockquote><p><strong>Rechnung Nr. 0XXXXXX</strong></p></blockquote><p>The body thanks the recipient for a recent order and invites them to open the attached invoice. That attachment is a <strong>.svg file</strong> (e.g. <code>R_0494467.svg</code>, ) — an unusual format for invoices, but not enough to raise suspicion for many users.</p><p>[Live analysis example in Joe]<br>⬇️<br><a href="https://www.joesandbox.com/analysis/1705755/0/html#deviceScreen" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">joesandbox.com/analysis/170575</span><span class="invisible">5/0/html#deviceScreen</span></a></p> <p><strong>🖼️ The decoy: a fake Adobe Acrobat screen</strong></p><p>When opened, the SVG displays a <strong>fake Adobe Acrobat Reader interface</strong> with the message:</p><blockquote><p><em>„Bitte warten Sie, Ihr Dokument wird hochgeladen…”</em><br><br>("Please wait, your document is being uploaded...")</p></blockquote><p>While the victim sees this reassuring screen, a <strong>heavily obfuscated JavaScript payload</strong> executes silently in the background.</p> <p><strong>🧪 Technical steps of the attack</strong></p><ol><li>The SVG-embedded JavaScript <strong>decrypts and builds logic in memory</strong>.</li><li><p>It dynamically redirects to an <strong>intermediate script</strong> hosted at:<br>hxxps://pdf-zone-update[.]com/script.php?id=...<br>⬇️ <br><a href="https://any.run/report/1528482540479dfdd79ba9cbf07d24c52c2ec39adb54a83a2287f008a21275a2/bf2e0e6f-871c-40b8-b7c5-abb4fd3d6bf0" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">any.run/report/1528482540479df</span><span class="invisible">dd79ba9cbf07d24c52c2ec39adb54a83a2287f008a21275a2/bf2e0e6f-871c-40b8-b7c5-abb4fd3d6bf0</span></a></p></li><li><p>This script performs:</p></li><li><p>A <strong>user-agent check</strong> to avoid sandboxes/VMs,</p></li><li><p>Then sets the <code>href</code> of a hidden link to:</p><pre><code>hxxps://w-update-server3092[.]com/file.php?id=...<br></code></pre><p>[obfuscated javascript]<br>⬇️ <br><a href="https://www.virustotal.com/gui/file/25f9f7ab644ffcde8bf5b6e8835fce7fab981d4189418bb96c5f9e06d52e0ede/content" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">virustotal.com/gui/file/25f9f7</span><span class="invisible">ab644ffcde8bf5b6e8835fce7fab981d4189418bb96c5f9e06d52e0ede/content</span></a></p></li><li><p>The browser automatically follows this link and retrieves a <strong>PowerShell loader</strong>.</p></li><li><p>The PowerShell:</p></li><li><p>Executes a <strong>.NET infostealer in-memory</strong>,</p></li><li><p>Takes a <strong>screenshot</strong> and exfiltrates it via:</p><pre><code>hxxps://0x0[.]st<br></code></pre></li><li><p>Extracts <strong>Outlook and Thunderbird credentials</strong> (via DPAPI and local files),</p></li><li><p>Contacts a <strong>C2 server</strong>:</p><pre><code>hxxp://176.65.138[.]152/server.php<br></code></pre></li><li><p>Receives a <strong>registry-based persistence command</strong>:</p><pre><code>REG ADD "HKCU\...\Run" /V "System Update2" /D "wscript.exe \"%SCRIPT_NAME%\""<br></code></pre> </li><li><p><strong>Layered execution</strong> with obfuscation and intermediary JS filtering.</p></li><li><p><strong>PowerShell payload is native</strong> (no dependencies).</p></li><li><p><strong>Plaintext C2 communication</strong>.</p></li><li><p>Registry key name (<code>System Update2</code>) is designed to blend in.</p></li></ol> <p><strong>📁 Key IOCs</strong></p><ul><li>Initial file: <code>R_0494467.svg</code> (~15KB)</li><li>Intermediate JS URL: <code>pdf-zone-update[.]com/script.php</code></li><li>PowerShell loader: <code>w-update-server3092[.]com</code></li><li>C2: <code>176.65.138[.]152</code></li><li>Screenshot exfiltration: <code>0x0[.]st</code></li><li>Persistence key:HKCU\Software\Microsoft\Windows\CurrentVersion\Run→ "System Update2" → wscript.exe "%SCRIPT_NAME%"</li></ul><p><a href="https://infosec.exchange/tags/CyberVeille" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberVeille</span></a> <a href="https://infosec.exchange/tags/SVG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SVG</span></a> <a href="https://infosec.exchange/tags/infostealer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infostealer</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/IoC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IoC</span></a></p>
VulDB :verified:<p>Added some more indicators for: ValleyRAT (+1), MooBot (+1), Nimplant (+1), WarmCookie (+1), NjRAT (+2), GuLoader (+1) and Hajime (+7). <a href="https://vuldb.com/?actor" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vuldb.com/?actor</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a></p>
umweltFAIRaendern<p>Immer zu teuer: Olympia kostet und kostet<br>Noch jede Olympischen Spiele haben am Ende deutlich mehr gekostet, als ehemals versprochen oder vermeintlich geplant. Das ist ein zentrales Fazit auch einer wissenschaftlichen Untersuchung, der sogenannten "Oxford Olympics Study", die am 30. Mai 2024 mit einem umfasse<br><a href="https://fairspielen.de/2025/06/10/immer-zu-teuer-olympia-kostet-und-kostet/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fairspielen.de/2025/06/10/imme</span><span class="invisible">r-zu-teuer-olympia-kostet-und-kostet/</span></a><br><a href="https://norden.social/tags/DOSB" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DOSB</span></a> <a href="https://norden.social/tags/Hamburg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hamburg</span></a> <a href="https://norden.social/tags/IOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOC</span></a> <a href="https://norden.social/tags/Nolympia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nolympia</span></a> <a href="https://norden.social/tags/Olympia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Olympia</span></a> <a href="https://norden.social/tags/Kosten" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kosten</span></a> <a href="https://norden.social/tags/Kostenberschreitung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kostenberschreitung</span></a> <a href="https://norden.social/tags/Olympia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Olympia</span></a> <a href="https://norden.social/tags/OlympischeSpiele" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OlympischeSpiele</span></a> <a href="https://norden.social/tags/Paris2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Paris2024</span></a></p>
Klaas Eßmüller<p>Für <a href="https://troet.cafe/tags/Olympia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Olympia</span></a> in <a href="https://troet.cafe/tags/Hamburg" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hamburg</span></a> müsste die Stadt den HostCity-Vertrag mit dem <a href="https://troet.cafe/tags/IOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IOC</span></a> abschließen. Ein Rechtsgutachten zur Bewerbung in München 2018 hat Spannendes gezeigt. Oder wie <a href="https://troet.cafe/tags/SPD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SPD</span></a> und <a href="https://troet.cafe/tags/Gr%C3%BCne" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Grüne</span></a> sagen: „Hamburg+“🤦‍♂️ </p><p>Quelle:<br><a href="https://www.nolympia.de/grunde-gegen-olympia-2018/vertrage-des-ioc/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nolympia.de/grunde-gegen-olymp</span><span class="invisible">ia-2018/vertrage-des-ioc/</span></a></p>
VulDB :verified:<p>Added more indicators for: Quasar RAT (+1), AdaptixC2 (+1), ERMAC (+1), ResolverRAT (+1), Hook (+1), ShadowPad (+1) and SectopRAT (+1). <a href="https://vuldb.com/?actor" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vuldb.com/?actor</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/apt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apt</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/ioc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ioc</span></a></p>