eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

199
active users

#threathunting

0 posts0 participants0 posts today

Happy Friday everyone!

Researchers from the FortiCNAPP team, part of FortiGuard Labs identified a new variant of the #Lcryx ransomware called #Lcrypt0rx. The report states that it "is a relatively new VBScript-based ransomware strain first observed in November 2024" and "exhibits several unusual characteristics that suggest it may have been generated using AI." According to the researchers, it currently only targets Windows machines.

Indicators that led the researchers to believe it is AI generated include:
- Function Duplication
- Incorrect Persistence Mechanisms
- Nonexistent Target Paths
- Invalid Ransom Note URL
- Ineffective AV Disabling

These are just a few indicators and the article provides more details about each indicator, but I am not going to spoil the fun! Go and check it out for yourself! Enjoy and Happy Hunting!

Old Miner, New Tricks: H2miner Resurfaces with Lcrypt0rx Ransomware
fortinet.com/blog/threat-resea

Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday #ransomware #AI #artificialintelligence

Fortinet Blog · Old Miner, New Tricks | FortiGuard LabsFortiCNAPP Labs uncovers Lcrypt0rx, a likely AI-generated ransomware variant used in updated H2Miner campaigns targeting cloud resources for Monero mining.…

📢 Exciting Announcement! 📢

Join us tomorrow at 14:00 CET for the Kunai Workshop Virtual Summer School (VSS) organized by @circl 🌟

🔍 What You'll Learn:
- The basics of Kunai
- Using Kunai tools (github.com/kunai-project/pykun)
- Configuring Kunai with @misp IoCs
- Building advanced log filtering and detection rules
- How to use Kunai and Yara

📝 Program and Prerequisites:
Make sure to check out the program and complete the prerequisites before joining: github.com/kunai-project/works

🌐 How to Join VSS: circl.lu/pub/vss-2025/

🎓 Don't miss this opportunity to enhance your skills with Kunai! See you there! 🚀

GitHubGitHub - kunai-project/pykunai: Repository of helper tools for KunaiRepository of helper tools for Kunai. Contribute to kunai-project/pykunai development by creating an account on GitHub.

Happy Wednesday everyone!

I came across this article from Check Point Software's research team where they discuss a malware "prototype" they found that contained prompt injection to trick any LLM that it may be interacting with while it is being analyzed, aptly named Skynet. It attempted to sue the "Ignore all previous instructions" command adding another layer of sandbox evasion but was unsuccessful in this instance. The malware also contained an embedded TOR client which, when executed, can be later used and controlled by accessing the specified ports. After execution the malware component wipes the entire %TEMP%/skynet directory that was created. This was overall a very interesting read and could unfortunately be the first of many malware to attempt this technique. I hope you found this as interesting as I did and Happy Hunting!

In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com/2025/a

Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday #llm

Check Point Research · New Malware Embeds Prompt Injection to Evade AI Detection - Check Point ResearchDetected for the first time, malware attempts AI evasion by injecting a prompt to tell the LLM to label the file as benign

An interesting observation from this is public PORTMAP services can be helpful in uncovering mounted shares open to the internet. This Censys query helps to rule out empty NFS shares (mostly).

(services.parsed.portmap.portmap_entries_v3.shorthand=mountprog and services.parsed.portmap.portmap_entries_v3.shorthand=nfs_acl)

For hosts that look interesting:
showmount -a < ip >
showmount -e < ip >

censys.com/blog/poking-the-flo
#ThreatHunting

CensysPoking at the Flodrix Botnet

New guest post on THOR Collective Dispatch from @InfoSecSherpa:

Don’t Let Mis(s) Information Take the Crown 👑

Even threat hunters can get tripped up by polished propaganda.

This post shows how to apply the Intelligence Cycle to news, helping you filter bias, validate sources, and structure OSINT like a pro.

Read it: dispatch.thorcollective.com/p/

THOR Collective Dispatch · Don't Let Mis(s) Information Take the CrownBy Sherpa Intelligence

Okay, so I wanted to share a little incident from a few months back that really hammered home the power of knowing your Linux internals when things go sideways. I got a frantic call, "something weird is going on with our build server, it's acting sluggish and our monitoring is throwing odd network alerts." No fancy EDR on this particular box, just the usual ssh and bash. My heart always sinks a little when it's a Linux box with vague symptoms, because you know it's time to get your hands dirty.

First thing I did, even before reaching for any specific logs, was to get a quick snapshot of the network. Instead of netstat, which honestly feels a bit dated now, I immediately hit ss -tunap. That p is crucial cause it shows you the process and user ID for each connection. What immediately jumped out was an outbound TCP connection on a high port to a sketchy-looking IP, and it was tied to a process that definitely shouldn't have been making external calls. My gut tightened. I quickly followed up with lsof -i just to be super sure no deleted binaries were clinging on to network connections.

With that IP and PID in hand, I moved to process investigation. pstree -ap was my next stop. It showed the suspicious process, and more importantly, its parent. It wasn't a child of systemd or a normal service. It was spawned by a build script that shouldn't have been executing anything like this. That hierarchical view was key. Then, to really understand what this thing was doing, I dared to strace -p <PID>. Watching the system calls unfurl was like watching a movie of its malicious intent: it was reading from /etc/passwd, making connect() calls, and trying to write to some odd /tmp directories. Simultaneously, I checked ls -l /proc/<PID>/exe to confirm the actual binary path (it was indeed in /tmp) and /proc/<PID>/cwd to see its working directory. No doubt, this was a rogue process.

Knowing it was a fresh infection, I immediately shifted to the filesystem. My go-to is always find / -type f -newermt '2 days ago' -print0 | xargs -0 ls -latr. This quickly pulls up any files modified in the last 48 hours, sorted by modification time. It's often where you find dropped payloads, modified configuration files, or suspicious scripts. Sure enough, there were a few more binaries in /tmp and even a suspicious .sh script in a developer's home directory. I also scanned for SUID/SGID binaries with find / -perm /6000 just in case they'd dropped something for privilege escalation. And while stat's timestamps can be tampered with, I always glance at atime, mtime, and ctime on suspicious files; sometimes, a subtle mismatch offers a tiny clue if the attacker wasn't meticulous.

The final piece of the puzzle, and often the trickiest, is persistence. I checked the usual suspects: crontab -l for root and every other user account I could find. Then I cast a wider net with grep -r "suspect_domain_or_ip" /etc/cron.* /etc/systemd/system/ /etc/rc.d/ and similar common boot directories. Sure enough, a new systemd timer unit had been added that was scheduled to execute the /tmp binary periodically. Finally, I didn't forget the user dotfiles (~/.bashrc, ~/.profile, etc.). It’s surprising how often an attacker will drop a malicious alias or command in there, assuming you won't dig deep into a developer's setup.

Long story short, we quickly identified the ingress vector, isolated the compromise, and cleaned up the persistence. But what really stuck with me is how quickly you can triage and understand an incident if you're comfortable with these fundamental Linux commands. There's no substitute for getting your hands dirty and really understanding what strace is showing you or why ss is superior to netstat in a high-pressure situation. These tools are your best friends in a firefight.

#ItsNewFeatureTuesday! (That’s a thing, right?) 😎
You can now share searches with 3rd parties without them needing to authenticate to view the results! It’s a neat feature that will save time and hassle.

Here's how it works ⤵️
1) User (authenticated!) searches on hunting.abuse.ch
2) Click the "share" button next to the search button
3) This creates a unique link and copies it to clipboard, for example:
hunting.abuse.ch/hunt/68274cdc

✨ Ta da! Any user with this link can see these results without the need to authenticate!

Happy Hunting (and sharing) enjoy! 🫶

🙇‍♂️ Masterguru, take a bow! You've been on fire, 70,352 IPs shared in the past 30 days 🔥 That’s a +3,626% increase, landing you at #5 on the IP leaderboard. Incredible work!

As always, a heartfelt THANK YOU to all our amazing contributors. Your ongoing support and submissions are what keep the threat intelligence flowing. ❤️🙏

Got malicious or suspicious IPs, domains, URLs, or raw source to share?
👉 Join the fight against cybercrime: submit.spamhaus.org

When it comes to domain abuse, phishing, and cybercrime, Spamhaus' Top Contributor🏅"Equalizer" doesn't just track threats - they neutralize them. They work tirelessly to:

✅ Shut down phishing networks
✅ Shut down ASNs
✅ Identify & report domain abuse at “large scale”
✅ Collaborate with law enforcement agencies

Over the last 30 days "Equalizer" has submitted 20,431 domains to Spamhaus. That's an increase of +2,595%! And we sincerely thank you for your efforts. 🙏

If you're in the cybersecurity trenches, join the Spamhaus Threat Intel Community as a contributor. Share insights, report cybercrimes and play your part to "equalize" (sorry, we couldn't resist) the battlefield.

You can learn more on how to submit malicious or suspicious raw source, IPs, domains, and URLs here 👉 submit.spamhaus.org

The more we collaborate as a community, the stronger we are. 💪 🌍