![Lontz Profile](https://pbs.twimg.com/profile_images/1855285959790661632/TXHHEfXD_x96.jpg)
Lontz
@lontze7
Followers
876
Following
871
Statuses
215
Threat Intel Researcher. Opinions are mine. Special thanks to @censysio , @ValidinLLC & @ReversingLabs for making my research easier.
Joined April 2022
New blog on how to uncover related infrastructure of the 'Contagious Interview' campaign, where Lazarus APT uses the 'ClickFix' technique to target job seekers in fake video interviews. Many thanks to @ValidinLLC, for publishing! 👇
0
11
34
RT @ValidinLLC: @lontze7 @malware_traffic The number of infected sites is growing rapidly. First detected at 02:45:23 GMT yesterday (28 Jan…
0
1
0
new #ScatteredSpider #phishing domain okta-louisvuitton[.]com validation path: /index?id={base_64_encoded_string:design=0...9}
0
9
39
new #Rhadamanthys #C2 floratechnology[.]live floratrans[.]live Redirections with HTTP refresh header to WebDAV resource.
0
10
47
RT @ValidinLLC: Researcher @lontze7 explored recent Contagious Interview #Lazarus #APT findings, detailing hunting techniques you can follo…
0
18
0
@greenplan_it @RexorVc0 @DaveLikesMalwre they seem to register domains in a variety of TLDs, and also make use of the same payload names in multiple extensions:
Hunting #LummaStealer new .mp4 (hta) payloads Have you identified a .mp4 Lumma serving URL? It seems like they register the same domain in multiple TLDs (Lookalike search from Validin). Verification of abuse can be performed by scanning the same .mp4 payload on the new domain.
1
0
2
@greenplan_it @RexorVc0 @DaveLikesMalwre .pub files are dropped through ClickFix from multiple URLs (most down at the moment): also there is evidence of downloaded files from URLScan:
@lontze7 @RexorVc0 @DaveLikesMalwre Good hit!! It seems to be interesting campaign🤔 Quick research following your post👇 hxxps://fixazo.online/new-riii-1-b.pub Contains #LummaStealer 📸 waiting to be dropped. ☣️43dd09be1f034e3f7f6232bc7e1d3b80 Low detection ratio 4/61 🔥 More URLs found 📸 @JAMESWT_MHT
0
1
3
@banthisguy9349 Well said! Let's at least state that this looks like this APT and let other researchers supplement the analysis. Also, let's normalize the sharing of methodology. No need to just flex IoCs.
1
0
3
RT @TheHackersNews: 🚨 UPDATE: Fortinet Confirms Critical Zero-Day 🚨 CVE-2024-55591 in FortiOS & FortiProxy (CVSS 9.6) allows attackers to…
0
161
0