pancak3 Profile Banner
pancak3 Profile
pancak3

@pancak3lullz

Followers
12,824
Following
378
Media
1,359
Statuses
6,237
Explore trending content on Musk Viewer
@pancak3lullz
pancak3
3 years
Tweet media one
9
93
901
@pancak3lullz
pancak3
3 years
#kaseya master key? OgTD7co7NcYCoNj8NoYdPoR8nVFJBO5vs/kVkhelp2s=
Tweet media one
17
326
896
@pancak3lullz
pancak3
7 years
Tweet media one
4
243
505
@pancak3lullz
pancak3
3 years
AvosLocker RaaS operators trying to avoid heat after hitting a US government entity by providing them the decryptor for free.
Tweet media one
20
156
477
@pancak3lullz
pancak3
1 year
gone phishing
Tweet media one
6
30
419
@pancak3lullz
pancak3
3 years
🤫 go block these 🤫 162.244.80.235 85.93.88.165 185.141.63.120 82.118.21.1
21
87
345
@pancak3lullz
pancak3
3 months
We are proud to announce that we assisted the joint international LE #OperationEndgame , targeting notorious botnets #IcedID , #Smokeloader , #SystemBC & #Pikabot We provided key infrastructure to LEA and internal partners to disrupt these botnet operations
Tweet media one
14
36
244
@pancak3lullz
pancak3
3 years
“One of the most valuable pieces of threat intelligence we discovered is the the real IP address of Conti’s TOR hidden service and contirecovery[.]ws, and 217.12.204.135, on Tuesday, 28 September 2021 21:30:03 UTC.”
Tweet media one
@malwrhunterteam
MalwareHunterTeam
3 years
Conti guys has some small problems it seems...
Tweet media one
3
18
77
5
58
192
@pancak3lullz
pancak3
4 months
arriving at the entrance of @vxunderground HQ
Tweet media one
8
18
192
@pancak3lullz
pancak3
8 years
my life as an infosec analyst
2
65
157
@pancak3lullz
pancak3
4 months
soooo...zscaler incident? not a "test environment" ?
Tweet media one
Tweet media two
10
24
159
@pancak3lullz
pancak3
3 years
A couple more updates. Cc: @uuallan
Tweet media one
@pancak3lullz
pancak3
3 years
Minor updates to the “Vulnerabilities Abused by Ransomware Actors” chart
1
22
57
1
59
151
@pancak3lullz
pancak3
3 years
If you have Fortinet VPN, please go force reset all your user’s passwords. Also, it’s probably not a bad idea to check logs and potentially spin up an IR or two 🥲
6
66
147
@pancak3lullz
pancak3
1 year
Tweet media one
@NCSCgov
NCSC
1 year
This week in 2019, five Chinese APT-41 cyber actors were indicted for compromising software providers around the world and installing back doors for further hacks against the providers’ customers. For more info on software supply chain attacks see:
Tweet media one
17
257
578
0
33
129
@pancak3lullz
pancak3
9 months
absolutely fucking unhinged lmao
Tweet media one
4
20
129
@pancak3lullz
pancak3
1 year
Tweet media one
7
24
121
@pancak3lullz
pancak3
3 years
Tweet media one
4
37
125
@pancak3lullz
pancak3
3 years
Updates include $MSFT Office CVE-2021-38646 and @billquick ’s web suite CVE-2021-42258. Also, I feel enough time has passed since continuously trying to reach the company with no response to uncensor the EntroLink PPX-AnyLink 0day item. Cc: @uuallan
Tweet media one
4
42
124
@pancak3lullz
pancak3
5 months
If you’re still getting caught up on ransomware “groups” - stop. The “groups” don’t matter anymore. LockBit, ALPV, RansomHub…it doesn’t matter. Real attack teams have freedom to use any locker they want at any time. Branding is a smokescreen.
8
28
121
@pancak3lullz
pancak3
1 year
Certain elements have been redacted and it’s still a work in progress (i.e. missing elements and connections), but nonetheless a way to visualize various cybercrime operation brands, malware, people and their connections.
4
26
112
@pancak3lullz
pancak3
8 years
Tweet media one
1
11
93
@pancak3lullz
pancak3
4 months
the 'Ghost Legenden' aka LockBitSupp aka Dimitry Yuryevich Khoroshev
Tweet media one
6
13
102
@pancak3lullz
pancak3
1 month
what the actual fuck? "...the Company learned that a former executive officer of the Company deliberately de-activated and cancelled the renewal of the Company’s website..."
@SECurityTr8Ker
SECurityTr8Ker
1 month
Thu, 01 Aug 2024 16:30:49 EDT Cybersecurity incident disclosure found for $MMAT (CIK: 0001431959). More details:
0
2
8
2
15
100
@pancak3lullz
pancak3
3 years
AvosLocker🐞 advertising their latest variants (avos2 / avoslinux)
Tweet media one
2
40
97
@pancak3lullz
pancak3
3 years
I expanded upon @uuallan 's chart and included some non-initial access items.
Tweet media one
@uuallan
Allan “Ransomware Sommelier🍷” Liska
3 years
I sincerely appreciate all of the great suggestions. Here is the updated chart based on everyone's input. I had to reformat it make it readable. I originally had company logos where the ransomware icon is but I figure companies won't want their logo on a ransomware chart 🤣.
Tweet media one
16
206
534
0
35
96
@pancak3lullz
pancak3
1 year
some new stuff
Tweet media one
Tweet media two
Tweet media three
Tweet media four
8
1
92
@pancak3lullz
pancak3
11 months
limited edition
Tweet media one
Tweet media two
2
7
93
@pancak3lullz
pancak3
3 months
RE: Ticketmaster breach Seems to me like they hadn't updated their Snowflake passwords in a while... username: fanbuilder_user password: <REDACTED>2019@ (they're now using their Live Nation Okta SSO to protect access)
3
6
90
@pancak3lullz
pancak3
1 year
. @ransomboris lmk if you want to donate shirts to this nice homeless shelter
Tweet media one
@ransomboris
ransomboris
1 year
Ку ку
Tweet media one
58
120
819
2
4
89
@pancak3lullz
pancak3
2 years
ONYX ransomware (based off Conti) appears to be using rocket\.chat for communicating with victims
Tweet media one
5
18
85
@pancak3lullz
pancak3
3 years
Still one of my favorite charts.
Tweet media one
2
14
82
@pancak3lullz
pancak3
3 years
I’ve validated 232 BTC wallets from the Conti chat logs. Only a handful of them still have money in them. Spanning 232 addresses, they’ve received a combined 88.25744568 BTC. 88.25744568 BTC is currently $3,669,223.87
2
13
78
@pancak3lullz
pancak3
3 months
How is #OpEndgame going?
Tweet media one
1
15
76
@pancak3lullz
pancak3
3 years
Ministry of Communities and Territories Development of Ukraine corporate mails out for grabs 🥶
Tweet media one
2
17
74
@pancak3lullz
pancak3
3 months
Superstar75737 realizing his #Smokeloader botnet is gone
Tweet media one
@pancak3lullz
pancak3
3 months
ALIAS: Superstar75737 #Smokeloader NAME: ГРУБЕР Айрат Рустемович (Airat Rustemovich Gruber) DOB: 21.05.1982 SNILS: 07803559786 TIN: 166005711627 PASSPORT: 9204429600
Tweet media one
Tweet media two
1
7
24
1
10
74
@pancak3lullz
pancak3
5 years
Tweet media one
0
25
74
@pancak3lullz
pancak3
1 year
#ShadowSyndicate appears to be much, much more than a RaaS affiliate... Ref: #LetsStopCybercrime #CybercrimeFightersClub
Tweet media one
2
18
71
@pancak3lullz
pancak3
6 years
#ApacheStruts #CVE201811776 #snort Some SNORT signatures I worked on today. Had some help from friends. Trying to detect people potentially attempting to exploit CVE-2018-11776. CC anyone that might care.
4
43
72
@pancak3lullz
pancak3
1 year
Like I said, cluster fuck of revovling doors
Tweet media one
6
6
68
@pancak3lullz
pancak3
1 year
Tweet media one
3
4
61
@pancak3lullz
pancak3
1 year
evil red team things
Tweet media one
4
9
64
@pancak3lullz
pancak3
1 year
Tweet media one
1
7
60
@pancak3lullz
pancak3
1 year
Operation Duck Hunt
Tweet media one
1
5
59
@pancak3lullz
pancak3
3 years
These are extremely enlightening conversations 👀
Tweet media one
0
8
59
@pancak3lullz
pancak3
3 years
Minor updates to the “Vulnerabilities Abused by Ransomware Actors” chart
1
22
57
@pancak3lullz
pancak3
3 years
. @ManUtd maybe want to get their IT people on this one.
Tweet media one
2
16
56
@pancak3lullz
pancak3
3 years
Thanks for the Maltego graph @S0ufi4n3
3
15
56
@pancak3lullz
pancak3
7 years
WHO IS LOOKING FOR A NEW JOB IN #INFOSEC ?!?! Hit me up! Please have previous SOC experience and be ready to roll. This is a Sr position.
8
48
53
@pancak3lullz
pancak3
8 months
"On December 12, 2023, HPE was notified that a suspected nation-state actor, believed to be the threat actor Midnight Blizzard, the state-sponsored actor also known as Cozy Bear, had gained unauthorized access to HPE’s cloud-based email environment."
@pancak3lullz
pancak3
8 months
Cybersecurity disclosure (1.05) found via SECurityTr8Ker for Hewlett Packard Enterprise Co (CIK: 0001645590) Cc @cocaman
4
3
29
0
19
56
@pancak3lullz
pancak3
1 year
yay sanctions. i can finally move these persons to the public map
Tweet media one
1
11
53
@pancak3lullz
pancak3
1 year
Forest Blizzard / APT28
Tweet media one
3
2
51
@pancak3lullz
pancak3
8 months
fun logo for @CTI_Village c'mon #DEFCON32 (🤞 @defcon )
Tweet media one
4
7
49
@pancak3lullz
pancak3
3 years
“Login IDs and passwords of Tokyo Olympic ticket purchasers have been leaked on the internet” To clear this up, looks like a bunch of people were generally infected with #redline and other stealers that supply “dark web markets” thus exposing their creds
@Louishur
Louis hur
3 years
The valid account information (ID/Password) of Tokyo 2020 volunteers and ticket buyers are also leaked, and it seems necessary to verify that this information includes personal information of domestic players and officials. @Tokyo2020 @darktracer_int #TokyoOlympics
Tweet media one
0
15
37
2
41
53
@pancak3lullz
pancak3
4 months
Cute APT espionage farm in Romania 🐓 🐓 🐓 . . . . . . . . . . . 🐓 🐓 🐓 . . . . . . . 🐓 🐓 . . . . . . . . 🐓 . . . . . . 🐓 . . . . . . . 🐓 🐓 . . . . . 🐓 🐓 . . . 🐓 . . . . . . 🐓 . . . . . . 🐓 . . . . 🐓 . . . . . . . . 🐓 . . . 🐓 🐓 . . . . . . . . 🐓 🐓 . . . . .
Tweet media one
2
6
51
@pancak3lullz
pancak3
3 years
ngl the artwork in this manual is awesome hxxps://www.yuumeiart[.]com/
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
11
45
@pancak3lullz
pancak3
1 year
Here is a heavily redacted, public version. Enjoy <3
Tweet media one
@pancak3lullz
pancak3
1 year
Like I said, cluster fuck of revovling doors
Tweet media one
6
6
68
7
6
44
@pancak3lullz
pancak3
3 years
Bazarloader 🤝 Emotet 2021-11-04: Bazarloader starts using AppxBundle (ms-appinstaller) as an attack vector. 2021-11-26: Emotet starts using the AppxBundle (ms-appinstaller) as an attack vector. More info: Cc @1ZRR4H
Tweet media one
@Cryptolaemus1
Cryptolaemus
3 years
BREAKING: #Emotet malspam links can since yesterday link to an Universal App installer hosted on @azure imposing as an Adobe Update that drops E4 payload. This is the same initial attack vector as #BazarLoader used a few weeks ago, even using the same @SectigoHQ cert.
Tweet media one
Tweet media two
5
123
216
2
18
45
@pancak3lullz
pancak3
8 months
I made a Python version
@hawkinsw
Will Hawkins
8 months
I coded up a bot in Rust that parses the SEC's RSS feed of filings to watch for any company that files a cybersecurity incident disclosure (Item 1.05 on their 8-K). I've had it running for several weeks with no hits. But, today, it worked! It picked up the MSFT filing! I am
76
58
895
6
3
43
@pancak3lullz
pancak3
5 months
saw some real sketchy shit fingerprinting and targeting F5 BIG IP appliances today. keep your eyes peeled folks 👀
2
5
43
@pancak3lullz
pancak3
3 years
Looks like “naned” was responsible for the creation of ‘TrickBoot’ - Trickbot’s UEFI module (permaDLL). Ref.
Tweet media one
2
17
43
@pancak3lullz
pancak3
2 months
Thanks to @CrowdStrike we now know who to attack and which AV we have to disable
3
4
41
@pancak3lullz
pancak3
3 years
I guess U-A-S Shop was next
Tweet media one
5
7
42
@pancak3lullz
pancak3
2 years
veron (Emotet guy) and best (campaign engineer) discussing validating corps from their pick of the litter of Emotet installs.
Tweet media one
0
15
42
@pancak3lullz
pancak3
2 years
BlackCat/ALPHV crew made some adjustments to their ransomware. Previous methods for extracting the config aren’t working anymore. Introducing BlackCat/ALPHV 2.0?? SHA1: 8c70191b12f14eed594388c8fbe05efe6ebaa564 Cc @vxunderground @f0wlsec
@vxunderground
vx-underground
2 years
Blackcat ransomware group (alternately refered to as ALPHV) has changed some of their binary characteristics. Previous methods of extracting binary configurations fails, some YARA rules no longer match Example from @hatching_io : tl;dr Maybe Blackcat 2.0?
1
15
57
0
11
41
@pancak3lullz
pancak3
3 years
Probably all that malware they’re hosting and refusing to do anything about 🙃🥲
Tweet media one
1
3
40
@pancak3lullz
pancak3
3 years
Prematurely adding CVE-2021-40449. I give it about a week before MysterySnail is used to achieve ransomware goals or ransom-oriented actors start abusing CVE-2021-40449.
Tweet media one
@pancak3lullz
pancak3
3 years
A couple more updates. Cc: @uuallan
Tweet media one
1
59
151
0
9
40
@pancak3lullz
pancak3
4 months
Looks like a few additions need to be made to this entry. Thanks for the great read @briankrebs
Tweet media one
@pancak3lullz
pancak3
4 months
the 'Ghost Legenden' aka LockBitSupp aka Dimitry Yuryevich Khoroshev
Tweet media one
6
13
102
2
9
39
@pancak3lullz
pancak3
3 years
This is NightSky/Rook/AtomSilo/LockFile ransomware group
@drb_ra
C2IntelFeedsBot
3 years
Cobalt Strike Server Found C2: HTTPS @ 149[.]28[.]143[.]29:443 C2 Server: service[.]trendmrcio[.]com,/owa/63ll45DCfiTEg8lm7o3M Country: Singapore ASN: AS-CHOOPA Host Header: www[.]google[.]com #C2 #cobaltstrike
1
13
24
1
8
38
@pancak3lullz
pancak3
1 year
Qbot admins coming back from vacation like…
0
3
40
@pancak3lullz
pancak3
3 years
It was Patricia…
Tweet media one
7
13
38
@pancak3lullz
pancak3
4 months
theatrics 🤌🎭🤡
Tweet media one
2
4
38
@pancak3lullz
pancak3
2 years
0
3
38
@pancak3lullz
pancak3
6 months
In our tracking of the #LockBit drama saga, @Bl4ckSky28 and I have discovered EquiLend and Ernest Health are two prime examples of LockBit scrambling to appear like they are still a properly functioning RaaS.
1
10
38
@pancak3lullz
pancak3
1 year
Who helped develop #AresLoader ? Just dig around and find out for yourself.
Tweet media one
0
5
33
@pancak3lullz
pancak3
7 months
Be cautious in linking things here. "Scattered Spider" describes tactics, not a group. Also, being in Star Fraud chat doesn't necessarily mean they are part of the crew who used ALPHV.
@BushidoToken
Will
7 months
⚠️ Ransomware Takedown Notification Scattered Spider member arrested — a group linked to ALPHV/BlackCat ransomware campaigns
1
63
205
3
3
34
@pancak3lullz
pancak3
1 year
who's behind #LummaStealer / #LummaC2 ? 🤔
Tweet media one
2
11
34
@pancak3lullz
pancak3
3 years
Ooooo someones in troubleee #REvil #UNKN
Tweet media one
1
9
33
@pancak3lullz
pancak3
1 year
let's have a look at #IcedID , shall we?
Tweet media one
0
2
33
@pancak3lullz
pancak3
1 year
2
0
34
@pancak3lullz
pancak3
4 months
Tweet media one
1
2
34
@pancak3lullz
pancak3
4 years
#Egregor claiming 25 companies are in their queue for analysis to determine ransom amounts 👀
Tweet media one
0
15
33
@pancak3lullz
pancak3
3 years
@ddd1ms @MalwareTechBlog You guys are getting “thank you” emails?
Tweet media one
0
0
33
@pancak3lullz
pancak3
6 years
Tweet media one
1
11
32
@pancak3lullz
pancak3
1 year
prophets of the cybocalypse
Tweet media one
2
2
30
@pancak3lullz
pancak3
1 year
While you all are worried about Citrix CVE-2023-3519, you should know there’s also ongoing exploitation of Array Networks CVE-2023-28461 🫡
2
11
32
@pancak3lullz
pancak3
1 year
udemy course for hacking corps @ransomboris @AL3xL7 ??
Tweet media one
3
2
29
@pancak3lullz
pancak3
8 years
very well could apply to #infosec employees
Tweet media one
2
9
31
@pancak3lullz
pancak3
6 months
Lmaooo...and just like that LockBit removes EquiLend and Ernest Health
Tweet media one
@pancak3lullz
pancak3
6 months
In our tracking of the #LockBit drama saga, @Bl4ckSky28 and I have discovered EquiLend and Ernest Health are two prime examples of LockBit scrambling to appear like they are still a properly functioning RaaS.
1
10
38
2
3
30
@pancak3lullz
pancak3
3 years
These are Hive payloads from early-mid September and a ‘how-to deploy’ text file.
Tweet media one
@pancak3lullz
pancak3
3 years
@BleepinComputer @serghei They’ve had ESXi, Linux, FreeBSD available for over a month
1
0
10
1
5
27
@pancak3lullz
pancak3
2 years
AvosLocker updates
Tweet media one
2
5
28
@pancak3lullz
pancak3
1 year
inb4 the old Conti Team 1 (Zeon) team are acting as ALPHV affiliates
Tweet media one
0
4
31
@pancak3lullz
pancak3
2 years
REvil imposters/scammers? Who uses RUTOR for ransomware adverts? “The same proven (but improved) software” lol
Tweet media one
Tweet media two
2
5
29
@pancak3lullz
pancak3
3 years
Tweet media one
2
3
29
@pancak3lullz
pancak3
1 year
"...to disrupt the botnet..." unfortunately not a full takedown. they are still operating
@USAO_LosAngeles
US Attorney L.A.
1 year
Qakbot malware disrupted in international cyber takedown
8
154
286
4
7
30
@pancak3lullz
pancak3
1 year
Seems like TA551 may be collaborating with FIN12. #TA551 > #IcedID > #Nokoyawa who is the only one with overlap between IcedID and Nokoyawa? #FIN12
Tweet media one
@threatinsight
Threat Insight
1 year
Proofpoint observed the HTML attachment campaign described in this report on October 31, 2022. Together with 10+ other HTML Smuggling campaigns leading to IcedID from September to November, we attribute to TA551. Great work on detailing follow-on activity by @TheDFIRReport !
1
16
52
1
5
28