Will (@bushidotoken) 's Twitter Profile
Will

@bushidotoken

Senior Threat Intel Advisor @TeamCymru | Co-founder @CuratedIntel | Co-author @SANSForensics FOR589 | Previously @Equinix | @darknetdiaries #126: REvil

ID: 1252623560

linkhttp://BushidoToken.net calendar_today08-03-2013 20:06:48

12,12K Tweet

34,34K Followers

3,3K Following

Team Cymru Threat Research (@teamcymru_s2) 's Twitter Profile Photo

Thanks for the report Arctic Wolf! Further connected infrastructure based on upstream traffic patterns: 2.56.127.158 - cypowertech[.]org 94.131.108.94 - techzcore[.]org (recent & potentially live campaign) All four IPs in the attached image were suspended THE.Hosting 🐉🤝🤖

Thanks for the report <a href="/AWNetworks/">Arctic Wolf</a>!

Further connected infrastructure based on upstream traffic patterns:

2.56.127.158 - cypowertech[.]org
94.131.108.94 - techzcore[.]org (recent &amp; potentially live campaign)

All four IPs in the attached image were suspended <a href="/the_hosting_/">THE.Hosting</a> 🐉🤝🤖
Will (@bushidotoken) 's Twitter Profile Photo

Resharing this useful catalog of various EDR products "shell" and response functionalities by Chris Beckett related to the Thread discussion below 👇 github.com/cbecks2/edr-ar…

Mike Manrod (@croodsolutions) 's Twitter Profile Photo

EDR-on-EDR Violence 1/🧵 Will called out that EDR products were being abused by threat actors. Ezra Woods & I realized a free trial of an attacker controlled EDR can be used to kill the existing EDR. spencer mRr3b00t JS0N Haddix github.com/CroodSolutions…

Will (@bushidotoken) 's Twitter Profile Photo

Detections engineers, threat hunters, you should be putting controls in place for ‘Bring-Your-Own-EDR (BYOEDR)’ style attacks

urlscan.io (@urlscanio) 's Twitter Profile Photo

Meet us at BSides Bournemouth on August 16 where our own Jake S will deliver an interactive workshop called 'Captain Hook’s urlscan Bootcamp'. Learn how to hunt phishing on urlscan.io: urlscan.io/blog/2025/07/2…

Meet us at <a href="/BSidesBournemth/">BSides Bournemouth</a> on August 16 where our own Jake S will deliver an interactive workshop called 'Captain Hook’s urlscan Bootcamp'. Learn how to hunt phishing on urlscan.io: urlscan.io/blog/2025/07/2…
Will (@bushidotoken) 's Twitter Profile Photo

New Nodejs Bot source code advertised on the cybercrime underground 🕵🏻‍♂️ ☣️ Advertised Malware Capabilities: - Screenshot - Reverse shell (PS + AMSI bypass) - Reverse socks (WebSocket / SSH) - Reverse SSH - Run binary (EXE from disk / memory / ZIP / MSI) - Keylogger - UAC bypass

New Nodejs Bot source code advertised on the cybercrime underground 🕵🏻‍♂️ 

☣️ Advertised Malware Capabilities:
- Screenshot
- Reverse shell (PS + AMSI bypass)
- Reverse socks (WebSocket / SSH)
- Reverse SSH
- Run binary (EXE from disk / memory / ZIP / MSI)
- Keylogger
- UAC bypass
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Microsoft Threat Intelligence has uncovered a cyberespionage campaign by the Russian state actor we track as Secret Blizzard targeting embassies in Moscow using an adversary-in-the-middle (AiTM) position to deploy their custom ApolloShadow malware. msft.it/6019sJm1F

Will (@bushidotoken) 's Twitter Profile Photo

Was enlightened today that TEAM CYMRU has a nice whois server that anyone can use. Use the following Bash and replace xyz with any ASN you want and you can dump what CIDR ranges it has: whois -h whois.cymru.com " -v dump ASxyz"

Will (@bushidotoken) 's Twitter Profile Photo

Another new Nodejs Bot source code advertised on the cybercrime underground 🕵🏻‍♂️ ☣️ Advertised Malware Capabilities: - Web3 Blockchain C2 via Ethereum smart contracts to store and update the C2 address - Reverse proxy (SOCKS5) - Uses .MSI & .ps1 builders - Dockerized backend

Another new Nodejs Bot source code advertised on the cybercrime underground 🕵🏻‍♂️ 

☣️ Advertised Malware Capabilities:
- Web3 Blockchain C2 via Ethereum smart contracts to store and update the C2 address
- Reverse proxy (SOCKS5)
- Uses .MSI &amp; .ps1 builders
- Dockerized backend