mr.d0x (@mrd0x) 's Twitter Profile
mr.d0x

@mrd0x

Security researcher | Co-founder maldevacademy.com | lots-project.com | malapi.io | filesec.io

ID: 1324968730187739136

linkhttp://mrd0x.com calendar_today07-11-2020 06:55:46

1,1K Tweet

42,42K Followers

270 Following

GuidedHacking (@guidedhacking) 's Twitter Profile Photo

Game hackers have defined the bleeding edge of low-level security innovation for the past 10 years. Infosec will never give us the respect we deserve, but for the people who actually follow our tutorials, it has a profound impact on their lives.

Game hackers have defined the bleeding edge of low-level security innovation for the past 10 years.

Infosec will never give us the respect we deserve, but for the people who actually follow our tutorials, it has a profound impact on their lives.
Jean (@jean_maes_1994) 's Twitter Profile Photo

mr.d0x you inspired this :P there's an alternative scenario here too download a fake .crdownload file and then instruct them to open the file browser via downloads. but this one is fun too. I present to you all, DOWNLOADFIX

Gi7w0rm (@gi7w0rm) 's Twitter Profile Photo

Casually dropping a MOTW bypass while talking about an already big improvement to the #ClickFix attack. mr.d0x is on another level 🔥

IT Guy (@t3chfalcon) 's Twitter Profile Photo

New attack vector: FileFix. A phishing trick that executes PowerShell straight from your browser no Run dialog, no pop-ups. Just a fake file path + clipboard + File Explorer. Red teamers, this one’s wild. 📽️ PoC + write-up: medium.com/@t3chfalcon/fi…

mr.d0x (@mrd0x) 's Twitter Profile Photo

I can also see the search-ms URI being used to pull up File Explorer (or even asking the user nicely to hit Win+E) which won't result in the browser having the executed command run as a child process.

João Victor (@joaoviictorti) 's Twitter Profile Photo

Just released Hypnus, a Rust lib for sleep obfuscation with some nice call stack spoofing during sleep and API calls (encryption & more) 🫡 Thanks 5pider & Austin for the initial ideas! github.com/joaoviictorti/…

John Hammond (@_johnhammond) 's Twitter Profile Photo

Late to the party but another video to demo the "FileFix" trick that mr.d0x wrote about, leveraging the address bar in Windows file explorer to run a command and potential payload -- with the ClickFix playbook just instructing an end user to run malware 🙃 youtu.be/Vz2ak0YW_L4

Late to the party but another video to demo the "FileFix" trick that <a href="/mrd0x/">mr.d0x</a> wrote about, leveraging the address bar in Windows file explorer to run a command and potential payload -- with the ClickFix playbook just instructing an end user to run malware 🙃 youtu.be/Vz2ak0YW_L4
vx-underground (@vxunderground) 's Twitter Profile Photo

I want to share my opinion on GuidedHacking When GuidedHacking acted as a sponsor for vx-underground I received small amounts of criticism for it, primarily because GuidedHacking was accused of "stealing content". I can assert with 100% confidence this is not true. It is not

Cyber Ghost (@cyberghost13337) 's Twitter Profile Photo

A new clickfix technique, FileFix, developed by mr.d0x, is being used in the wild—poorly. Website tersmoles[.]com delivers a "Legitimate Chrome Installer" using FileFix. The attacker didn’t even change the path and filename—just copy-pasted code directly from demo website

A new clickfix technique, FileFix, developed by <a href="/mrd0x/">mr.d0x</a>, is being used in the wild—poorly.

Website tersmoles[.]com delivers a "Legitimate Chrome Installer" using FileFix.

The attacker didn’t even change the path and filename—just copy-pasted code directly from demo website
delivr.to (@delivr_to) 's Twitter Profile Photo

Threat actors have wasted no time operationalising the FileFix technique 📁⚠️ 📚Check out our latest blog on detecting and preventing FileFix: blog.delivr.to/filefixed-dete…

5pider (@c5pider) 's Twitter Profile Photo

Introducing Havoc Professional: A Lethal Presence We’re excited to share a first look at Havoc Professional, a next-generation, highly modular Command and Control framework, and Kaine-kit our fully Position Independent Code agent engineered for stealth! infinitycurve.org/blog/introduct…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 A fake CAPTCHA is all it takes. Interlock ransomware is back—now pushing a stealthy PHP RAT via “FileFix,” a spin on ClickFix that hijacks File Explorer. Targets? Everyone. Tactics? Evolving fast. Here’s what they’re hiding behind Cloudflare Tunnels ↓

🚨 A fake CAPTCHA is all it takes.

Interlock ransomware is back—now pushing a stealthy PHP RAT via “FileFix,” a spin on ClickFix that hijacks File Explorer.

Targets? Everyone.
Tactics? Evolving fast.

Here’s what they’re hiding behind Cloudflare Tunnels ↓