Szabolcs Schmidt (@smica83) 's Twitter Profile
Szabolcs Schmidt

@smica83

Threat Intel Specialist and Incident Responder. Private account. All opinions expressed here are mine only.
bazaar.abuse.ch/user/5160/

ID: 147667505

calendar_today24-05-2010 18:50:54

15,15K Tweet

2,2K Followers

370 Following

Szabolcs Schmidt (@smica83) 's Twitter Profile Photo

Low detected 'CALDEMON HEAT EXCHANGERS, S.L. req 2211059.rar' variants from China and Germany abuse.ch bazaar.abuse.ch/sample/17e06bf… and bazaar.abuse.ch/sample/ecca139…

Low detected 'CALDEMON HEAT EXCHANGERS, S.L. req 2211059.rar' variants from China and Germany 
<a href="/abuse_ch/">abuse.ch</a> 
bazaar.abuse.ch/sample/17e06bf… and 
bazaar.abuse.ch/sample/ecca139…
Szabolcs Schmidt (@smica83) 's Twitter Profile Photo

'24654_222_88_NOTIFICACION_VIRUAL_AUTO_ADMIOSRIO_DEMANDA_LABORAL_Juzgado_09_Laboral_del_Circuito_de_Bogota_D_C_CONFIRMAR_RECIBIDO.js' as a FUD abuse.ch bazaar.abuse.ch/sample/95a1a59…

'24654_222_88_NOTIFICACION_VIRUAL_AUTO_ADMIOSRIO_DEMANDA_LABORAL_Juzgado_09_Laboral_del_Circuito_de_Bogota_D_C_CONFIRMAR_RECIBIDO.js' as a FUD 
<a href="/abuse_ch/">abuse.ch</a> 
bazaar.abuse.ch/sample/95a1a59…
Germán Fernández (@1zrr4h) 's Twitter Profile Photo

⚠️ While investigating a new CEO fraud campaign, I discovered that attackers are using a trick to bypass the redirect warning usually shown by Google (google[.]com/url?q=https://www.example[.]com). This open redirect allows attackers to evade certain detections and stealthily

⚠️ While investigating a new CEO fraud campaign, I discovered that attackers are using a trick to bypass the redirect warning usually shown by Google (google[.]com/url?q=https://www.example[.]com).

This open redirect allows attackers to evade certain detections and stealthily
Szabolcs Schmidt (@smica83) 's Twitter Profile Photo

Looks like a FUD, but sandboxes are red as hell. 'QQHong_ec1ea5d9bce7568b2aeaef912fd9e2f2' as a #ValleyRAT abuse.ch bazaar.abuse.ch/sample/44bc85d…

Looks like a FUD, but sandboxes are red as hell. 'QQHong_ec1ea5d9bce7568b2aeaef912fd9e2f2' as a #ValleyRAT 
<a href="/abuse_ch/">abuse.ch</a> 
bazaar.abuse.ch/sample/44bc85d…
Szabolcs Schmidt (@smica83) 's Twitter Profile Photo

Active exploits for CVE-2025-53770 are uploaded abuse.ch bazaar.abuse.ch/browse/tag/CVE… (ASPX files are still under investigation)

Active exploits for CVE-2025-53770 are uploaded <a href="/abuse_ch/">abuse.ch</a> 
bazaar.abuse.ch/browse/tag/CVE… 
(ASPX files are still under investigation)
Szabolcs Schmidt (@smica83) 's Twitter Profile Photo

Lame #malspam in the name of #Hungarian Minister of Interior. Fake sender and self signed #GuLoader, which brings a #Formbook abuse.ch bazaar.abuse.ch/sample/1f7d1d7…

Lame #malspam in the name of #Hungarian Minister of Interior. 
Fake sender and self signed #GuLoader, which brings a #Formbook 
<a href="/abuse_ch/">abuse.ch</a> 
bazaar.abuse.ch/sample/1f7d1d7…
Szabolcs Schmidt (@smica83) 's Twitter Profile Photo

This 'Office License.pdf.lnk' is from #Ukraine bazaar.abuse.ch/sample/1a3bbf5… Drops this one (vin.bat): bazaar.abuse.ch/sample/eb86326… ...with this decoy(https): /j-bookmarks-annie-possess(.)trycloudflare(.)com/pdf/office365.pdf First upload from abuse.ch Original URL(http):

This 'Office License.pdf.lnk' is from #Ukraine 
bazaar.abuse.ch/sample/1a3bbf5… 
Drops this one (vin.bat): bazaar.abuse.ch/sample/eb86326… 
...with this decoy(https): /j-bookmarks-annie-possess(.)trycloudflare(.)com/pdf/office365.pdf 
First upload from <a href="/abuse_ch/">abuse.ch</a> 
Original URL(http):
Szabolcs Schmidt (@smica83) 's Twitter Profile Photo

Global Maritime and Safety System users targeted with this one especially in Greece, Germany and UK: 'GMDSS Service Report_xlsx.rar' Looks like #ModiLoader abuse.ch bazaar.abuse.ch/sample/4c27d80…

Global Maritime and Safety System users targeted with this one especially in Greece, Germany and UK: 'GMDSS Service Report_xlsx.rar' 
Looks like #ModiLoader 
<a href="/abuse_ch/">abuse.ch</a> 
bazaar.abuse.ch/sample/4c27d80…
Szabolcs Schmidt (@smica83) 's Twitter Profile Photo

'WindowsUpdateService.ps1' from Germany abuse.ch bazaar.abuse.ch/sample/0bce0e2… Original URL(http): /62.113.66(.)137/WindowsUpdateService.ps1 (RU) urlhaus.abuse.ch/url/3589408/

'WindowsUpdateService.ps1' from Germany 
<a href="/abuse_ch/">abuse.ch</a> 
bazaar.abuse.ch/sample/0bce0e2… 
Original URL(http): /62.113.66(.)137/WindowsUpdateService.ps1 (RU) 
urlhaus.abuse.ch/url/3589408/
Szabolcs Schmidt (@smica83) 's Twitter Profile Photo

'4a5a7c.msi' from Hungary looks like an unsigned RMM client. abuse.ch bazaar.abuse.ch/sample/49da684… URL(https): /adjects.com/diagnostics.php

Szabolcs Schmidt (@smica83) 's Twitter Profile Photo

'customer-receipt.pdf.lnk' from Ukraine abuse.ch bazaar.abuse.ch/sample/16b18d7… Original URL(http): /77.110.113(.)73/Documents/customer-receipt.pdf.lnk Coyote(http): /driverupdate.ue3hdn4-cdnsecurefile.com/Chrono24-receipt.pdf Dropped BAT: bazaar.abuse.ch/sample/e2bf4c3… Dropped HTA:

'customer-receipt.pdf.lnk' from Ukraine 
<a href="/abuse_ch/">abuse.ch</a> 
bazaar.abuse.ch/sample/16b18d7… 
Original URL(http): /77.110.113(.)73/Documents/customer-receipt.pdf.lnk 
Coyote(http): /driverupdate.ue3hdn4-cdnsecurefile.com/Chrono24-receipt.pdf 
Dropped BAT: bazaar.abuse.ch/sample/e2bf4c3…
Dropped HTA: