Vitali Kremez (@vk_intel) 's Twitter Profile
Vitali Kremez

@vk_intel

Ethical Hacker | Reverse Engineer | CEO @AdvIntel | Malware Course Author "Zero2Hero" / "Zero2Automated" | Former .gov Cybercrime | Threat Seeker Award

ID: 3332934374

linkhttps://vkremez.com calendar_today25-08-2015 03:03:37

4,4K Tweet

45,45K Followers

90 Following

Lawrence Abrams (@lawrenceabrams) 's Twitter Profile Photo

These three ex-Conti extortion gangs are responsible for the surge of 'BazarCall' callback phishing schemes. bleepingcomputer.com/news/security/…

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Advanced Intel's Vitali Kremez has published a BazarCall advisory. The “BazarCall” style attack, or call back phishing, is an attack vector that utilizes targeted phishing methodology and first emerged in 2020/2021 as a tool of Ryuk (later rebranded Conti). advintel.io/post/bazarcall…

Advanced Intel's <a href="/VK_Intel/">Vitali Kremez</a> has published a BazarCall advisory. The “BazarCall” style attack, or call back phishing, is an attack vector that utilizes targeted phishing methodology and first emerged in 2020/2021 as a tool of Ryuk (later rebranded Conti). advintel.io/post/bazarcall…
Vitali Kremez (@vk_intel) 's Twitter Profile Photo

⚡️Timely report on the latest Cobalt Strike domain fronting technique leveraging tyk[.]io. Many ex-Conti groups leverage this domain fronting technique for Cobalt Strike beacon resolver/traffic. Watch out for tyk[.]io traffic. shells.systems/oh-my-api-abus…

Patrick Gray (@riskybusiness) 's Twitter Profile Photo

We're publishing so much great stuff in coming days. There's another Between Two Nerds episode with Tom Uren and thaddeus e. grugq, plus Catalin Cimpanu interviews Vitali Kremez about his call that Ransomware as a Service is dying. Risky Biz News RSS risky.biz/subscribe

Vitali Kremez (@vk_intel) 's Twitter Profile Photo

Insight:⚡️#Emotet loader-as-a-service infection metrics globally for 2022 of ~1,300,000 unique bot_ids / top targeted infected by loader (including honeypot activity). Still alive but on a general decline. The public report is incoming.

Insight:⚡️#Emotet loader-as-a-service infection metrics globally for 2022 of ~1,300,000 unique bot_ids / top targeted infected by loader (including honeypot activity). Still alive but on a general decline.

The public report is incoming.
Vitali Kremez (@vk_intel) 's Twitter Profile Photo

📌We have observed the "Anti-Putin" messages from Cobalt Strike flooding activities mapped to ex-Conti cybercrime enterprise members.

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Ionut Ilascu Someone is hitting Cobalt Strike servers used by former members of the Conti ransomware gang with messages urging to stop Russia's war: “Stop the war!” “15000+ dead Russian soldiers!” “Be a Russian patriot!” "Stop Putin!"

<a href="/Ionut_Ilascu/">Ionut Ilascu</a> Someone is hitting Cobalt Strike servers used by former members of the Conti ransomware gang with messages urging to stop Russia's war:

“Stop the war!”
“15000+ dead Russian soldiers!”
“Be a Russian patriot!”
"Stop Putin!"
Vitali Kremez (@vk_intel) 's Twitter Profile Photo

🔥Breaking Blog: AdvIntel's State of #Emotet aka "#SpmTools" Displays Over Million 🌎Compromised Machines Through 2⃣0⃣2⃣2⃣ Insight: *⃣Emotet infection chain is currently attributed to #Quantum & #BlackCat ransomware chains. advintel.io/post/advintel-…

🔥Breaking Blog: AdvIntel's State of #Emotet aka "#SpmTools" Displays Over Million 🌎Compromised Machines Through 2⃣0⃣2⃣2⃣
Insight:

*⃣Emotet infection chain is currently attributed to #Quantum &amp; #BlackCat ransomware chains.

advintel.io/post/advintel-…
Vitali Kremez (@vk_intel) 's Twitter Profile Photo

Offsecurity: First time flying as a private pilot single engine land from east -> west coast of Florida. Aircraft: Cessna 172N IFR training and rotorcraft add-on next!