Advertisement · 728 × 90

Posts by François Deruty

Preview
New widespread EvilTokens kit: device code phishing as-a-service - Part 1 Uncover the new sophisticated EvilTokens device code phishing as-a-service, with AI-augmented features facilitating BEC fraud

Eviltokens ⤵️

blog.sekoia.io/new-widespre...

blog.sekoia.io/eviltokens-a...

1 week ago 1 0 0 0
Preview
Silver Fox: The Only Tax Audit Where the Fine Print Installs Malware Track the 2025-2026 shift of China-based Silver Fox from financial crime to APT espionage. Discover how they exploit tax-themed phishing and RMM tools to target South Asian entities.

Silver fox⤵️

blog.sekoia.io/silver-fox-t...

3 weeks ago 1 1 0 0
Preview
OysterLoader Unmasked: The Multi-Stage Evasion Loader Unmasking OysterLoader's evasion: from API hammering to custom LZMA. Explore the 4-stage infection chain and its ties to Rhysida ransomware.

OysterLoader ⤵️

blog.sekoia.io/oysterloader...

2 months ago 1 0 0 0
Preview
Meet IClickFix: a widespread WordPress-targeting framework using the ClickFix tactic Uncover IClickFix: a malicious framework exploiting the ClickFix tactic in widespread malware campaigns to deliver NetSupport RAT.

IClickfix ⤵️

blog.sekoia.io/meet-iclickf...

2 months ago 1 0 0 0
Preview
Leveraging Landlock telemetry for Linux detection engineering This blogpost explore how Landlock as an interesting security mechanism and a valuable source of telemetry for detection engineering.

Leveraging Landlock telemetry for Linux detection engineering ⤵️

blog.sekoia.io/leveraging-l...

3 months ago 1 0 0 0
Phishing Campaigns "I Paid Twice" Targeting Booking.com Hotels and Customers Sekoia.io exposes a Booking.com phishing campaign targeting hotels and customers using ClickFix and PureRAT malware.

"I paid twice" ⤵️

blog.sekoia.io/phishing-cam...

5 months ago 1 0 0 0
TransparentTribe targets Indian military organisations with DeskRAT TransparentTribe targets Indian military entities using DeskRAT, a Golang-based remote access Trojan. Learn how this new campaign works.

TransparentTribe⤵️

blog.sekoia.io/transparentt...

5 months ago 2 0 0 0
Preview
APT28 Operation Phantom Net Voxel APT28 Operation Phantom Net Voxel: weaponized Office lures, COM-hijack DLL, PNG stego to Covenant Grunt via Koofr, BeardShell on icedrive.

APT28⤵️

blog.sekoia.io/apt28-operat...

7 months ago 3 1 0 0
Advertisement
Preview
Predators for Hire: A Global Overview of Commercial Surveillance Vendors Explore the 2025 landscape of Adversary-in-the-Middle phishing threats with data, trends, and top detection insights.

Predators for hire ⤵️

blog.sekoia.io/predators-fo...

7 months ago 3 0 0 0
Preview
Exploiting Vulnerabilities Using AI at Machine Speed, the Alarming Number of Unpatched Devices, and Anticipating How Adversaries Think Sekoia.io on collaborating with Europol, dynamic behavior modelling for Gen AI threats, and pooling CTI from various sources

TechNadu interviewed François Deruty (@derutyf.bsky.social), Chief Intelligence Officer of @sekoia.io, to get answers about innovations observed in cybercrime operations, challenges faced by CIOs, and adjustments to intelligence programs.

Read the interview⤵️

#AI #Cybersecurity #GenerativeAI #CTI

9 months ago 2 1 0 0
Post image

📝 Our latest #TDR report delivers an in-depth analysis of Adversary-in-the-Middle (#AitM) #phishing threats - targeting Microsoft 365 and Google accounts - and their ecosystem.

This report shares actionable intelligence to help analysts detect and investigate AitM phishing.

10 months ago 10 7 1 0
Preview
ViciousTrap - Infiltrate, Control, Lure: Turning edge devices into honeypots en masse. Discover ViciousTrap, a newly identified threat who turning edge devices into honeypots en masse targeting

Vicious trapèze ⤵️

blog.sekoia.io/vicioustrap-...

10 months ago 3 0 0 0
Preview
Interlock ransomware evolving under the radar ClickFix ransomware attack uses deceptive prompts and PowerShell loaders to deploy threats like Interlock under the radar.

Interlock⤵️

blog.sekoia.io/interlock-ra...

1 year ago 1 0 0 0
Preview
From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic Discover how Lazarus leverages fake job sites in the ClickFake Interview campaign targeting crypto firms using the ClickFix tactic.

Clickfake ⤵️

blog.sekoia.io/clickfake-in...

1 year ago 1 0 0 0
Preview
ClearFake’s New Widespread Variant: Increased Web3 Exploitation for Malware Delivery ClearFake spreads malware via compromised websites, using fake CAPTCHAs, JavaScript injections, and drive-by downloads.

Clearfake ⤵️

blog.sekoia.io/clearfakes-n...

1 year ago 1 0 0 0
Preview
PolarEdge: Unveiling an uncovered ORB network Discover PolarEdge, a newly identified botnet targeting edge devices via CVE-2023-20118, using a stealthy TLS backdoor.

PolarEdge ⤵️

blog.sekoia.io/polaredge-un...

1 year ago 2 0 0 0
Advertisement
Post image

Cyber threats impacting the financial sector: focus on the main actors

We're thrilled to announce the release of the latest strategic report by Sekoia #TDR. This analysis highlights key cyber threats to the #financial sector in 2024.

https://buff.ly/3D3IZl7

1 year ago 5 2 0 1
Preview
Cyber threats impacting the financial sector in 2024 - focus on the main actors Delve into Finance-related cyber threats in 2024. Our report highlights major actors and tactics impacting the financial sector.

Cyber threats against financial sector⤵️

blog.sekoia.io/cyber-threat...

1 year ago 1 0 0 0
Preview
RATatouille: Cooking Up Chaos in the I2P Kitchen Discover the challenges of ClickFix12 and the newly identified I2PRAT. Uncover the advanced techniques employed by this multi-stage RAT.

New paper⤵️

blog.sekoia.io/ratatouille-...

1 year ago 4 1 0 0
Preview
Detection engineering at scale: one step closer (part two) Discover the power of detection engineering and how it can help scale your cybersecurity projects efficiently.

Detection part two⤵️

blog.sekoia.io/detection-en...

1 year ago 1 0 0 0
Preview
Sr Technical Threat Researcher - Sekoia.io - CDI - Télétravail total Sekoia.io recrute un(e) Sr Technical Threat Researcher !

🚨To strengthen the #investigation and #detection capabilities of the Sekoia.io Threat Detection & Research (TDR) team, we are looking for a Senior Technical Threat Researcher!

www.welcometothejungle.com/fr/companies...

#CTI #DetectionEngineering

1 year ago 5 4 0 0
Preview
Sr Technical Threat Researcher - Sekoia.io - CDI - Télétravail total Sekoia.io recrute un(e) Sr Technical Threat Researcher !

If you are passionate about cyber threat intelligence, this offer is for you! ⤵️

www.welcometothejungle.com/fr/companies...

1 year ago 3 0 0 0
Preview
Targeted supply chain attack against Chrome browser extensions In this blog post, learn about the supply chain attack targeting Chrome browser extensions and the associated targeted phishing campaign.

New campaign ⤵️

blog.sekoia.io/targeted-sup...

1 year ago 3 2 0 0
Post image

Around 1,000 malicious domains are hosting webpages impersonating Reddit and WeTransfer, redirecting users to download password-protected archives

These archives contain an AutoIT dropper, we internally named #SelfAU3 Dropper at @sekoia.io, which executes #Lumma Stealer

IoCs ⬇️

1 year ago 9 6 2 0
Preview
Sneaky 2FA: exposing a new AiTM Phishing-as-a-Service In this blog post, learn about Sneaky 2FA, a new Adversary-in-the-Middle (AiTM) phishing kit targeting Microsoft 365 accounts.

New AiTM phishing as a service ⤵️

blog.sekoia.io/sneaky-2fa-e...

1 year ago 0 0 0 0
Advertisement
Preview
FBI deletes Chinese PlugX malware from thousands of US computers ​The U.S. Department of Justice announced today that the FBI has deleted Chinese PlugX malware from over 4,200 computers in networks across the United States.

FBI deletes Chinese PlugX malware from thousands of US computers

1 year ago 3 2 0 0
Preview
DOJ deletes China-linked PlugX malware off more than 4,200 US computers U.S law enforcement accused the People’s Republic of China of paying hackers that are part of a well-known group called Mustang Panda to deploy the PlugX malware — which allows them to “infect, contro...

The DOJ worked with French authorities and Sekoia.io to remove PlugX malware from thousands of devices around the world

therecord.media/doj-deletes-...

1 year ago 16 9 0 1
Justice Department and FBI Conduct International Operation to Delete Malware Used by China-Backed Hackers The Justice Department and FBI today announced a multi-month law enforcement operation that, alongside international partners, deleted “PlugX” malware from thousands of infected computers worldwide. A...

International cooperation, proud of TDR team from @sekoia.io ⤵️

www.justice.gov/opa/pr/justi...

1 year ago 17 3 2 1
Post image

🇷🇺 #DoubleTap Campaign: #Russia-nexus APT possibly related to #APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations

https://buff.ly/3WEwPG7

1 year ago 8 6 1 0
Preview
Double-Tap Campaign : Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations Uncover the details of UAC-0063 cyberespionage campaign in Kazakhstan and its potential connection to APT28

Double-tap campaign ⤵️

blog.sekoia.io/double-tap-c...

1 year ago 2 0 0 0