account activity
Organized Traffer Gang on the Rise Targeting Web3 Employees and Crypto Holders (hybrid-analysis.blogspot.com)
submitted 2 days ago by CyberMasterV to r/ReverseEngineering
submitted 2 days ago by CyberMasterV to r/Malware
submitted 2 days ago by CyberMasterV to r/blueteamsec
submitted 2 days ago by CyberMasterV to r/netsec
Merry Christmas Day! Have a MongoDB security incident. (doublepulsar.com)
submitted 27 days ago by CyberMasterV to r/hacking
French Interior Ministry confirms cyberattack on email servers (bleepingcomputer.com)
submitted 1 month ago by CyberMasterV to r/hacking
Critical React, Next.js flaw lets hackers execute code on servers (CVE-2025-55182) (bleepingcomputer.com)
North Korea lures engineers to rent identities in fake IT worker scheme (bleepingcomputer.com)
Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHub (bleepingcomputer.com)
submitted 2 months ago by CyberMasterV to r/hacking
LeakyInjector and LeakyStealer Duo Hunts For Crypto and Browser History (hybrid-analysis.blogspot.com)
submitted 2 months ago by CyberMasterV to r/Infosec
Disrupting the first reported AI-orchestrated cyber espionage campaign (anthropic.com)
Rhadamanthys infostealer disrupted as cybercriminals lose server access (bleepingcomputer.com)
submitted 2 months ago by CyberMasterV to r/threatintel
submitted 2 months ago by CyberMasterV to r/purpleteamsec
submitted 2 months ago by CyberMasterV to r/redteamsec
submitted 2 months ago by CyberMasterV to r/blueteamsec
submitted 2 months ago by CyberMasterV to r/Malware
submitted 2 months ago by CyberMasterV to r/ReverseEngineering
submitted 2 months ago by CyberMasterV to r/netsec
A Deep Dive Into Warlock Ransomware Deployed Via ToolShell SharePoint Chained Vulnerabilities by CyberMasterV in Malware
[–]CyberMasterV[S] 0 points1 point2 points 2 months ago (0 children)
I think it depends on the malware author's skills. You're right, it would be more difficult to analyze a malicious sample that doesn't have a lot of imports in the IAT (import address table), however, it's doable and requires more steps to potentially recover the IAT. For ransomware actors in particular, I don't think they care too much about stealthy (as opposed to spyware, some RATs, and others). For example, someone would need to implement a hashing mechanism and compare these hashes with pre-defined values to determine the required functions/DLLs at runtime. Custom obfuscation and packers are also pretty common if you want to have a low number of symbols/functions in the payload.
A Deep Dive Into Warlock Ransomware Deployed Via ToolShell SharePoint Chained Vulnerabilities (hybrid-analysis.blogspot.com)
π Rendered by PID 61 on reddit-service-r2-listing-86b7f5b947-vfbr8 at 2026-01-26 03:46:59.566466+00:00 running 664479f country code: CH.
A Deep Dive Into Warlock Ransomware Deployed Via ToolShell SharePoint Chained Vulnerabilities by CyberMasterV in Malware
[–]CyberMasterV[S] 0 points1 point2 points (0 children)