Mythic C2 Detected - 152.228.129.105152[.]228[.]129[.]105:7443 - https://www.redpacketsecurity.com/mythic-c2-detected-152-228-129-105-port-7443/
Mythic C2 Detected - 152.228.129.105152[.]228[.]129[.]105:7443 - https://www.redpacketsecurity.com/mythic-c2-detected-152-228-129-105-port-7443/
(vulncheck.com) Kinsing Botnet Expands Exploit Arsenal with CVE-2025-55182 Alongside Legacy CVEs on Shared Infrastructure
Kinsing botnet expands exploit arsenal with CVE-2025-55182 (React2Shell) alongside CVE-2023-46604 (ActiveMQ) & CVE-2023-38646 (Metabase), all converging on shared infrastructure (212.113.98.30 → 78.153.140.16). Uses in-memory bash stager (/dev/tcp) for CVE-2025-55182, classic Go-based miner + libsystem.so rootkit (ld.so.preload). MD5s: b3039abf2ad5202f4a9363b418002351 (kinsing), ccef46c7edf9131ccffc47bd69eb743b (rootkit).
Source: https://www.vulncheck.com/blog/return-of-the-kinsing

Canary Intelligence linked exploitation of CVE-2023-46604, CVE-2023-38646, and CVE-2025-55182 to the same Kinsing infrastructure, including a shared staging host and attacker IP first seen in the canary network on March 12, 2026. The research shows how an older malware family is still adapting by adding new exploit paths while continuing to rely on established infrastructure.
[INTERLOCK] - Ransomware Victim: Goodwill - https://www.redpacketsecurity.com/interlock-ransomware-victim-goodwill/
#interlock #dark_web #data_breach #OSINT #ransomware #threatintel #tor
[QILIN] - Ransomware Victim: Mac Interiors - https://www.redpacketsecurity.com/qilin-ransomware-victim-mac-interiors/
#qilin #dark_web #data_breach #OSINT #ransomware #threatintel #tor
[QILIN] - Ransomware Victim: Living in green, s[.] r[.] o[.] - https://www.redpacketsecurity.com/qilin-ransomware-victim-living-in-green-s-r-o/
#qilin #dark_web #data_breach #OSINT #ransomware #threatintel #tor
[QILIN] - Ransomware Victim: Noi Hotels - https://www.redpacketsecurity.com/qilin-ransomware-victim-noi-hotels/
#qilin #dark_web #data_breach #OSINT #ransomware #threatintel #tor
[DRAGONFORCE] - Ransomware Victim: pridesol[.]com - https://www.redpacketsecurity.com/dragonforce-ransomware-victim-pridesol-com/
#dragonforce #dark_web #data_breach #OSINT #ransomware #threatintel #tor
[QILIN] - Ransomware Victim: LP Kolding - https://www.redpacketsecurity.com/qilin-ransomware-victim-lp-kolding/
#qilin #dark_web #data_breach #OSINT #ransomware #threatintel #tor
[DRAGONFORCE] - Ransomware Victim: ssp-ce[.]de - https://www.redpacketsecurity.com/dragonforce-ransomware-victim-ssp-ce-de/
#dragonforce #dark_web #data_breach #OSINT #ransomware #threatintel #tor
[DRAGONFORCE] - Ransomware Victim: kalimaresort[.]com - https://www.redpacketsecurity.com/dragonforce-ransomware-victim-kalimaresort-com/
#dragonforce #dark_web #data_breach #OSINT #ransomware #threatintel #tor