Jai Minton 

640 Followers
189 Following
72 Posts
An Aussie who does cyber things | Sr. Manager and Former Principal @huntress | Former Principal @ CrowdStrike | https://www.jaiminton.com | Posts = own views.
Websitehttps://www.jaiminton.com/
BlueSkyhttps://bsky.app/profile/jaiminton.com
Twitterhttps://twitter.com/CyberRaiju
YouTubehttps://youtube.com/@cyberraiju

Episode 4 of Breach Log is now out! In this episode I'm joined by Cameron Cottam who tells his story about responding to a critical alert at 2am. Enjoy.

Spotify: https://open.spotify.com/episode/26Lr7euOqa3ma2FaYQMpsr?si=_LmUaNv2SauM0uQEaFWVog

Other Providers: https://creators.spotify.com/pod/profile/breachlog/

Ep4: Think Twice Before You Fix It with Cameron

Breach Log - Every hack has a story to tell ยท Episode

Spotify

Episode 3 of Breach Log is now available! Whether you're heading into the weekend or beginning your Friday, I hope you can carve out a mere 20 minutes to enjoy another story from the vault of detecting and responding to hacks around the world. As always if you have a story to share get in touch, you don't need to work on the format of it we can do that together ๐Ÿ™

https://open.spotify.com/episode/7MY3S511BfQOw9FxH4uMDH?si=YkRqLmwfSeqlnFpuLMiTxg

Ep3: Care to Exchange 0-days?

Breach Log - Behind every hack is a story to tell ยท Episode

Spotify

I teamed up with Ryan Dowd to investigate a fake OpenClaw installer hosted on GitHub. This was also picked up by Bing's AI and recommended as the correct way to install OpenClaw on Windows.

The executable had 0 VT hits, and the MacOS variant would deploy a binary likely to be Atomic MacOS Stealer. The executable didn't run in sandboxed environments, and was deploying information stealers in addition to GhostSocks.

The addition of GhostSocks is interesting as it turns compromised systems into a proxy the threat actor can use to route their logins through. This enables them to bypass anti-fraud checks from online services. It also contained a hidden parameter which if given would launch in a debugging mode providing complete insight into the GhostSocks configuration.

This is a current campaign impersonating popular GitHub repositories claiming to be easier methods of installation, and the threat actor is posting issues on legitimate GitHub projects to help drive traffic to their malicious repositories.

Have a read, hope you enjoy.

https://www.huntress.com/blog/openclaw-github-ghostsocks-infostealer

How Fake OpenClaw Installers Spread GhostSocks Malware | Huntress

Huntress warns of fake OpenClaw installers on GitHub deploying malware. Learn how these attacks happen, identify signs of infection, and stay protected.

Huntress
Episode 2 of Breach Log is now available! Special thanks to Max Margolis for joining me and telling his story.
If you have a story you'd like to share, get in contact and we can have some fun! breachlogpodcast [@] gmail.com
https://open.spotify.com/episode/4SDz0RGNXaRVVEJNgabTyh?si=VKSgAn0mSgKrs4Q2mPyfig
Ep2: The Unseen Impact of Ad Fraud with Max

Breach Log - Behind every hack is a story to tell ยท Episode

Spotify

Happy start of the week.

As a treat the first episode of a new podcast 'Breach Log' is now available.
If you like defensive cyber security stories being told then this may appeal to you. It's available on all good podcast providers, but the RSS and Spotify link are included below.

RSS: https://rss.com/podcasts/breachlog/2439149/
Spotify: https://open.spotify.com/episode/4WViEcKqIlFIGoSDuvK61G

Please let me know your thoughts and feelings, and if you have a story to tell get in contact and we'll have a chat to get your story told with a format that has more back and forth ๐Ÿ˜ ๐Ÿ™

1: The Vampire RAT | Podcast Episode on RSS.com

It's all fun and games until a researcher identifies a backdoor with ransomware capability, global victims, and hacked systems all around the world. Now if only someone would listen.This story comes from the host of the show, Jai Minton.Want to get technical? Read the Reverse Engineering write-up here---------Credits:Music from Uppbeat:AlertCold FireDistanceMusic and SFX by various artists from Pixabay

RSS.com

As of Thurs Aug 14th we're seeing clear indications that a threat actor has now weaponised and is exploiting vulnerabilities in Axis camera software (CVE-2025-30023/4/5/6) which was presented at DEFCON.

Indicators on Xitter/LinkedIn

https://x.com/CyberRaiju/status/1956566419388182954?t=ja3SIvBipXuzd1aPrKlLfA&s=19

https://www.linkedin.com/posts/activity-7362332110327570433-7AEV

Jai Minton (@CyberRaiju) on X

As of Thurs Aug 14th we're seeing clear indications that a threat actor has now weaponised and is exploiting vulnerabilities in Axis camera software (CVE-2025-30023/4/5/6) which was presented at DEFCON. Props to @Cyber4a53 for find. https://t.co/ktPlOJkekW CC: @HuntressLabs ๐Ÿ‘‡

X (formerly Twitter)

Another notable Octowave Loader sample with installer MSI showing low VT hits, and malicious DLL's being completely undetected. Sideloads into the legitimate Audacity.

Installs itself as 'Directory Converter' in the user LocalAppData 'Programs' directory.

Likely from a fake Cloudflare challenge. Has 4 malicious DLLs, a Progress.pak supporting file, and shellcode inside of Presentations\Application.wav

Deploys LummaC2 into memory which is now using both Telegram channel and Steam Community names for C2 fallback.

MSI: https://www.virustotal.com/gui/file/6251d8f0af660e1e92506d6cea15fd9a7d332a669a6e1b3cf47914b45267b16d

DLL1:
https://www.virustotal.com/gui/file/dd94a417398e749ec63395af31b4749421fc37ec4259da8cd068d3c9fc5198fe/details

DLL2:
https://www.virustotal.com/gui/file/ccfa5f475659d3ee9503cc4d80ecccd34c7f012a17a74bd5a4a43c6223db5adb

DLL3:
https://www.virustotal.com/gui/file/3d72ea9d39991e7300aa0fa50ec2877443afbbd507881cdebfda0f5ed1517926/details

DLL4:
https://www.virustotal.com/gui/file/d0ff2e4092426ef8d17c65ec031fec3db797f1e7a48f011767ca1cffb3d05135/details

VirusTotal

VirusTotal

New video released ๐ŸŽ‰: Once again looking at malware sent over Discord, but this time we can analyse it statically after performing AES decryption. You may also see reference in the video to some stealers which have since shutdown or rebranded ๐Ÿ˜Ž Enjoy!
https://www.youtube.com/watch?v=knu0DttZxxc
DISCORD "try my game" MALWARE | Reverse Engineering Leet Stealer, Electron Malware Used By HACKERS

YouTube

Are you interested in Generative AI and ๐Ÿ’‰ Prompt Injection techniques? I've just released a short video exploring the Main Gandalf challenge by Lakera AI and how you can convince ๐Ÿง™โ€โ™‚๏ธ to give you his secrets through specifically crafted prompts.

Enjoy!

https://www.youtube.com/watch?v=pQ5KKvSUjoM

Hacking Gandalf AI (LLM) to reveal SECRETS | Basic PROMPT INJECTION techniques

YouTube

Stumbled into a supply chain attack yesterday affecting over 100 auto dealerships. The third party was informed and has remediated.

https://rmceoin.github.io/malware-analysis/2025/03/13/supply-chain.html

#ClickFix

Auto Dealership Supply Chain Attack

Summary

Malware Analysis