244 Followers
34 Following
773 Posts
Empowering businesses with proactive security solutions: Interactive Sandbox, TI Lookup and Feeds.
Sign uphttps://app.any.run/?utm_source=mastodon
Websitehttps://any.run/?utm_source=mastodon&utm_campaign=bio

IOCs:
URL patterns:
hxxps://<redirector_site>/*#<8 digits>Family=<base64-victim email>
hxxps://<phishing_domain>/?v=<hexadec_chars>&session=<session_id>&cid=<client_id>&iat=<digits>&loc=<location_code>&build=<build_version>

Domains:
kjcleaningservices[.]com[.]au
starllamerchantservices[.]club
lavor[.]sbs
echosign[.]co[.]it
dspconsulting[.]eu

๐Ÿšจ ๐—ช๐—ต๐˜† ๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด ๐—ฆ๐˜๐—ถ๐—น๐—น ๐—š๐—ฒ๐˜๐˜€ ๐—ง๐—ต๐—ฟ๐—ผ๐˜‚๐—ด๐—ต: ๐——๐—ฒ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—š๐—ฎ๐—ฝ๐˜€ ๐—ถ๐—ป ๐—ฅ๐—ฒ๐—ฑ๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜ & ๐—–๐—”๐—ฃ๐—ง๐—–๐—›๐—” ๐—™๐—น๐—ผ๐˜„๐˜€
Redirect chains, fake CAPTCHA, and fast-changing delivery paths make traditional detection unreliable. By the time credentials are targeted, the signal is already lost, which creates a critical gap in triage. The key is detecting #phishing earlier, while patterns are still stable, before the flow fully unfolds.

โšก๏ธ With #ANYRUN TI Lookup, teams can move from isolated indicators to full context, identify attack patterns, and validate detection logic against real attack data from 15K+ organizations.

๐Ÿ“Œ Here are two examples showing how early-stage signals help identify phishing activity before it escalates:
1๏ธโƒฃ ๐—ฅ๐—ฒ๐—ฑ๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜ ๐—ถ๐—ป๐—ณ๐—ฟ๐—ฎ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ
The chain starts from a Google link leading to a compromised site. A hidden HTML page extracts victim data from the URL fragment and triggers a redirect before any user interaction. Analysis session: https://app.any.run/tasks/05c1017e-397c-4cb9-a666-e715402a943a/?utm_source=mastodon&utm_medium=post&utm_campaign=redirect_and_captcha_phishing&utm_content=linktoservice&utm_term=230426

๐Ÿ” In TI Lookup, this activity can be traced by searching for URL fragments containing the #...Family= parameter, which is used to pass victim data and drive redirection. This helps uncover similar samples and track reuse across campaigns.

โšก๏ธ Use this query to pivot from this signal and uncover related activity: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=redirect_and_captcha_phishing&utm_content=linktotilookup&utm_term=230426#%7B%22query%22%3A%22url%3A%5C%22*%23%3F%3F%3F%3F%3F%3F%3F%3FFamily%3D*%5C%22%22%2C%22dateRange%22%3A180%7D

2๏ธโƒฃ ๐—™๐—ฎ๐—ธ๐—ฒ ๐—–๐—”๐—ฃ๐—ง๐—–๐—›๐—” ๐—ฑ๐—ฒ๐—น๐—ถ๐˜ƒ๐—ฒ๐—ฟ๐˜†
After the initial redirect, the victim is presented with a legit-looking CAPTCHA to build trust before being redirected to a phishing page, a fake Microsoft login page powered by #EvilProxy. Analysis session: https://app.any.run/tasks/3ef22bb3-b331-4211-9526-b95c7b19d4ab/?utm_source=mastodon&utm_medium=post&utm_campaign=redirect_and_captcha_phishing&utm_content=linktoservice&utm_term=230426

๐Ÿ” Detection here relies on consistent URL parameters (v, session, cid, iat, loc, build) that appear early in the execution chain. Searching for this structure helps surface related signals and build early-stage detection, reducing MTTD, improving coverage and MTTR.

โšก๏ธ Use this query to surface related phishing activity and validate detection patterns: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=redirect_and_captcha_phishing&utm_content=linktotilookup&utm_term=230426#%7B%22query%22%3A%22url%3A%5C%22*%2F%5C%5C%3Fv%3D%3F%3F%3F%3F%26session%3D*%26cid%3D*%26iat%3D*%26loc%3D*%26build%3D*%5C%22%22%2C%22dateRange%22%3A60%7D

๐Ÿš€ ๐—ฌ๐—ผ๐˜‚ ๐—ฐ๐—ฎ๐—ป ๐—ป๐—ผ๐˜„ ๐˜๐—ฒ๐˜€๐˜ ๐—ง๐—œโ€™๐˜€ ๐—ถ๐—บ๐—ฝ๐—ฎ๐—ฐ๐˜ ๐—ผ๐—ป ๐˜๐—ฟ๐—ถ๐—ฎ๐—ด๐—ฒ, ๐—ฟ๐—ฒ๐˜€๐—ฝ๐—ผ๐—ป๐˜€๐—ฒ, ๐—ฎ๐—ป๐—ฑ ๐˜๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—ต๐˜‚๐—ป๐˜๐—ถ๐—ป๐—ด ๐—ฑ๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—น๐˜† ๐—ถ๐—ป ๐˜†๐—ผ๐˜‚๐—ฟ ๐˜„๐—ผ๐—ฟ๐—ธ๐—ณ๐—น๐—ผ๐˜„๐˜€. With 20 premium search requests available, SOC and MSSP teams can validate activity against real-world data, reduce uncertainty, and make faster, evidence-based decisions.

โšก๏ธ Learn how to integrate #ANYRUN Threat Intelligence into your SOC to strengthen detection and improve overall performance: https://any.run/cybersecurity-blog/expanded-free-ti-plan/?utm_source=mastodon&utm_medium=post&utm_campaign=redirect_and_captcha_phishing&utm_content=linktoblog&utm_term=230426

#cybersecurity #infosec

Dozens of security training, and people still fall for #phishing ๐Ÿšฉ

It is designed to deceive: trust abuse, fake CAPTCHAs, MFA bypasses.

๐Ÿ“Œ Here are 3 crucial steps for SOCs to move upstream and build effective phishing detection: https://any.run/cybersecurity-blog/phishing-detection-steps-for-cisos/?utm_source=mastodon&utm_medium=post&utm_campaign=phishing_detection_ciso&utm_content=linktoblog&utm_term=230426

๐Ÿš€ We're expanding access to #ANYRUN Threat Intelligence. Now with AI Search โšก๏ธ

SOCs & MSSPs, power your triage, response, and hunting with live attack data from 15K+ orgs to reduce risk exposure.

Every team deserves premium intelligence. Learn more ๐Ÿ‘‡
https://any.run/cybersecurity-blog/expanded-free-ti-plan/?utm_source=mastodon&utm_medium=post&utm_campaign=expanded_free_ti_plan&utm_term=220426&utm_content=linktoblog

#cybersecurity #infosec

ANY.RUN Expands Free Plan for Threat Intelligence

Test threat intelligence in real SOC workflows with ANY.RUNโ€™s improved free plan. Faster triage, response, and hunting.

ANY.RUN's Cybersecurity Blog

๐Ÿ‘จโ€๐Ÿ’ป Manual efforts against encrypted phishing drain your MTTR and coverage.

#ANYRUN Sandbox provides visibility to reach root of a threat in seconds, allowing teams to prioritize strategy over noise.

โšก๏ธ Scale SOC operations with these visibility gains: https://any.run/cybersecurity-blog/automatic-ssl-decryption/?utm_source=mastodon&utm_medium=post&utm_campaign=automatic_ssl_decryption&utm_term=220426&utm_content=linktoblog

#cybersecurity

๐Ÿšจ #Lazarus APT has weaponized new malware to hunt C-level credentials

This campaign poses a direct financial and business risk, bypassing detection to steal executive data via fake meeting invites โ—๏ธ

Check Mauro Eldritch's breakdown for defense steps ๐Ÿ‘‡
http://any.run/cybersecurity-blog/lazarus-macos-malware-mach-o-man/?utm_source=mastodon&utm_medium=post&utm_campaign=lazarus_macos_malware_mach_o_man&utm_term=210426&utm_content=linktoblog

#cybersecurity #infosec

Lazarus โ€œMach-O Manโ€ Malware: What CISOs Need to Know

Learn how the Lazarus โ€œMach-O Manโ€ campaign targets businesses, and how SOC leaders can reduce credential theft and data exposure risk.

ANY.RUN's Cybersecurity Blog

โšก๏ธ From triage to hunting, real SOC performance comes from validated behavior-based evidence and context in a single, streamlined process.

โœ… Speed up decision-making and contain incidents faster with earlier visibility and actionable intelligence: https://any.run/enterprise/?utm_source=mastodon&utm_medium=post&utm_campaign=enterprise&utm_term=210426&utm_content=linktoenterprise

โš ๏ธ C-Suite Alert: Oblivion RAT delivers enterprise-grade mobile espionage via MaaS. Fake updates, silent permissions, wealth assessment for bank apps, hidden remote control.

โ—๏ธ Already impacted thousands of Android devices. See how to detect and stop: https://any.run/malware-trends/Oblivion/?utm_source=mastodon&utm_medium=post&utm_campaign=oblivion&utm_term=200426&utm_content=linktomtt

#cybersecurity #infosec

๐ŸŽฏ We added and updated 28 Suricata rules based on real attacker behavior observed in the wild. Explore the examples and strengthen your detection.

Explore the complete ruleset: https://linkedin.com/pulse/anyrun-suricata-ids-ruleset-changelog-8-any-run-dfole