#InfoSec #Cybersecurity #threatintel and Politics. I try my best.
Also @[email protected]
Searchable
| Verified by Twittodon | https://twittodon.com/share.php?t=Deepthoughts10&[email protected] |
| Find my toots | Tootfinder |
#InfoSec #Cybersecurity #threatintel and Politics. I try my best.
Also @[email protected]
Searchable
| Verified by Twittodon | https://twittodon.com/share.php?t=Deepthoughts10&[email protected] |
| Find my toots | Tootfinder |
RE: https://infosec.exchange/@VirusBulletin/116294907171305521
Etherhiding is an established but lesser known method of providing C2 information to malware. Most businesses do not need to allow access to the blockchain-related API / RPC endpoints used by this technique. I highly recommend you block them.
eth.llamarpc.com
mainnet.gateway.tenderly.co
rpc.flashbots.net
rpc.mevblocker.io
eth-mainnet.public.blastapi.io
ethereum-rpc.publicnode.com
rpc.payload.de
eth.drpc.org
eth.merkle.io
My database is at CertGraveyard .org . We document these to keep a public record and to use it for cyber defense.
To that end we've also partnered with MagicSword (https://www.magicsword.io/plan?utm_source=certgraveyard&utm_medium=affiliate&utm_campaign=community-widget&utm_content=social ); their tool uses our database.
5/6
Red Canary’s March Intelligence Insights report is out. They provide detection opportunities for common Windows and MacOS exploits #cybersecurity
https://redcanary.com/blog/threat-intelligence/intelligence-insights-march-2026/