494 Followers
286 Following
1.3K Posts

First day of #100daysOfYara
This YARA rule detects a technique used in #TrashAgent malware. The malware has a hard-coded list of apps to check for on the system. This YARA looks for the way they parse the list.
In the image, the list is demarcated with "nepo"

rule at end
1/7

Proud to once again support our LE partners in Operation Endgame Season 3

86M stolen data items from 525K victim IPs across 226 countries included in our new Rhadamanthys Historic Bot Victims Special Report, run overnight 2025-11-12

More details:
https://shadowserver.org/news/rhadamanthys-historical-bot-infections-special-report/

Latest Operation Endgame S03E01 video "STICKY FINGERS":
https://operation-endgame.com

Europol Press Release:
https://europol.europa.eu/media-press/newsroom/news/end-of-game-for-cybercrime-infrastructure-1025-servers-taken-down

Rhadamanthys Historic Bot Victims Special Report technical details:
https://shadowserver.org/what-we-do/network-reporting/rhadamanthys-historical-bot-infections-special-report/

The Secure Annex extension is available to protect against other extensions! When an extension is found to be malicious, Secure Annex will prevent it from running. A great option for teams that do not have complete control with managed browsers. If you're interested, get in touch!
they're targeting English and Japanese languages.
we see TOADs coming from web.core.windows[.]net everyday. they all use the same template. yesterday a new template came across from my.id and i thought the sequence with a fake CMD sequence was hilarious.

Did you know Chrome Enterprise Core offers a free way to report on all of the extensions in your managed browsers? Try using its APIs to do regular enrichment of what your users have installed.

https://secureannex.com/blog/retrieve-chrome-extensions

Retrieve Extensions from the Chrome Enterprise API

A guide to retrieve installed extensions from the Google Chrome Enterprise API

Secure Annex

VexTrio's origins come from two distinct groups: an Italian group we can date back to 2004 and a Russian-speaking Eastern European group. The Italians were quite successful early on, with a dating app that was among the fastest growing on Facebook in 2012. But our guess is that their profits slid in the years that followed. In 2020, there is an merger-acquisition which leaves the Eastern Europeans in charge. They gain the trademarks, knowledge in spam distribution, and who knows what else.

While developers remain in eastern Europe, VexTrio created business headquarters in Lugano, Switzerland. Including the existing AdsPro, which developed the Los Pollos, Taco Loco, and Adtrafico traffic distribution systems (TDS) through their software company HolaCode. (ok it's more complicated than that, but this is the cliffsnotes version). We have identified nearly 100 businesses associated with 8 key figures in many industries, including construction, energy, and advertising.

So in the end, what is VexTrio? It's hard to say. We originally used it to refer to the TDS. Nice clean lines... but now, for us it is all the people and their labyrinth of companies.

We spoke at BlackHat last week so if you have a briefings pass you can listen to that. Otherwise, find our research online and start your own investigation.

#dns #threatintel #scam #cybercrime #vextrio #infoblox #cybersecurity #infosec #malware #tds

How and Why to Ditch GitHub

How much of your code do you feel like entrusting to Microsoft? How about American data centers? Here's an easy way to jump ship and maintain operations.

After three years of relentless tracking, we’ve published a [paper](https://blogs.infoblox.com/threat-intelligence/vextrios-origin-story-from-spam-to-scam-to-adtech/) that, for the first time, exposes the true identities behind VexTrio. This research connects real names to the various companies that form the VexTrio ecosystem. It begins with the origin story—how a group of Italians launched a successful spam and dating business. Over time, VexTrio expanded its operations into malicious adtech and online scams. For over a decade, the group employed deceptive tactics to defraud countless innocent internet users. These illegitimate gains funded the extravagant lifestyles of VexTrio’s key figures—who, despite increasing scrutiny, have yet to be fully stopped.

We’re deeply grateful to all the contributors who helped us reach this research milestone, especially @rmceoin and Tord from [Qurium](https://www.qurium.org/).

#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #adtech #maliciousadtech #advertising #affiliates #scam #notifications #pushnotifications #tds #trafficdistributionsystem #spam #italy #russia #belarus #dating #clickallow

VexTrio Unveiled: Inside the Notorious Scam Enterprise

We expose adtech operators who partner with malware threat actors to commit digital fraud on a global scale through their affiliate advertising networks.

Infoblox Blog

These sites are still serving up Pearl Stealer.

akwatic-hotel[.]ci
ardiellifornasa[.]ge
bleulab[.]ci
clasoftmedia[.]ci
gtl[.]ci
rafelink[.]life