Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

nordvpn-banner
Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools

Main Story

unlock_membership
  • Premium Members Content

Artificial Intelligence and Cybersecurity A New Era of Defense

October 13, 2025
unlock_membership
  • Premium Members Content

Fortifying Web Apps Practical Guide to Web Application Security

September 26, 2025
unlock_membership
  • Premium Members Content

Fortifying the Supply Chain through Practical Security for Modern Organizations

September 22, 2025
unlock_membership
  • Premium Members Content

Security Awareness Training that Works for Changing Employee Behavior

September 19, 2025
void_execution
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

September 10, 2025

Editor’s Picks

fd3be727633124bdbf3a30714a81fcf9503fb40493117db4ccaf466df7de6da3
  • Tools

Shodan-Dorks – Dorks for Shodan; a powerful tool used to search for Internet-connected devices

May 12, 2025
bb892dd102fe085dfa675288dfdee2eaae88cac9f4f044af76c414a45febec61
  • Tools

Pegasus-Pentest-Arsenal – A Comprehensive Web Application Security Testing Toolkit That Combines 10 Powerful Penetration Testing Features Into One Tool

May 12, 2025

Trending Story

void_execution
1
  • Premium Members Content
  • Try Hack Me
  • Tutorials

[TRYHACKME] – Void Execution Challenge

image
2
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough: Whats Your Name?

image
3
  • Premium Members Content
  • Try Hack Me
  • Tutorials

TryHackMe Walkthrough : Dodge

image
4
  • Premium Members Content
  • Tutorials

Simplify NordVPN + pfSense WireGuard Configuration with downloadable script + guide.

tryhackme
5
  • Premium Members Content
  • Try Hack Me
  • Tutorials

Try Hack Me: Walkthrough Report – EXPOSED

Featured Story

iStock-1499587581
  • NCSC
  • News

Post-quantum cryptography: what comes next?

August 15, 2024
bec-blog
  • NCSC
  • News

Business email compromise: new guidance to protect your organisation

June 4, 2024
iStock-1487920406
  • NCSC
  • News

Machine learning security principles updated

June 4, 2024
ai_checkout2
  • NCSC
  • News

Smart devices: new law helps citizens to choose secure products

April 30, 2024
iStock-154974489
  • NCSC
  • News

Cyber Assessment Framework 3.2

April 19, 2024
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 98e8bcb6dc7fa33c0ba1917db3060d3f

November 1, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, discovery, persistence, ransomware, spyware, stealerMD5: 98e8bcb6dc7fa33c0ba1917db3060d3fSHA1: d476e4750a0cc4b072751d6d618184e825f269d9ANALYSIS DATE: 2022-11-01T10:20:32ZTTPS: T1060, T1112, T1082, T1005, T1081, T1012,...

Read MoreRead more about Malware Analysis – djvu – 98e8bcb6dc7fa33c0ba1917db3060d3f
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 64614e3663ac2abd4a21ae1e1d46bfc3

November 1, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, discovery, persistence, ransomware, spyware, stealerMD5: 64614e3663ac2abd4a21ae1e1d46bfc3SHA1: 2a910047f6f2357425965958ca6bb75d550e9a6dANALYSIS DATE: 2022-11-01T09:56:29ZTTPS: T1060, T1112, T1082, T1012, T1005, T1081,...

Read MoreRead more about Malware Analysis – djvu – 64614e3663ac2abd4a21ae1e1d46bfc3
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 84[.]32[.]188[.]244:80

November 1, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 84[.]32[.]188[.]244:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 185[.]130[.]45[.]159:80

November 1, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 185[.]130[.]45[.]159:80
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 43[.]143[.]133[.]46:443

November 1, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 43[.]143[.]133[.]46:443
Cobalt-Strike
  • Cobalt Strike

Cobalt Stike Beacon Detected – 124[.]70[.]67[.]154:443

November 1, 2022

The Information provided at the time of posting was detected as "Cobalt Strike". Depending on when you are viewing this...

Read MoreRead more about Cobalt Stike Beacon Detected – 124[.]70[.]67[.]154:443
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – bfd9b7bda4437c4b6ca3d10738afb87a

November 1, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:redline, family:smokeloader, botnet:mario23_10, botnet:slovarik1btc, backdoor, collection, discovery, infostealer, persistence, ransomware, spyware, stealer, trojan, upxMD5: bfd9b7bda4437c4b6ca3d10738afb87aSHA1:...

Read MoreRead more about Malware Analysis – djvu – bfd9b7bda4437c4b6ca3d10738afb87a
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – lockbit – 23e2134379d01a6efcfb519df2819bce

November 1, 2022

Score: 10 MALWARE FAMILY: lockbitTAGS:family:lockbit, ransomwareMD5: 23e2134379d01a6efcfb519df2819bceSHA1: 93e1a0c2918ece7a768b9b3fd8d5203e1fa0754cANALYSIS DATE: 2022-11-01T11:19:03ZTTPS: ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more known...

Read MoreRead more about Malware Analysis – lockbit – 23e2134379d01a6efcfb519df2819bce
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – 9e775e96fa042f3b834bbc419900ccc7

November 1, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: 9e775e96fa042f3b834bbc419900ccc7SHA1: 2979669e92f199a0aaddc71e7133891af20ef6d7ANALYSIS DATE: 2022-11-01T10:51:04ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – 9e775e96fa042f3b834bbc419900ccc7
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 352e96b903513bea0586e76f677bd7a0

November 1, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, discovery, persistence, ransomware, spyware, stealerMD5: 352e96b903513bea0586e76f677bd7a0SHA1: 1bd12034347ce8aedcaa6c4612622ebb5142e83cANALYSIS DATE: 2022-11-01T11:40:30ZTTPS: T1222, T1060, T1112, T1005, T1081, T1012,...

Read MoreRead more about Malware Analysis – djvu – 352e96b903513bea0586e76f677bd7a0
osint
  • News

Samsung Galaxy Store flaw could have allowed installing malicious apps on target devices

November 1, 2022

A security flaw in the Galaxy Store app for Samsung devices could have potentially allowed remote command execution on affected...

Read MoreRead more about Samsung Galaxy Store flaw could have allowed installing malicious apps on target devices
CVE-prog
  • Vulnerabilities

xf-test-csrf |

November 1, 2022

NAME xf-test-csrf Platforms Affected:Risk Level:10Exploitability:FunctionalConsequences: DESCRIPTION xf-test-csrf CVSS 3.0 Information Privileges Required: NoneUser Interaction: NoneScope: UnchangedAccess Vector: Access Complexity: LowConfidentiality...

Read MoreRead more about xf-test-csrf |
trend
  • Vulnerabilities

Daily Vulnerability Trends: Tue Nov 01 2022

November 1, 2022

Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-42889Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated...

Read MoreRead more about Daily Vulnerability Trends: Tue Nov 01 2022
abstract_digital_japan-990x400-2
  • News

APT10: Tracking down LODEINFO 2022, part II

November 1, 2022

In the previous publication ‘Tracking down LODEINFO 2022, part I‘, we mentioned that the initial infection methods vary in different...

Read MoreRead more about APT10: Tracking down LODEINFO 2022, part II
abstract_digital_japan-990x400-1
  • News

APT10: Tracking down LODEINFO 2022, part I

November 1, 2022

Kaspersky has been tracking activities involving the LODEINFO malware family since 2019, looking for new modifications and thoroughly investigating any...

Read MoreRead more about APT10: Tracking down LODEINFO 2022, part I
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: hoosierco[.]com

November 1, 2022

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: hoosierco[.]com
image-11
  • Data Breach
  • Ransomware

LockBit 3.0 Ransomware Victim: centurion[.]com[.]pl

November 1, 2022

LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...

Read MoreRead more about LockBit 3.0 Ransomware Victim: centurion[.]com[.]pl
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 326b996ad2342c28d3b5e2e94432c4d3

November 1, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:redline, family:smokeloader, botnet:mario23_10, botnet:slovarik1btc, backdoor, collection, discovery, infostealer, persistence, ransomware, spyware, stealer, trojanMD5: 326b996ad2342c28d3b5e2e94432c4d3SHA1: 158034f8bf2d95774a7a6806dcaa250485eb2408ANALYSIS...

Read MoreRead more about Malware Analysis – djvu – 326b996ad2342c28d3b5e2e94432c4d3
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – b482dd352ddeb71adc03e2d24c49189c

November 1, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:redline, family:smokeloader, botnet:mario23_10, botnet:slovarik1btc, backdoor, collection, discovery, infostealer, persistence, ransomware, spyware, stealer, trojanMD5: b482dd352ddeb71adc03e2d24c49189cSHA1: 2453d68c559fca10b1bc8185ef8da16c478520cbANALYSIS...

Read MoreRead more about Malware Analysis – djvu – b482dd352ddeb71adc03e2d24c49189c
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – chaos – d655e77841cf6db3008dcd60c9c5eb18

November 1, 2022

Score: 10 MALWARE FAMILY: chaosTAGS:family:chaos, ransomwareMD5: d655e77841cf6db3008dcd60c9c5eb18SHA1: 66d8fc2c3b7f36e935a283e10690249043a387a4ANALYSIS DATE: 2022-11-01T05:36:09ZTTPS: T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely maliciousOne or more...

Read MoreRead more about Malware Analysis – chaos – d655e77841cf6db3008dcd60c9c5eb18
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – dda494bf360d381f476a7b393f23e149

November 1, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: dda494bf360d381f476a7b393f23e149SHA1: 62be4a4a8508786b60ca79c1b5820fd16137a97eANALYSIS DATE: 2022-11-01T05:02:03ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – dda494bf360d381f476a7b393f23e149
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – djvu – 9852898c26e5194f66754becdb69afb8

November 1, 2022

Score: 10 MALWARE FAMILY: djvuTAGS:family:djvu, family:redline, family:smokeloader, botnet:mario23_10, botnet:slovarik1btc, backdoor, collection, discovery, infostealer, persistence, ransomware, spyware, stealer, trojanMD5: 9852898c26e5194f66754becdb69afb8SHA1: 3123b281cb8e992a3246f6285f18bc0dbfc1dc07ANALYSIS...

Read MoreRead more about Malware Analysis – djvu – 9852898c26e5194f66754becdb69afb8
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – smokeloader – 4c55f36fd0aa2aadbd6760930c7be8be

November 1, 2022

Score: 10 MALWARE FAMILY: smokeloaderTAGS:family:smokeloader, backdoor, trojanMD5: 4c55f36fd0aa2aadbd6760930c7be8beSHA1: a9c8f7e0b6701c576b509e9dfdacfe58262d28b2ANALYSIS DATE: 2022-11-01T04:06:36ZTTPS: T1012, T1120, T1082 ScoreMeaningExample10Known badA malware family was detected.8-9Likely...

Read MoreRead more about Malware Analysis – smokeloader – 4c55f36fd0aa2aadbd6760930c7be8be
abstract-malware-990x400-1
  • Malware Analysis

Malware Analysis – chaos – 8ee79ded5497779cd7e0b46a876d09cf

November 1, 2022

Score: 10 MALWARE FAMILY: chaosTAGS:family:chaos, evasion, ransomware, spyware, stealerMD5: 8ee79ded5497779cd7e0b46a876d09cfSHA1: 3179b69d3f8fcc35e0386c7c1a70ce0269d03a3fANALYSIS DATE: 2022-11-01T05:36:19ZTTPS: T1490, T1059, T1107, T1082, T1491, T1112, T1005,...

Read MoreRead more about Malware Analysis – chaos – 8ee79ded5497779cd7e0b46a876d09cf

Posts pagination

Previous 1 … 3,176 3,177 3,178 3,179 3,180 3,181 3,182 … 4,480 Next

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Data Breach
  • Ransomware

[INCRANSOM] – Ransomware Victim: auge[.]com

October 26, 2025
covenant
  • Covenant C2

CovenantC2 Detected – 144[.]91[.]125[.]213:7443

October 26, 2025
fb829fa8a8b2cc129abe2eeccbfc0e0934a44d5f6938a4c8d6866aeda3234152
  • News

Shield Ai Shows Off Not At All Terrifying Autonomous Vtol Combat Drone

October 26, 2025
image
  • Data Breach
  • Ransomware

[QILIN] – Ransomware Victim: Essential Cabinetry Group

October 26, 2025
image
  • Data Breach
  • Ransomware

[NOVA] – Ransomware Victim: Papsud

October 26, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel