Germán Fernández
Germán Fernández @1ZRR4H ·
🔸 45[.]137[.]70[.]27:8080 #opendir 🔎 → CVE-2026-24061 (Telnetd Auth Bypass) → CVE-2024-3721 (TBK DVR Command Injection) → CVE-2024-10443 (Synology RCE via Crontabj3
20
6.7K
Demon
Demon @volrant136 ·
#ThreatHunting | #Opendir | @Huntio Pivot on hashes of VmManagedSetup.exe and z.bat uncovered 7 additional #opendir: Timeline spans 2023 → 2026. Same toolkit. Same directory structure. Reused infra left exposed. IoCs: pastebin.com/QLJ8nUEH Ref: x.com/Huntio/status/…
Hunt.io Hunt.io @Huntio ·
We found an open directory on Proton66 that a TheGentlemen ransomware affiliate forgot to close 🕵️ We pivoted on TheGentlemen ransomware IOCs and landed on an open directory on Proton66 with 126 files inside. Full pre-encryption toolkit. Mimikatz logs with victim NTLM hashes.kens. All sitting unauthenticated on a Russian bulletproof host. No custom malware. No zero-days. Just dual-use and off-the-shelf offensive tools in the right sequence, which is exactly why this is hard to catch. Full breakdown, IOCs, and detection guidance:hunt.io/blog/thegentle…e #ThreatHunting #Ransomware #ThreatIntelligence #DFIR #BlueTeam #TheGentlemen
1
6
1.6K
Germán Fernández
Germán Fernández @1ZRR4H ·
♦️ Exposed #opendir on 187.77.173[.]118 port 8080 hosting AI-generated tools to analyze CVE-2025-6218 and test bypass variants against the official patch for WinRAR(?). The environment includes progress tracking and references to a business model aligned with 0-day development iple .bin files and "loaders" flagged as possible Meterpreter. [+]bazaar.abuse.ch/sample/3404b9e…V / @malwrhunterteam @HackingLZ @UK_Daniel_Card
1
18
15.8K
blinkz
blinkz @BlinkzSec ·
Why does this Russian support technician want to disable my antivirus? Well, I'll leave it at that. telegram bot token: 8617483102:AAGkFE-x8Z81Ex-PtnzkMURy1-1CI3KGpdU $CHAT_ID = "-5185728008" bazaar.abuse.ch/sample/d756d1e… #opendir
3
7
4K
ThreatOpsX
ThreatOpsX @ThreatOpsX ·
hxxp[://]188[.]137[.]224[.]103:80 #opendir Distributed by the HTA file with the purpose of executing the binary “digest.bin,” which contains stealer functions. #Stealer
1
200