Discussion
Loading...

#Tag

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Cat 🐈🥗 (D.Burch) :paw:⁠:paw: boosted
cR0w h0 h0
cR0w h0 h0
@cR0w@infosec.exchange  ·  activity timestamp 21 hours ago

RE: https://infosec.exchange/@greynoise/116047942661766828

FWIW, if you were using the #GAYINT block list for your Ivanti RMM system, that IP on the bulletproof AS200593 would have been blocked. 8bitrainbow

GreyNoise
GreyNoise
@greynoise@infosec.exchange  ·  activity timestamp 21 hours ago

83% of observed Ivanti EPMM exploitation (CVE-2026-1281) traces to one bulletproof IP that isn't on any published IOC list. The IPs that are? VPN exits with zero Ivanti activity. We broke down who's actually doing this ⬇️ https://www.greynoise.io/blog/active-ivanti-exploitation

#Ivanti #ThreatIntel #CVE20261281 #InfoSec

  • Copy link
  • Flag this post
  • Block
cR0w h0 h0
cR0w h0 h0
@cR0w@infosec.exchange  ·  activity timestamp 21 hours ago

RE: https://infosec.exchange/@greynoise/116047942661766828

FWIW, if you were using the #GAYINT block list for your Ivanti RMM system, that IP on the bulletproof AS200593 would have been blocked. 8bitrainbow

GreyNoise
GreyNoise
@greynoise@infosec.exchange  ·  activity timestamp 21 hours ago

83% of observed Ivanti EPMM exploitation (CVE-2026-1281) traces to one bulletproof IP that isn't on any published IOC list. The IPs that are? VPN exits with zero Ivanti activity. We broke down who's actually doing this ⬇️ https://www.greynoise.io/blog/active-ivanti-exploitation

#Ivanti #ThreatIntel #CVE20261281 #InfoSec

  • Copy link
  • Flag this post
  • Block
cR0w h0 h0
cR0w h0 h0
@cR0w@infosec.exchange  ·  activity timestamp 6 days ago

Behind the scenes look at #GAYINT CTI curation.

Where do I begin with this one? It's a painting or drawing of a pond meadow scene. In the pond is a hippo blasting fire from its ass. On its back is a racoon lighting sparklers on the flame. On the shore are three cows on their hind legs with beavers shooting milk from their udders at the hippo's flame. Below where the milk is hitting the flame is another beaver holding a peel with some sort of dishes being cooked and milked.
Where do I begin with this one? It's a painting or drawing of a pond meadow scene. In the pond is a hippo blasting fire from its ass. On its back is a racoon lighting sparklers on the flame. On the shore are three cows on their hind legs with beavers shooting milk from their udders at the hippo's flame. Below where the milk is hitting the flame is another beaver holding a peel with some sort of dishes being cooked and milked.
Where do I begin with this one? It's a painting or drawing of a pond meadow scene. In the pond is a hippo blasting fire from its ass. On its back is a racoon lighting sparklers on the flame. On the shore are three cows on their hind legs with beavers shooting milk from their udders at the hippo's flame. Below where the milk is hitting the flame is another beaver holding a peel with some sort of dishes being cooked and milked.
  • Copy link
  • Flag this post
  • Block
Cat 🐈🥗 (D.Burch) :paw:⁠:paw: boosted
cR0w h0 h0
cR0w h0 h0
@cR0w@infosec.exchange  ·  activity timestamp last week

https://www.infoblox.com/blog/threat-intelligence/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks/

Maybe try blocking some full Aeza ASNs. The prefixes for AS210644 and AS216246 are already in the #GAYINT naughty list: https://intel.gayint.org/

Screenshot showing AS210644 with 166 prefixes and AS216246 with 24 prefixes in the GAYINT block list.
Screenshot showing AS210644 with 166 prefixes and AS216246 with 24 prefixes in the GAYINT block list.
Screenshot showing AS210644 with 166 prefixes and AS216246 with 24 prefixes in the GAYINT block list.
Infoblox Blog

Compromised Routers, DNS, and a TDS Hidden in Aeza Networks

Compromised routers silently reroute DNS, enabling a powerful Traffic Distribution System (TDS) that forces users to scams and malware via affiliate marketing.
  • Copy link
  • Flag this post
  • Block
cR0w h0 h0
cR0w h0 h0
@cR0w@infosec.exchange  ·  activity timestamp last week

https://www.infoblox.com/blog/threat-intelligence/compromised-routers-dns-and-a-tds-hidden-in-aeza-networks/

Maybe try blocking some full Aeza ASNs. The prefixes for AS210644 and AS216246 are already in the #GAYINT naughty list: https://intel.gayint.org/

Screenshot showing AS210644 with 166 prefixes and AS216246 with 24 prefixes in the GAYINT block list.
Screenshot showing AS210644 with 166 prefixes and AS216246 with 24 prefixes in the GAYINT block list.
Screenshot showing AS210644 with 166 prefixes and AS216246 with 24 prefixes in the GAYINT block list.
Infoblox Blog

Compromised Routers, DNS, and a TDS Hidden in Aeza Networks

Compromised routers silently reroute DNS, enabling a powerful Traffic Distribution System (TDS) that forces users to scams and malware via affiliate marketing.
  • Copy link
  • Flag this post
  • Block
cR0w h0 h0
cR0w h0 h0
@cR0w@infosec.exchange  ·  activity timestamp last week

@nyanbinary @hrbrmstr The ASN is there. gayint

#GAYINT

Screenshot showing AS211590 in the GAYINT ASN block list.
Screenshot showing AS211590 in the GAYINT ASN block list.
Screenshot showing AS211590 in the GAYINT ASN block list.
  • Copy link
  • Flag this post
  • Block
Michał "rysiek" Woźniak · 🇺🇦 and 1 other boosted
Kevin Beaumont
Kevin Beaumont
@GossiTheDog@cyberplace.social  ·  activity timestamp last week

Notepad++ have today confirmed their auto process was compromised by Chinese nation state threat actors, in a supply chain hack: https://notepad-plus-plus.org/news/hijacked-incident-info-update/

This backs up my blog from late last year, with #GAYINT threat actor mapping to Funky Stamen.

The infrastructure and update mechanisms have since been tightened. For what it’s worth - entry was to telcos and financial services with interests aligned to China. Notepad++ dev did a great job treating issue seriously.

Notepad++ Hijacked by State-Sponsored Hackers | Notepad++

  • Copy link
  • Flag this post
  • Block
Kevin Beaumont
Kevin Beaumont
@GossiTheDog@cyberplace.social  ·  activity timestamp last week

Notepad++ have today confirmed their auto process was compromised by Chinese nation state threat actors, in a supply chain hack: https://notepad-plus-plus.org/news/hijacked-incident-info-update/

This backs up my blog from late last year, with #GAYINT threat actor mapping to Funky Stamen.

The infrastructure and update mechanisms have since been tightened. For what it’s worth - entry was to telcos and financial services with interests aligned to China. Notepad++ dev did a great job treating issue seriously.

Notepad++ Hijacked by State-Sponsored Hackers | Notepad++

Kevin Beaumont
Kevin Beaumont
@GossiTheDog@cyberplace.social replied  ·  activity timestamp last week

Here’s my original blog with threat hunting suggestions: https://doublepulsar.com/small-numbers-of-notepad-users-reporting-security-woes-371d7a3fd2d9

Of note - the cyber industry entirely slept through it. A cartoon porg with #GAYINT threat intelligence had to blow it up.

Medium

Small numbers of Notepad++ users reporting security woes

Auto updates are fun.
  • Copy link
  • Flag this comment
  • Block
Kevin Beaumont
Kevin Beaumont
@GossiTheDog@cyberplace.social  ·  activity timestamp 2 months ago

I consulted the official #GAYINT threat actor mapping chart and made this diagram for Notepad++ hack attribution

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
Kevin Beaumont
Kevin Beaumont
@GossiTheDog@cyberplace.social replied  ·  activity timestamp last week

Notepad++ have today confirmed their auto process was compromised by Chinese nation state threat actors, in a supply chain hack: https://notepad-plus-plus.org/news/hijacked-incident-info-update/

This backs up my blog from late last year, with #GAYINT threat actor mapping to Funky Stamen.

The infrastructure and update mechanisms have since been tightened. For what it’s worth - entry was to telcos and financial services with interests aligned to China. Notepad++ dev did a great job treating issue seriously.

Notepad++ Hijacked by State-Sponsored Hackers | Notepad++

  • Copy link
  • Flag this comment
  • Block
Cat 🐈🥗 (D.Burch) :paw:⁠:paw: boosted
GAYINT
GAYINT
@gayint@infosec.exchange  ·  activity timestamp last month

Don't forget to put your puppygirls in a quiet room tonight. Fireworks can be loud and scary for them. #GAYINT #FURINT

  • Copy link
  • Flag this post
  • Block
GAYINT
GAYINT
@gayint@infosec.exchange  ·  activity timestamp last month

Don't forget to put your puppygirls in a quiet room tonight. Fireworks can be loud and scary for them. #GAYINT #FURINT

  • Copy link
  • Flag this post
  • Block
Cat 🐈🥗 (D.Burch) :paw:⁠:paw: boosted
GAYINT
GAYINT
@gayint@infosec.exchange  ·  activity timestamp 2 months ago

As you may know, we do our fair amount of bitching here at GAYINT which made it difficult to narrow it down to one thing for a Festivus post. But we did. So let the airing of grievances commence. gayint

https://blog.gayint.org/festivus.html

#GAYINT #FURINT #festivus

GAYINT Blog

Airing of Grievances: CVE-2025-9491

Have some holiday-sanctioned bitching.
  • Copy link
  • Flag this post
  • Block
GAYINT
GAYINT
@gayint@infosec.exchange  ·  activity timestamp 2 months ago

As you may know, we do our fair amount of bitching here at GAYINT which made it difficult to narrow it down to one thing for a Festivus post. But we did. So let the airing of grievances commence. gayint

https://blog.gayint.org/festivus.html

#GAYINT #FURINT #festivus

GAYINT Blog

Airing of Grievances: CVE-2025-9491

Have some holiday-sanctioned bitching.
  • Copy link
  • Flag this post
  • Block
Cat 🐈🥗 (D.Burch) :paw:⁠:paw: boosted
GAYINT
GAYINT
@gayint@infosec.exchange  ·  activity timestamp 2 months ago

@briankrebs

Hi Brian,

I'm reaching out with #GAYINT, INFOSEC's gayest CTI shitpost. We protect companies from AI snakeoilers with next-generation common sense. We have a major announcement CUmming Next Tuesday. I came across your profile and thought you'd be a great fit for a sponsored post supporting the news.

We're happy to start at $0 for a single post.

Our marketing team can provide you a content draft, so all you'll have to do is copy and paste 8bitrainbow

Let me know if you're up for it - we are finalizing our sponsored community soon. We tried reaching around to you on LinkedIn but it said we weren't premium enough to message you there.

Cheers,
gayint

  • Copy link
  • Flag this post
  • Block
GAYINT
GAYINT
@gayint@infosec.exchange  ·  activity timestamp 2 months ago

@briankrebs

Hi Brian,

I'm reaching out with #GAYINT, INFOSEC's gayest CTI shitpost. We protect companies from AI snakeoilers with next-generation common sense. We have a major announcement CUmming Next Tuesday. I came across your profile and thought you'd be a great fit for a sponsored post supporting the news.

We're happy to start at $0 for a single post.

Our marketing team can provide you a content draft, so all you'll have to do is copy and paste 8bitrainbow

Let me know if you're up for it - we are finalizing our sponsored community soon. We tried reaching around to you on LinkedIn but it said we weren't premium enough to message you there.

Cheers,
gayint

  • Copy link
  • Flag this post
  • Block
Kevin Beaumont
Kevin Beaumont
@GossiTheDog@cyberplace.social  ·  activity timestamp 2 months ago

Since making this thread yesterday the infrastructure appears to have gone AWOL and they've nuked the DNS entries on the C2s etc etc. They had access to a bunch of orgs for 5 months, if anybody interested.

Your browser does not support the video tag.
GIF
GIF
Open
GIF
Kevin Beaumont
Kevin Beaumont
@GossiTheDog@cyberplace.social replied  ·  activity timestamp 2 months ago

I consulted the official #GAYINT threat actor mapping chart and made this diagram for Notepad++ hack attribution

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this comment
  • Block
Cat 🐈🥗 (D.Burch) :paw:⁠:paw: and 1 other boosted
cR0w h0 h0
cR0w h0 h0
@cR0w@infosec.exchange  ·  activity timestamp 2 months ago

#GAYINT

Panel one: Child holding his mother's hand and pointing to a picture of the GAYINT logo and asking his mom "Mommy what's GAYINT?"

Panel two: Mother says "Don't look at them, Ricky! I don't want you to be influenced by... OHGODNO"

Panel three: Mother yells "Rickyyy" and the kid looks at her and says "It is too late, mother. I have seen everything." And the kid has a catte face and his vest has the GAYINT icon, a Cascadia flag, a rainbow skull, and a trans-colored Antifa Arrow icon.
Panel one: Child holding his mother's hand and pointing to a picture of the GAYINT logo and asking his mom "Mommy what's GAYINT?" Panel two: Mother says "Don't look at them, Ricky! I don't want you to be influenced by... OHGODNO" Panel three: Mother yells "Rickyyy" and the kid looks at her and says "It is too late, mother. I have seen everything." And the kid has a catte face and his vest has the GAYINT icon, a Cascadia flag, a rainbow skull, and a trans-colored Antifa Arrow icon.
Panel one: Child holding his mother's hand and pointing to a picture of the GAYINT logo and asking his mom "Mommy what's GAYINT?" Panel two: Mother says "Don't look at them, Ricky! I don't want you to be influenced by... OHGODNO" Panel three: Mother yells "Rickyyy" and the kid looks at her and says "It is too late, mother. I have seen everything." And the kid has a catte face and his vest has the GAYINT icon, a Cascadia flag, a rainbow skull, and a trans-colored Antifa Arrow icon.
  • Copy link
  • Flag this post
  • Block
Djoerd Hiemstra 🍉 boosted
GAYINT
GAYINT
@gayint@infosec.exchange  ·  activity timestamp 2 months ago

JavaScript libraries and frameworks are bad and the modern Internet should feel bad.

Edit because I forgot to add gayint

https://blog.gayint.org/react.html

#GAYINT #FURINT

  • Copy link
  • Flag this post
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.2-alpha.23 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct