🔥最近RedLine黑客更新了产品视频,我们来看下他们的攻击手法、常用工具等:1/🧵
🔥The RedLine hackers have recently updated their product videos, so let's take a look at their attack techniques, common tools and more: 1/🧵 @SlowMist_Team@evilcos@wallet_guard
@SlowMist_Team@evilcos@wallet_guard 2/🧵首先他们是Saas服务,Bot恶意机器人的模式,通过下图这样的方式来传播、钓鱼虚拟货币用户:
Firstly they are Saas services, Bot malicious bots in the mode of spreading, phishing virtual currency users by means such as the following.
@SlowMist_Team@evilcos@wallet_guard 3/🧵 教使用者如何通过社交网络、邮件钓鱼,使用什么在线工具绕过杀毒软件查杀、做SEO、投放诱饵
3/🧵 Teach users how to phish through social networks, emails, and what online tools to use to bypass anti-virus software、Doing SEO, placing bait
@SlowMist_Team@evilcos@wallet_guard 4/🧵攻击者是典型俄语使用者,视频用使用俄语、英语双语,电脑操作系统都是俄语。( 图:发送钓鱼邮件)
The attacker is a typical Russian speaker, the video is bilingual in Russian and English and the computer operating system is all in Russian
@SlowMist_Team@evilcos@wallet_guard 5/🧵各种专业的钓鱼、盗窃工具展示、使用,窃取虚拟货币。
Various professional fishing and theft tools on display and in use,Stealing virtual currency.
@SlowMist_Team@evilcos@wallet_guard 6/🧵专业盗窃木马,用户中招木马,木马就扫描本地电脑钱包、密码、私钥等上传到恶意服务器。
Professional theft Trojan, the user is hit by the Trojan and the Trojan scans the local computer for wallets, passwords, private keys, etc. and uploads them to a malicious server.
@SlowMist_Team@evilcos@wallet_guard 7/🧵演示密码、浏览器、加密货币钱包盗窃方式,可以看到使用的hashcat等专业黑客工具
Demonstration of password, browser, and cryptocurrency wallet theft, with the use of professional hacking tools such as hashcat visible
9/🧵而且远不止,包括最火的NFT,他们都有全套诈骗教程:伪造艺术家信息-伪造推特账号-发布作品-诈骗完成。And far more, including the hottest NFT, who have a full tutorial on scams: fake artist info - fake Twitter account - post work - scam complete.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
🧐Lazarus Hacker, i know you can see my X posting, I've caught you on the trail and we'll be posting a related tracking article disclosing the details of this attack. @SlowMist_Team @evilcos
the Lazarus hackers first found the targeted employees through social engineering, added private GitHub repository access to the victims or victimized employees through live chat tools, and tricked the users into running the code that contained the backdoor.
in order to achieve their goal of tricking their victims into running, Lazarus hackers make hundreds or even thousands of dollars in direct payments to their victims in advance...
Just to gain the victim's trust.
1/ Today the FBI identified the North Korean hacker group Lazarus Group and APT38 as the Horizon Bridge attackers, with the hacker group using malware called 'TraderTraitor' to carry out the attack.
1/and laundered over $60 million in stolen Ether through a privacy protocol called Railgun. What are "TraderTraitor" and Railgun? @evilcos
2/ 'TraderTraitor' is Lazarus' malware that targets the cryptocurrency industry and blockchain technology primarily by luring employees of cryptocurrency-related platforms to download it.
2/「TraderTraitor」是Lazarus主要针对加密货币行业和区块链技术进行攻击的恶意软件,主要是诱导加密货币相关的平台员工下载,向加密货币组织中从事 IT 运营、软件创建和系统管理工作的人员发送消息,以提供高薪工作在各种媒体社交平台使用社会工程学投放,支持 macOS 和 Windows 操作系统。