Dropping new research - this time on recent #XDSpy operations. Out of hundreds of LNK files leveraging ZDI-CAN-25373, we isolated a tiny cluster using an additional LNK parsing trick, leading us to uncover a multi-stage infection chain actively targeting government entities
Through hunting and pivoting, we identified the likely payload: XDigo, XDSpy's Go based malware deployed against a governmental target in Belarus. We also mapped additional infrastructure showing multiple connections and ties across past campaigns
Our analysis covers the LNK parsing vulnerabilities, detailed XDigo malware analysis, comprehensive infrastructure overview, and attribution linking current activity to historical XDSpy activities including a previously unattributed 2023 operation
Some context on #WeRedEvils, an Israeli hacktivist group that recently made headlines by disrupting Tehran's power supply: 🧵 (1/8)
#WeRedEvils, led by an individual known as 'Vlad,' boasts a diverse background. Vlad specialised in disrupting gambling, betting, and drugs services who reportedly defrauded people of their money, by crippling their online and social media presence. (2/8)
After a brief hiatus, Vlad resurfaced in May 2023, showcasing his capabilities in taking down several massive (1M+) online channels. Often, these actions were prompted by complaints from individuals reaching out to Vlad after falling victims to scams. (3/8)