International Cyber Digest Profile picture
Nov 11 13 tweets 6 min read Read on X
‼️ China's largest cybersecurity firm, Knownsec, was breached, exposing details of China's state cyber operations.

The data includes cyberweapon documentation, internal hacking tool source code, and global target lists covering over 20 countries, including Japan, Vietnam, and India.

A spreadsheet lists 80 hacked foreign organizations, plus evidence of 95 GB of stolen Indian immigration data and 3 TB of call records from South Korean mobile operator LG U Plus.

One of the documents mention a malicious power bank, disguised as a charging device.

Knownsec is key to China's cybersecurity, providing advanced defense and offensive capabilities, including espionage tools.

A thread with their tools 🧵Image
ZoomEye

A global search engine similar to Shodan or Censys, lists vulnerabilities for each host. It claims to scan the entire IPv4 address range in 7-10 days. Image
Windows Trojan / Remote control Image
KRACK attack

An explanation of how to perform a KRACK attack on a device connected to a network. Image
Image
Passive radar

A tool called "Passive Radar," a PCAP analyzer, is used for quick asset mapping tasks, such as those required by military clients. Image
Un-Mail

A tool that claims to break email accounts via XSS. Image
Image
Image
Knownsec also provides tools and services for data collection as can be seen in the slides. Image
Image
Slides also indicate collecting data and mapping critical digital infrastructure of adversarial nations. Image
It's interesting to note the listing of critical Taiwanese edge devices. Reports confirm nation-state actors are attacking these devices. Image
Critical digital infrastructure in India: finance, military, industry, political parties. Image
This screenshot shows where opportunities exist for a company like KnownSec to add value, including internet surveillance, building command centers, providing big data analysis platforms for various departments, or network construction for specific public security bureaus. Image
Building digital command centers for the Ministry of Public Security and how the company supports Public Security in conducting "special investigations" Image
Image
Image

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with International Cyber Digest

International Cyber Digest Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @IntCyberDigest

Oct 22
‼️ When Collins Aerospace shut down its Multi-User System Environment (MUSE), it informed the press and filed with the SEC, claiming a ransomware attack.

This caused major European airports to halt passenger processing, stranding thousands and delaying numerous flights.

Turns out they didn't have to turn off the systems.

The threat actor claims no ransomware or compromise occurred, alleging Collins Aerospace disabled the servers for insurance money.

They admit breaching an FTP server, exfiltrating data over days until access was blocked, and claim to have obtained 1,533,900 passenger records.

Screenshots of conversations between Everest and RTX, Collins Aerospace's parent company, are included in this post and they don't seem to mention any encrypted data.Image
Image
Image
Image
This is the compromised SFTP server. Username: aiscustomer, password: muse-insecure. Insecure indeed. Why store sensitive files like passenger data, SQL, service documentation, and configurations on a publicly accessible, insecure SFTP server? Image
We couldn't fully confirm this story's validity, but it's unclear why the threat actor would strongly oppose ransomware and deny deploying it on Collins Aerospace's systems if untrue. No definitive evidence confirms or refutes its deployment.

It's uncertain why @enisa_eu confirmed the ransomware deployment to Reuters. Did @enisa_eu investigate and confirm the ransomware, or did they relay RTX's statement?

cc @RTX_News @CollinsAero, a lessons-learned session detailing the deployed malware (so we can all learn) would be appreciated. Thanks!Image
Read 4 tweets
Oct 17
🚨 Multiple cybercriminals were arrested during Operation SIMCARTEL.

Europol and Latvian law enforcement dismantled five servers, seized 1,200 SIM box devices and 40,000 active SIM cards.

The criminals were linked to over 1,700 cyber fraud cases in Austria and 1,500 in Latvia, causing losses of several million euros, including EUR 4.5 million in Austria and EUR 420,000 in Latvia.
“Yep, that’s me. You’re probably wondering how I got into this situation …” Image
Image
Image
Image
Image
Read 4 tweets
Oct 8
🚨 Discord Breach Update

- Discord negotiated with the threat actor for two weeks, promising payment.
- Discord then ceased communication.
- The threat actor, now angry, is releasing files individually.

Leaked tables will be posted next. Image
Tables:

id
username
email
verifiedlocation
premium_until
premium_type
pending_deletion
country
phone
mfa_enabled
last_seen Image
cc @discord
Read 5 tweets
Oct 3
🚨 Scattered LAPSUS$ Hunters launched an onion website, listing all victims with a deadline of October 10, 2025.

We've made a thread with screenshots of the victims below 👇 Image
FedEx Image
Toyota Motor Corporation Image
Read 26 tweets
Oct 1
‼️🚨 Red Hat breached: Crimson Collective stole 28k private repositories, including credentials, CI/CD secrets, pipeline configs, VPN profiles, and infrastructure blueprints.

Our analysis of obtained data: 👇 Image
The file tree includes thousands of repositories referencing major banks, telecoms, airlines, and public-sector organizations, such as Citi, Verizon, Siemens, Bosch, JPMC, HSBC, Merrick Bank, Telstra, Telefonica, and even mentions the U.S. Senate...
What's in the file tree dump?

Inventories, hosts, Ansible playbooks, OpenShift install blueprints, CI/CD runners, VPN profiles, Quay/registry configs, Vault integrations, backups, and exported GitHub/GitLab configs.
Read 12 tweets
Sep 26
‼️ Meet the Chinese man who has sold over 6,500 counterfeit licenses to Americans and Canadians, making over $750k. He used more than 83 domains and multiple social media accounts to promote his services. Image
He sent every order very discreetly packaged, going to great lengths to hide the true contents: counterfeit IDs. Image
Image
Image
Image
He has 24/7 chat support and even a video manual on how to unpack the fake IDs. Image
Image
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(