Source Byte – Telegram
Source Byte
7.73K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Source Byte pinned a photo
who is "saeed" and what's it's connection to "Edaalate Ali"


related google account :

ACg8ocJGEs3seqjfj1p5fb0YIof2OjbvMqvpRK6saWzC6Lbpx658Fg
👍8👏31🗿1
i share some anti-Iranian TAs in CTI Sources topic in group , i hope by monitoring their activities we got better understanding of their moments and planning better strategies .


i will update the list as long as i can

planning to add previous IoCs / TTPs etc ....
7👍1🗿1
We observed new Iran linked TA named "IGC ( Iran Cyber Net )" targetting IS Financial & Health sector

They announced they developed new variant of Ransom in their attacks
🔥223
Signature Kid is a header only tool that st.eal.s a signature from a file and copy it to whathever file you want.

Beyond St.ea.ling, Signature Kid goes a step further by Windows Internal to trick the system to treat the copied signature as valid.

https://github.com/dslee2022/SignatureKid
6
Source Byte
تحلیل_فنی_حمله_سایبری_به_بانک_سپه_۲۷_خرداد_۱۴۰۴_1.pdf
it said : "technical analysis"
it's only me that see no "technical" ?
😁6🗿3👍21
This media is not supported in your browser
VIEW IN TELEGRAM
1
Untill now We shared :

[ 00 ] Attack Against Iran’s State Broadcaster (done by Ghyam Sarnegouni TA )

[ 01 ] Indra (گنجشگ درنده) samples related to attacks on Iran Railway Company & some Companies on syria ( related to I.R.G.C )


find them on Samples Topic on Group

Plz share us your IoCs related to current attacks against Iran it will help everyone prepping for Threat Actors as currently we don't have any global CTI
🔥41
sepah bank.png
349.1 KB
According to Israeli sources (who obtained a copy of the AFTA report on the recent Sepah Bank attack by Indra):

[00] The attacker gained access through an old Windows Server 2003 machine used for email services. This server was running MDaemon.

Note: The source stated that the specific mail server was server[.]ictops[.]ir, but we found no public records of this domain. It is likely a local/internal domain used by the bank, which reduces the likelihood that this server was the initial entry point in this attack.

[01] The attacker moved Lateral to other servers (no evidence on how this was done).

[02] They reached the targeted server and deployed their C2 (NjRat) via a PowerShell noscript.

Note : The C2 server was hosted in Canada.

that's all we know :(
i created a chart for better understanding
wish it helps

PDF version :
8😁2👍1🗿1
source :

(i'm not gonna share the channel👀 )
🗿4👾21
Nobitex Breach: Infostealers Expose Critical Employee Credentials in Latest Crypto Exchange Hack

https://www.infostealers.com/article/nobitex-breach-infostealers-expose-critical-employee-credentials-in-latest-crypto-exchange-hack/
3
Source Byte pinned a file
ArvinClub has been active for a while

https://news.1rj.ru/str/arvinclub3

They done cool things
Such as finding BlackReward onion website IP
DDOS on mojahedin khalq
And also not cool things like ransom companies 👀
3👍2