Jérôme Segura
@jeromesegura.com
120 followers 89 following 65 posts
Security researcher with a special interest for web threats.
Posts Media Videos Starter Packs
Also, this seems like a small feature but much appreciated:
Reposted by Jérôme Segura
hi.ls
Max Hils @hi.ls · Apr 29
mitmproxy 12 is out! 🚀 It’s now possible to modify the prettified representation of binary protocols. Editing Protobufs is now as easy as editing YAML, no .proto schema needed. 🙌

mitmproxy.org/posts/releas...
Mitmproxy 12: Interactive Contentviews
mitmproxy.org
Reposted by Jérôme Segura
malware-traffic-analysis.net
2025-04-22 (Tuesday): Always fun to find the fake CAPTCHA pages with the "ClickFix" style instructions trying to convince viewers to infect their computers with malware. Saw #StealC from an infection today. Indicators at github.com/malware-traf...
Step 1: Search for bsc-dataseed.binance[.]org on URLscan (urlscan.io).  You can sign up for a URLscan account for free.  The search results should contain pages from legitimate sites that have been compromised for this campaign. Step 2:  Try one of the sites you found on the URLscan search in a web browser.  It should return a fake CAPTCHA page, with a box to check/click.  You have to click the box twice.  It then shows instructions on how to copy and run script that's been injected into the viewer's clipboard.

Note: Make sure you do this in a controlled lab environment on a Windows host specifically used for testing malware.  Don't try this on your regular Windows computer! Step 3: Run the script to infect a Windows host.  To emphasize once again, this should be done in a controlled lab environment.  This image shows network traffic from an infection filtered in Wireshark and it shows C2 traffic from the StealC infection.
Crooks doing quality control the hard way 😂

console.log("!!!WORKING!!!")

#skimming #ecommerce
Reposted by Jérôme Segura
squiblydoo.bsky.social
Fake PuTTy, signed "Eptins Enterprises Llp"

Sets scheduled task "Security Updater" and checks into IP address: 185.196.10.127

Triage: tria.ge/250401-wnbad...

www.virustotal.com/gui/file/7ca...

@jeromesegura.com
Yes!

Alternatively, have you thought about existing OSS that you could fork/contribute to?
If you manage #wordpress sites using #managewp, watch out for this #phishing campaign via #googleads.

-> menagewp[.]com (ad URL and redirect)

-> orion[.]manaqewp[.]com (phishing page)
Scammers are happily abusing multiple platforms at once thanks to lack of controls.

Who's going to protect users here? Google? Facebook?
PayPal’s “no-code checkout” abused by scammers

www.malwarebytes.com/blog/scams/2...

#malvertising #techsupportscams
SecTopRAT bundled in Chrome installer distributed via Google Ads

📖
www.malwarebytes.com/blog/news/20...

⚠️
sites[.]google[.]com/view/gfbtechd/
chrome[.]browser[.]com[.]de/GoogleChrome.exe

#malvertising #SecTopRAT
If you are a developer and use #homebrew, beware of this fraudulent ad on Google.

⚠️
Fake site: brewsh[.]org
Malicious curl command: hxxps[://]raw[.]brewsh[.]org/Homebrew/install/HEAD/install[.]sh
Atomic Stealer (AMOS): www.virustotal.com/gui/file/389...
⚠️

#malvertising #atomicstealer
Malicious Google ad for Virtuals Protocol

⚠️ virtnals[.]com

#malvertising
Malicious Google ad for Aerodrome Finance

⚠️ aeroclrome[.]finance

#malvertising
Malicious Google ad for #Freecad

⚠️
freecad3dmodeling[.]com
freecad3d-download[.]com
hxxps[://]3d-digitals[.]org/downloads/guthub/FreeCAD_Setup_2[.]0[.]74_win_x64[.]zip

#malvertising
‘Fix It’ social-engineering scheme impersonates several brands

www.malwarebytes.com/blog/news/20...
Malicious Google ad for Netflix

⚠️ +1[-]877[-]906[-]4471

#malvertising
Malicious Google ad for onshape 3D

⚠️
onshapeservices[.]com

#malvertising