Lawrence S.
@lawrencesec.bsky.social
63 followers 180 following 31 posts
🇬🇧 Threat Research @ Recorded Future. I Like Tracking ASNs and ISPs for some reason...
Posts Media Videos Starter Packs
Pinned
lawrencesec.bsky.social
1/ Today, we published “One Step Ahead: Stark Industries Solutions Preempts EU Sanctions,” revealing how hosting provider #StarkIndustries executed a multi-phase restructuring of its operations, beginning up to a month before #EU sanctions.
Reposted by Lawrence S.
virtualroutes.bsky.social
👋 Don't miss the first Colloquium session tomorrow!

📌 Mythical Beasts and Where to Find Them: Diving into the Depths of the Global Spyware Market
💡 Jen Roberts (@cyberstatecraft.bsky.social) & @julianferdinand.bsky.social (Recorded Future)
🗓️ October 2, 2025
🕓 16:00 – 17:00 CET
Reposted by Lawrence S.
Reposted by Lawrence S.
tprophet.org
1/ Hi, I'm TProphet. I write the Telecom Informer for @2600.com. A lot of people have been asking me about www.nbcnews.com/politics/nat... given that I'm somewhat knowledgeable in the area.

Here's my take: I'm kind of astonished that this is public, and it isn't normal that it would ever be.
Secret Service agents dismantle network that could shut down New York cellphone system
Agents discovered electronic devices in five locations in and around the city that could be used to disable cellphone towers. The system could also be used for criminal activities.
www.nbcnews.com
Reposted by Lawrence S.
campuscodi.risky.biz
-US raids SIM farm in New York
-EU airport disruptions caused by ransomware
-Thieves steal gold from French museum after cyberattack
-SonicWall firmware update removes rootkit
-Jaguar ransomware incident extends to October

Podcast: risky.biz/RBNEWS482/
Newsletter: news.risky.biz/risky-bullet...
lawrencesec.bsky.social
The UK has sanctioned Aeza International, citing its involvement in destabilising Ukraine by providing internet services to Russian disinformation campaigns. This follows OFAC sanctions in July. www.gov.uk/government/n...
UK sanctions Georgia-linked supporters of Putin’s illegal war in Ukraine
The UK has announced new sanctions targeting Georgia-linked supporters of Putin’s illegal war in Ukraine.
www.gov.uk
Reposted by Lawrence S.
julianferdinand.bsky.social
I'm excited to speak at #VB2025 later this week! I'll be diving into TAG-124, a group whose services are leveraged by a wide range of actors, from cybercriminals to state-sponsored groups. Hit me up if you are in town!

www.virusbulletin.com/conference/v...
Reposted by Lawrence S.
virusbtn.bsky.social
Recorded Future's Insikt Group reports CopyCop, also tracked as Storm 1516, expanding in 2025, adding at least 200 new fictional media websites targeting the United States, France and Canada and using self-hosted LLMs. www.recordedfuture.com/research/cop...
Reposted by Lawrence S.
julianferdinand.bsky.social
Really excited to present at #LABScon25 on ChamelGang‘s most recent campaign targeting the Taliban, a collaborative research project with @milenkowski.bsky.social (SentinelLABS) and @azaka.fun (TeamT5)! www.labscon.io/speakers/jul...
lawrencesec.bsky.social
Great blog post from @briankrebs.infosec.exchange.ap.brid.gy on #StarkIndustries. Makes a great point by highlighting it's links to MIRHosting. Where there are Dutch prefixes under these providers, there is usually always MIRHosting upstream.
briankrebs.infosec.exchange.ap.brid.gy
New, from me:

In May 2025, the European Union levied financial sanctions on the owners of Stark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and quickly became a top source of […]

[Original post on infosec.exchange]
An organization chart published by the news publication correctiv.org shows photos of the Neculiti brothers and their connections to MIRhosting in the Netherlands.
Reposted by Lawrence S.
lawrencesec.bsky.social
A significant amount of #CastleLoader C2 infrastructure identified by @julianferdinand.bsky.social was tied to #ThreatActivityEnabler 🇬🇧 FEMO IT SOLUTIONS #AS214351 utilising 🇩🇪 aurologic GmbH #AS30823 as their sole upstream provider. One to watch out for!
julianferdinand.bsky.social
2/ TAG-150 is Insikt Group’s designation for the actor likely behind the malware families #CastleLoader, #CastleBot, and most recently #CastleRAT, a RAT documented here for the first time.
lawrencesec.bsky.social
Another ASN spun up by #StarkIndustries to monitor #AS213999 , only announcing a single prefix so far! 77[.]221[.]150[.]0/24
Reposted by Lawrence S.
780thmibdecyber.bsky.social
Infosecurity Magazine: The majority (53%) of attributed vulnerability exploits in the first half 2025 were conducted by state-sponsored actors for strategic, geopolitical purposes, according to a new report by Recorded Future’s Insikt Group. www.infosecurity-magazine.com/news/state-h...
State-Sponsored Hackers Behind Majority of Vulnerability Exploits
Recorded Future highlighted the vast capabilities of state actors to rapidly weaponize newly disclosed vulnerabilities for geopolitical purposes
www.infosecurity-magazine.com
Reposted by Lawrence S.
campuscodi.risky.biz
-Instacart fraud ring charged
-VerifTools seized
-US sanctions DPRK remote IT worker network
-Purgatory group behind US swattings
-Storm-0501 steals/extorts cloud data
-Stark Industries rebrands
-ShadowSilk APT has Russian and Chinese operators
-Backdoored text editor targets Chinese dissidents
Reposted by Lawrence S.
alexmartin.bsky.social
🇳🇱🇨🇳💻🕵️

New: The Netherlands announced on Thursday that it had been targeted by a Chinese cyber-espionage campaign tracked as Salt Typhoon and RedMike that has been compromising critical infrastructure globally.
Dutch intelligence agencies report country was targeted by Chinese cyber spies
The Netherlands announced on Thursday that it was targeted by a Chinese cyber-espionage campaign tracked as Salt Typhoon and RedMike that has been compromising critical infrastructure globally.
therecord.media
Reposted by Lawrence S.
bellingcat.com
Academic or student in the USA? Our research techniques can be useful in assessing fake news. We're helping students to investigate and better understand the anti-democratic online ideologies that threaten their communities with two free webinars on digital investigation skills this September 🧵
Reposted by Lawrence S.
zackwhittaker.com
NEW: Credit reporting giant TransUnion has confirmed a data breach involving more than 4.4 million customers' personal information. TransUnion claims "no credit information was accessed" in the late-July breach, which it said involves its U.S. consumer support operations.
TransUnion says hackers stole 4.4 million customers' personal information | TechCrunch
The credit reporting giant confirmed unauthorized access to a third-party application storing the personal information of its customers.
techcrunch.com
lawrencesec.bsky.social
Already seeing some updates in RIPE in response to our report.... 👀 #StarkIndustries #AS44477 #ThreatActivityEnabler