StrikeReady Labs
@strikereadylabs.com
540 followers 1.6K following 310 posts
https://strikeready.com/blog.html Download live malware samples mentioned here: https://github.com/StrikeReady-Inc/samples If you prefer marketing (our product is great!) subscribe to our main page @strikeready.com
Posts Media Videos Starter Packs
strikereadylabs.com
this #dailyphish may look like #apt, but it is actually 419-style scammers
strikereadylabs.com
Thx greg! If any home gamers is looking to test your JS deobfuscation skills on a lazy friday, grab the samples here : github.com/StrikeReady-...
strikereadylabs.com
Quite a bit of CN APT activity in europe in the past week

strikeready.com/blog/cn-apt-...

As always, if you're interested in tuning your skills, download the samples here github.com/StrikeReady-...
CN APT targets Serbian Government
Mustang Panda continues targeting European governments
strikeready.com
strikereadylabs.com
bb491248bb8f6067af39e196b11f4e408a7a3885704cadbd4266db52ae4b03e2
Agenda_Meeting 26 Sep Brussels\.zip #china #apt
e53bc08e60af1a1672a18b242f714486ead62164dda66f32c64ddc11ffe3f0df
c2 racineupci\.org
strikereadylabs.com
Decoy tracking is a great indicator for potentially interesting payloads --- decoys that contain 'defence' or
'nato' related keywords have paid dividends for many years
218ed813d8a4d9d05473338795021c66012cd6c36368561d3aaf831a5c494740
utensils\.zip
cseconline[.]org
strikereadylabs.com
blocking vt via htaccess ... pretty good indicator that you may not be up to any good ....
strikereadylabs.com
interesting use of @vercel.com for today's #dailyphish
mscsharepoint[.]vercel[.]app/?email=[]
strikereadylabs.com
seeing approximately a million of these #dailyphish today
strikereadylabs.com
south asian threat actor continuing to target Nepal, this time by leveraging personas involved in their ongoing civil unrest
apks
playservicess[.]com/Emergency_Help.apk
playservicess[.]com/Gen_Ashok_Sigdel_Live.apk
strikereadylabs.com
interesting #dailyphish .. send them a message talking about a previously sent password protected pdf (that wasn't ever sent), to get the person to reach out and ask for the malicious file
strikereadylabs.com
#apt #ru gamaredon 9a95ba01961c0ae96047c2145978da04899975b1d6eeae6f3b2ccd124ad45bba
2-1180-25_03.06.2025.html
strikereadylabs.com
Fișa de facturare pentru al doilea trimestru.doc
15c9203b107020b0b7b70a04c0268c83
moldova submitters often give interesting threads to pull on...
strikereadylabs.com
new format from our .desktop friends, made famous by ZS researchers

Proposal_Posting_of_Offrs_to_RMC_Mumbai.pdf.desktop
0a671f5849a24aceb605d41dcb607230
strikereadylabs.com
one thing that stuck out was the high number of typos in target domain names in the emails we saw. "orderofimalta" vs "orderofmalta", "mofa.ye[.]org" vs "mofa-ye", etc. either a lot of manual copy/pasta or maybe bad ocr?

also saw .IR targeting which is spiderman.gif, if i understood your attrib
strikereadylabs.com
large trawling campaign against MFAs - specifically reps to Egypt

Online Seminar.FM.gov.om.doc
Online Seminar.MFA.gov.ct.tr.doc
pivot:
DPR for dredging in FreeSpan_16082025.2.doc

c2 screenai[.]online
3ab16bd1c339fd0727be650104b74dd1
1de19958e7c2ef14addfb35b43a594ec
e73ba93d008affdc4cce0cb4e18ae5c6
strikereadylabs.com
Fun to collab with Pham Duy Phuc at Trellix on this research into DPRK's recent embassy phishing campaigns. Although other novel vectors get the headlines, Email is still a major component of most APT groups.
www.trellix.com/blogs/resear...
strikereadylabs.com
A South Asian APT has been persistently targeting Sri Lanka, Bangladesh, Pakistan, and Turkey. This post walks through how to pivot from the well-publicized phishing infrastructure to expose APK tooling that compromised members of the military of Asian countries.

strikeready.com/blog/apt-and...
APT: Android, Phishing, microsoft
A South Asian APT has been persistently targeting Sri Lanka, Bangladesh, Pakistan, and Turkey. This post walks through infrastructure and malware pivots to expose novel tooling that compromised the p...
strikeready.com
strikereadylabs.com
who doesn't love a phish with a <marquee> tag?
dgdppakistan.securecloudfilesdownload[.]com
strikereadylabs.com
Learn to hunt: oddball file extensions + frequency analysis. Today we see an Indian APT leveraging "ProgressReport.jse.xz" to target Sri Lanka, and a Russian APT using "Щодо фактів отримання неправомірної вигоди 2-1273-2025_12.08.2025.HTA.BZ2" to target UKR
github.com/StrikeReady-...
strikereadylabs.com
Something tells me this isn't the real Trusteer
ibmtrusteermobile[.]com/Down/IBMtrusteermobile.apk