Adrian Anglin
@andranglin.bsky.social
82 followers
21 following
1K posts
Cybersecurity Enthusiast | Cloud & On-Prem Security Operations | Threat Hunting | DFIR
Skilled in threat detection & response, with a drive for ongoing skill growth.
Website: https://rootguard.git
Posts
Media
Videos
Starter Packs
Adrian Anglin
@andranglin.bsky.social
· Jun 7
The Bitter End: Unraveling Eight Years of Espionage Antics—Part One | Proofpoint US
This is a two-part blog series, detailing research undertaken in collaboration with Threatray. Part two of this blog series can be found on their website here. Analyst note: Throughout
www.proofpoint.com
Adrian Anglin
@andranglin.bsky.social
· Jun 7
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
Cisco Talos observed a destructive attack on a critical infrastructure entity within Ukraine, using a previously unknown wiper we are calling “PathWiper.”
blog.talosintelligence.com
Adrian Anglin
@andranglin.bsky.social
· May 28
NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign | Rapid7 Blog
Rapid7 has been tracking a malware campaign that uses fake software installers disguised as popular apps like VPN and QQBrowser—to deliver Winos v4.0, a hard-to-detect malware that runs entirely in me...
www.rapid7.com
Adrian Anglin
@andranglin.bsky.social
· May 28
DarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoIt
A new DarkCloud Stealer campaign is using AutoIt obfuscation for malware delivery. The attack chain involves phishing emails, RAR files and multistage payloads. A new DarkCloud Stealer campaign is usi...
unit42.paloaltonetworks.com
Adrian Anglin
@andranglin.bsky.social
· May 27
Earth Lamia Develops Custom Arsenal to Target Multiple Industries
Trend™ Research has been tracking an active APT threat actor named Earth Lamia, targeting multiple industries in Brazil, India and Southeast Asia countries at least since 2023. The threat actor primar...
www.trendmicro.com
Adrian Anglin
@andranglin.bsky.social
· May 26
Jigsaw RDPuzzle: Piecing Attacker Actions Together
In a recent incident response project, we had the chance to virtually look over the attackers' shoulder and observe their activities. The attackers used the Remote Desktop Protocol (RDP) for lateral m...
insinuator.net
Adrian Anglin
@andranglin.bsky.social
· May 26
One Tool To Rule Them All - Shells.Systems
Estimated Reading Time: 9 minutes AMSI, CLM and ETW – defeated* with one Microsoft signed tool Let’s start with AMSI – everyone loves bypassing AMSI! In recent years, many (not all) antivirus product...
shells.systems
Adrian Anglin
@andranglin.bsky.social
· May 26
Trend Micro™ Managed XDR Analysis of Infection From Fake Installers and Cracks
Our research shows attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data.
www.trendmicro.com