Calwarez
@calwarez.bsky.social
430 followers 200 following 39 posts
Leads Malicious Infrastructure Discovery @ Recorded Future | Views my own
Posts Media Videos Starter Packs
Reposted by Calwarez
virtualroutes.bsky.social
👋 Don't miss the first Colloquium session tomorrow!

📌 Mythical Beasts and Where to Find Them: Diving into the Depths of the Global Spyware Market
💡 Jen Roberts (@cyberstatecraft.bsky.social) & @julianferdinand.bsky.social (Recorded Future)
🗓️ October 2, 2025
🕓 16:00 – 17:00 CET
Reposted by Calwarez
virusbtn.bsky.social
Recorded Future's Insikt Group reports CopyCop, also tracked as Storm 1516, expanding in 2025, adding at least 200 new fictional media websites targeting the United States, France and Canada and using self-hosted LLMs. www.recordedfuture.com/research/cop...
Reposted by Calwarez
julianferdinand.bsky.social
I'm excited to speak at #VB2025 later this week! I'll be diving into TAG-124, a group whose services are leveraged by a wide range of actors, from cybercriminals to state-sponsored groups. Hit me up if you are in town!

www.virusbulletin.com/conference/v...
Reposted by Calwarez
lawrencesec.bsky.social
The UK has sanctioned Aeza International, citing its involvement in destabilising Ukraine by providing internet services to Russian disinformation campaigns. This follows OFAC sanctions in July. www.gov.uk/government/n...
UK sanctions Georgia-linked supporters of Putin’s illegal war in Ukraine
The UK has announced new sanctions targeting Georgia-linked supporters of Putin’s illegal war in Ukraine.
www.gov.uk
Reposted by Calwarez
julianferdinand.bsky.social
Really excited to present at #LABScon25 on ChamelGang‘s most recent campaign targeting the Taliban, a collaborative research project with @milenkowski.bsky.social (SentinelLABS) and @azaka.fun (TeamT5)! www.labscon.io/speakers/jul...
Reposted by Calwarez
lawrencesec.bsky.social
Great blog post from @briankrebs.infosec.exchange.ap.brid.gy on #StarkIndustries. Makes a great point by highlighting it's links to MIRHosting. Where there are Dutch prefixes under these providers, there is usually always MIRHosting upstream.
briankrebs.infosec.exchange.ap.brid.gy
New, from me:

In May 2025, the European Union levied financial sanctions on the owners of Stark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and quickly became a top source of […]

[Original post on infosec.exchange]
An organization chart published by the news publication correctiv.org shows photos of the Neculiti brothers and their connections to MIRhosting in the Netherlands.
Reposted by Calwarez
virusbtn.bsky.social
Insikt Group identifies a new threat actor, TAG-150, active since at least March 2025. Its multi-layered infrastructure is used to deploy likely self-developed malware families, including CastleLoader, CastleBot, and the newly documented CastleRAT. www.recordedfuture.com/research/fro...
Reposted by Calwarez
campuscodi.risky.biz
Recorded Future has spotted two influence operations around the recent India-Pakistan military conflict from May.

The networks are tracked as networks as Hidden Charkha (pro-India) and Khyber Defender (pro-Pakistan).

www.recordedfuture.com/research/inf...
calwarez.bsky.social
Should be all fixed now :-)
Reposted by Calwarez
lawrencesec.bsky.social
A significant amount of #CastleLoader C2 infrastructure identified by @julianferdinand.bsky.social was tied to #ThreatActivityEnabler 🇬🇧 FEMO IT SOLUTIONS #AS214351 utilising 🇩🇪 aurologic GmbH #AS30823 as their sole upstream provider. One to watch out for!
julianferdinand.bsky.social
2/ TAG-150 is Insikt Group’s designation for the actor likely behind the malware families #CastleLoader, #CastleBot, and most recently #CastleRAT, a RAT documented here for the first time.
calwarez.bsky.social
Another great report from the team on TAG-150, a sophisticated and rapidly evolving threat actor. 🕵️ Our report documents #CastleRAT for the first time, a new Remote Access Trojan, alongside the previously observed #CastleLoader.
calwarez.bsky.social
Thanks for the tip! will get someone to look into it ASAP!
calwarez.bsky.social
This report on Stark Industries is a fantastic case study in the cat-and-mouse game between hosting providers and law enforcement. The new "Threat Activity Enabler" (TAE) terminology is spot-on and highlights the critical role these providers play in the cybercrime ecosystem.
lawrencesec.bsky.social
1/ Today, we published “One Step Ahead: Stark Industries Solutions Preempts EU Sanctions,” revealing how hosting provider #StarkIndustries executed a multi-phase restructuring of its operations, beginning up to a month before #EU sanctions.
calwarez.bsky.social
Highly recommend this report on TAG-144. It breaks down the group's operations into five distinct clusters and reveals some serious tradecraft! From using compromised government emails to hiding payloads in JPGs. A deep dive into a very sophisticated threat.
julianferdinand.bsky.social
1/ We just released a new report on TAG-144 (also known as Blind Eagle), where we identified five distinct activity clusters that have been active throughout 2024 and 2025, primarily targeting the Colombian government at multiple levels. Link to the report: www.recordedfuture.com/research/tag...
TAG-144’s Persistent Grip on South American Organizations
Persistent cyber operations by TAG-144 (Blind Eagle) continue to target South American, primarily Colombian, government entities through advanced spearphishing and RAT-based malware campaigns. Explore...
www.recordedfuture.com
Reposted by Calwarez
julianferdinand.bsky.social
1/ Today, we release a first-of-its-kind analysis of a set of Lumma affiliates within a vast info-stealing ecosystem, showing their interconnectedness and resilience even after a major law enforcement takedown attempts earlier this year: www.recordedfuture.com/research/beh...
Behind the Curtain: How Lumma Affiliates Operate
Explore a groundbreaking investigation into Lumma affiliates: uncover their tools, tactics, scams, and integration in the cybercriminal ecosystem. Essential reading for defenders.
www.recordedfuture.com
Reposted by Calwarez
virusbtn.bsky.social
Recorded Future's Insikt Group has identified new infrastructure associated with Candiru, which includes components likely used in the deployment & C2 of Candiru’s DevilsTongue spyware, as well as higher-tier infrastructure used by the spyware operators. www.recordedfuture.com/research/tra...
calwarez.bsky.social
NoName057(16) is back online and launching new #DDoSia attacks just 6 days after #OperationEastwood. Their new targets? Primarily German and Italian government and municipal websites. Their rapid resurgence highlights their persistence. #Cybersecurity #NoName057
calwarez.bsky.social
10/ Ready to dive deeper into NoName057(16)'s operations? Download the full "Anatomy of DDoSia" report now for data-driven insights, technical analysis, and defensive recommendations! 🔗 www.recordedfuture.com/research/ana... #CybersecurityReport #ThreatAnalysis
www.recordedfuture.com
calwarez.bsky.social
9/ Hacktivist DDoS attacks are a constant in today's hybrid warfare, operating below conventional conflict. Organizations must adapt to this long-term reality in evolving geopolitical landscapes. #HybridWarfare #CyberConflict #Geopolitics
calwarez.bsky.social
8/ Operation Eastwood (July 14-17, 2025) saw international law enforcement target NoName057(16)'s network. Their infrastructure disappeared, but new Tier 1 C2s emerged days later, yet without targeting! Learn more: www.europol.europa.eu/media-press/... #LawEnforcement #CyberDisruption
www.europol.europa.eu
calwarez.bsky.social
7/ Their attack methods have a strong preference for TCP-based floods (SYN, ACK) & HTTP GET floods. Also use "nginx_loris" (slow-loris variant) to exhaust server connections. #DDoSTactics #CyberDefense