Home
tufan.
Cancel

Spynote Android Malware Masquerades as VPN Amid Turkey's Instagram Ban

Hunting for Real-Life Example On August 2, 2024, Instagram was blocked in Turkey following a disagreement over content moderation. Immediately, users sought alternative methods to regain access,...

Hunt and Analysis - Nightingale Stealer

Part 1 - Nightingale Stealer Spoiler Alert: If you are familiar with Phemedrone Stealer, be prepared for a revelation. Nightingale Stealer, as it turns out, is essentially an edited version of Phe...

Hunt and Analysis - Hornet Stealer

Part 1 - Hornet Stealer On January 24th, the Twitter account @spamhaus posted a tweet regarding a newly discovered C2 panel. Based on the panel’s logo and name, they have identified this malwar...

Hunt and Analysis - Sentinel Stealer

Part 1 - Sentinel Stealer || Stealer as a Service On January 19th, the Twitter account @FalconFeedsio reported the discovery of a new stealer, known as Sentinel Stealer. Although there were earlie...

Hunt and Analysis - Neptune Loader

Part 1 - Neptune || A Native HTTP Loader A user named m0hx shared a post on hackforums.net on November 22, 2023, promoting a loader called Neptune. In the threat actor’s exact words; “Neptune is ...

Hunt and Analysis - Serpent Stealer

Part 1 - Dissecting the First Serpent Stealer Sample On October 15, 2023, a new malware named Serpent Stealer was showcased on Breach Forums by a user named stealth. This malware, categorized as a...

Calling Conventions for Reverse Engineering

What is Calling Convention ? The term “calling convention” describes; how arguments passed to the function and how values are returned from functions, whether the caller or the callee will c...