World Watch OCD
banner
ocdworldwatch.bsky.social
World Watch OCD
@ocdworldwatch.bsky.social
🔗 Related IoCs could be found on GitHub:
github.com/cert-orangec...
github.com
September 23, 2025 at 9:38 AM
☣ The main lure deploys a full Python environment and runs a Python script responsible for fetching the next stage from a remote C2. Then it opens a decoy file in Word. C2 are now inactive but have been tied to Pure malware family.
September 23, 2025 at 9:38 AM
✉ The campaigns are initiated from the legitimate noreply[@]appsheet.com address and deliver various payloads, with lures targeting corporate sales, marketing, and legal teams. We advise to hunt for emails from this sender.
September 23, 2025 at 9:38 AM
The new version has removed these notable behaviours and is seen in campaign with fake invoices lures. New indicators of compromise (IoCs) are available on our GitHub: github.com/cert-orangec...
github.com
July 3, 2025 at 7:43 AM
🤖These detection opportunities were presented during the Botconf 2025: www.botconf.eu/wp-content/u...
www.botconf.eu
July 3, 2025 at 7:43 AM
⛪🔎Historically, new MintsLoader JS samples were easy to find because the obfuscation strings consistently used text from a book, Andrew Melville by William Morison.
The associated infrastructure could be tracked thanks to specific patterns and campaign IDs in the C2 URLs: archive.org/details/cu31...
Andrew Melville : Morison, William : Free Download, Borrow, and Streaming : Internet Archive
The metadata below describe the original scanning. Follow the All Files: HTTP link in the View the book box to the left to find XML files that contain more...
archive.org
July 3, 2025 at 7:43 AM
Written in C++, #NailaoLocker is relatively unsophisticated and poorly designed. The ransomware uses the “.locked” extension. It is loaded through DLL search-order hijacking.
February 20, 2025 at 8:16 AM
➡️The full article on the Green Nailao cluster is available here: orangecyberdefense.com/global/blog/...
➡️IOCs and Yara can be found on our GitHub: github.com/cert-orangec...
orangecyberdefense.com
February 20, 2025 at 8:16 AM
We provide a #Yara Rule to hunt for Edam Dropper, as well as related #Iocs and technical details, available on GitHub.
🤝The infection chain was also analyzed by @strikereadylabs.com last week, and could be tied to 🇷🇺 #Sandworm APT (low confidence).

strikeready.com/blog/ru-apt-...
December 5, 2024 at 10:55 AM