Opens profile photo
Follow
Valéry Rieß-Marchive
@ValeryMarchive
Rédac' chef - où je parle (beaucoup) #cybersécurité #SSI #infosec #ransomware - DM ouverts - t.me/vmarchive

Valéry Rieß-Marchive’s Tweets

Previous GandCrab and REvil affiliate & current Conti employee, Alex Sikerin aka Sheriff aka Eng Fog aka Lalartu has claimed responsibility for killing a child. Refs: -bleepingcomputer.com/news/security/ -
Image
Quote Tweet
~2.2kk seized from REvil affiliate, Aleksandr Sikerin aka Alexander Sikerin aka Oleksandr Sikerin documentcloud.org/documents/2112
2
14
24
Show this thread
Everyone, due to recent events and my tweets against Alex Sikerin, aka Lalartu of REvil, I have been threatened multiple times. Alex has messaged me today telling me to apologize. So, get ready for my dox on the Conti site in 6-7 hours :)
16
46
349

Topics to follow

Sign up to get Tweets about the Topics you follow in your Home timeline.

Carousel

#Conti continues their operations, despite chatlog leaks and extensive documentation of their tactics. Our team analyzed the new Linux sample, which targets VMware ESXi servers 👇
Quote Tweet
Just when we thought we were out, they pulled us back in. The Conti leaks saga continues, as we uncover a new #ransomware Linux variant in the aftermath of the “Panama Papers of Ransomware”: go.trellix.com/3OpUiF6
Image
1
9
17
For today, Ivan pushed out some updates on E5 this time for #emotet and even a little spam to test on E4. These 64-bit versions of the emotet loader are very poorly detected at this time so be aware! 👇
Quote Tweet
🚨#Emotet Update🚨 As of approximately 18:45UTC - Ivan laid another egg for us with the 64 bit upgrade of Epoch 5 now. Up until this time, E5 was not active and just sleeping. After this time all existing infections of E5 downloaded a loader update that was 64 bit. 1/x
Show this thread
11
22
Une faille de sécurité critique permettant de créer un ver à propagation automatique a été corrigée dans un protocole d'accès à distance Windows (protocole RPC) ▶️Mettez à jour vos équipements avec les correctifs de sécurité de Microsoft ▶️Consultez l’alerte 👇
Quote Tweet
⚠️Alerte CERT-FR⚠️ CERTFR-2022-ALE-003 : Vulnérabilité dans l’implémentation du protocole RPC par Microsoft (13 avril 2022) cert.ssi.gouv.fr/alerte/CERTFR-
1
102
108
📌Conti responded by promising to leak customer data from a published blog. Conti sub-group is linked to Karakurt, indeed Evolution of Conti crime scheme monetization: BazarLoader➡️Backdoor➡️Cobalt Strike➡️Exiltration ➡️No Locker (no Conti) Deployment➡️KaraKurt Leak Monetization
Image
2
24
85