mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.8K
active users

#vulnerability

70 posts26 participants1 post today

The Shelby Strategy

The SHELBY malware family exploits GitHub for command-and-control operations, employing sophisticated techniques to evade detection. The malware consists of a loader (SHELBYLOADER) and a backdoor (SHELBYC2), both obfuscated using Obfuscar. SHELBYLOADER employs various sandbox detection methods and uses GitHub for initial registration and key retrieval. SHELBYC2 communicates with the attacker's infrastructure using GitHub API, allowing for file uploads, downloads, and command execution. The campaign targets Iraqi telecommunications and potentially UAE airports, utilizing highly targeted phishing emails. Despite its sophistication, the malware's design has a critical flaw: anyone with the embedded Personal Access Token can control infected machines, exposing a significant security vulnerability.

Pulse ID: 67ebfcac2fcbc0b80399f243
Pulse Link: otx.alienvault.com/pulse/67ebf
Pulse Author: AlienVault
Created: 2025-04-01 14:48:12

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

🚨 March 2025 Vulnerability Report is out! 🚨

The latest Vulnerability Report is now available:
👉 vulnerability-lookup.org/2025/

As always, this report is powered by Vulnerability-Lookup, aggregating data:
📌 User contributions – Comments and bundles created on the platform
📌 Sightings data – Collected through our various sithing tools

A huge thank you to all contributors! 🙌

www.vulnerability-lookup.org · Vulnerability Report - March 2025All vulnerability reports Introduction This vulnerability report has been generated using data aggregated on Vulnerability-Lookup, with contributions from the platform’s community.