Tonight on the subway, the operator announced at each stop that he was the Master of Transportation, and that we were riding the Red Comet, and that's why I'm glad that not everything is automated yet.
I will be supporting the federal #NDP at next elections because I can't forgive #Trudeau over #Gaza#Palestine & can't get over #ForkedTongue on several other issues that are very important to me & many #Canadian#BIPOC voters
I don't even like NDP either but it's them or covert WS dude with a pretty face or full out fascist fuckers. Unlike USA - with no real decent election choices between racist sellouts - we still have some options in #Canada.
White folks & privileged POC folks - you all need to understand that for many of us, in #Canada & #USA - failures by our government to do better is a big #RedLine for us.
Sophos X-Ops is raising the alarm to the #hotel industry, warning that threat actors appear to be using requests or complaints as a lure to convince front-desk workers to infect their own computers with password stealing #malware. 1/
We found that many of the samples were variants of #malware alternately called #Redline Stealer or #Vidar Stealer. They connect to #Telegram to get their #C2 address, then transmit stolen data to it.
Zscaler revisits the Mystic Stealer. Mystic Stealer is an information stealer and downloader that was first advertised in April 2023, which targets nearly 40 web browsers and more than 70 browser extensions. Mystic Stealer has been regularly updated with improvements to its code obfuscation, configuration, and methods of communication. Its C2 communications have been updated from a custom encrypted binary protocol to HTTP. Mystic Stealer has been used by numerous threat groups that leverage it to distribute second-stage malware payloads including RedLine, DarkGate, and GCleaner. Check out the IOC and Appendix. Link:https://www.zscaler.com/blogs/security-research/mystic-stealer-revisited
In this blog entry, we look at how a victim initially received #infostealer payloads from threat actors behind #RedLine/Vidar, and then later received #ransomware payloads via the same delivery method