fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.8K
active users

#malicious

1 post1 participant0 posts today
Pyrzout :vm:<p>How to Spot Malicious AI Agents Before They Strike – Source: www.darkreading.com <a href="https://ciso2ciso.com/how-to-spot-malicious-ai-agents-before-they-strike-source-www-darkreading-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/how-to-spot-mali</span><span class="invisible">cious-ai-agents-before-they-strike-source-www-darkreading-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/DarkReadingSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkReadingSecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/DARKReading" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DARKReading</span></a> <a href="https://social.skynetcloud.site/tags/Malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malicious</span></a></p>
Pyrzout :vm:<p>Malicious Implants Are Coming to AI Components, Applications – Source: www.darkreading.com <a href="https://ciso2ciso.com/malicious-implants-are-coming-to-ai-components-applications-source-www-darkreading-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/malicious-implan</span><span class="invisible">ts-are-coming-to-ai-components-applications-source-www-darkreading-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/DarkReadingSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkReadingSecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/DARKReading" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DARKReading</span></a> <a href="https://social.skynetcloud.site/tags/Malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malicious</span></a></p>
Kyiv Independent Daily Headlines<p><strong>Saturday, July 19, 2025</strong></p> <p>A US general just threatened Russia’s Kaliningrad &amp; this is why that’s so significant — Ukrainian hackers wipe databases at Russia’s Gazprom in major cyberattack — Ukrainian forces ‘steadfastly’ holding defenses near Pokrovsk — Ukrainian artist’s Sculpture series normalizes injured bodies of Ukraine’s soldiers … and more</p> <p><a href="https://activitypub.writeworks.uk/2025/07/saturday-july-19-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">activitypub.writeworks.uk/2025</span><span class="invisible">/07/saturday-july-19-2025/</span></a></p>
Bo Flecks<p>Millions of people spied on by malicious browser extensions in <a href="https://social.vivaldi.net/tags/Chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Chrome</span></a> and <a href="https://social.vivaldi.net/tags/Edge" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Edge</span></a> | Malwarebytes<br>"...when an <a href="https://social.vivaldi.net/tags/extension" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>extension</span></a> has been available in the web store for a while, <a href="https://social.vivaldi.net/tags/cybercriminals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercriminals</span></a> can insert <a href="https://social.vivaldi.net/tags/malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious</span></a> code through updates to the extension. Some researchers refer to the clean extensions as “sleeper agents.” </p><p><a href="https://www.malwarebytes.com/blog/news/2025/07/millions-of-people-spied-on-by-malicious-browser-extensions-in-chrome-and-edge" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malwarebytes.com/blog/news/202</span><span class="invisible">5/07/millions-of-people-spied-on-by-malicious-browser-extensions-in-chrome-and-edge</span></a></p>
ANY.RUN<p>🚨 Fake 7-Zip installer exfiltrates Active Directory files.<br>A <a href="https://infosec.exchange/tags/malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious</span></a> installer disguised as 7-Zip steals critical Active Directory files, including ntds.dit and the SYSTEM hive, by leveraging shadow copies and exfiltrating the data to a remote server.<br>🥷 Upon execution, the <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> creates a shadow copy of the system drive to bypass file locks and extract protected files without disrupting system operations. </p><p>🎯 It then copies ntds.dit, which contains Active Directory user and group data, and SYSTEM, which holds the corresponding encryption keys. </p><p>The malware connects to a remote server via SMB using hardcoded credentials. All output is redirected to NUL to minimize traces. </p><p>👨‍💻 <a href="https://infosec.exchange/tags/ANYRUN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ANYRUN</span></a> Sandbox makes it easy to detect these stealthy operations by providing full behavioral visibility, from network exfiltration to credential staging, within a single interactive session. <br>🔍 See analysis session: <a href="https://app.any.run/tasks/7f03cd5b-ad02-4b3a-871f-c31ac0f5dc15/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=fake_7zip&amp;utm_term=090725&amp;utm_content=linktoservice" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">app.any.run/tasks/7f03cd5b-ad0</span><span class="invisible">2-4b3a-871f-c31ac0f5dc15/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=fake_7zip&amp;utm_term=090725&amp;utm_content=linktoservice</span></a></p><p>This technique grants the attacker full access to ntds.dit dump, allowing them to extract credentials for Active Directory objects and enables lateral movement techniques such as Pass-the-Hash or Golden Ticket. </p><p>🚀 Analyze and investigate the latest malware and <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> threats with <a href="https://infosec.exchange/tags/ANYRUN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ANYRUN</span></a>.<br><a href="https://infosec.exchange/tags/ExploreWithANYRUN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExploreWithANYRUN</span></a></p>
Hacker News<p>Helm local code execution via a malicious chart – CVE-2025-53547</p><p><a href="https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/helm/helm/security/</span><span class="invisible">advisories/GHSA-557j-xg8c-q2mm</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/Helm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Helm</span></a> <a href="https://mastodon.social/tags/local" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>local</span></a> <a href="https://mastodon.social/tags/code" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>code</span></a> <a href="https://mastodon.social/tags/execution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>execution</span></a> <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>-2025-53547 <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious</span></a> <a href="https://mastodon.social/tags/chart" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chart</span></a></p>
Nando161<p>Anya <a href="https://partyon.xyz/tags/evidence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>evidence</span></a> against <a href="https://partyon.xyz/tags/boss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>boss</span></a> - <a href="https://partyon.xyz/tags/malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious</span></a> <a href="https://partyon.xyz/tags/compliance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>compliance</span></a> - become <a href="https://partyon.xyz/tags/indispensable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>indispensable</span></a> but <a href="https://partyon.xyz/tags/annoying" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>annoying</span></a> - <a href="https://partyon.xyz/tags/revenge" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>revenge</span></a> - <a href="https://partyon.xyz/tags/steal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>steal</span></a> <a href="https://partyon.xyz/tags/office" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>office</span></a> <a href="https://partyon.xyz/tags/supplies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>supplies</span></a> <br><a href="https://t.me/Fallsac/55928" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">t.me/Fallsac/55928</span><span class="invisible"></span></a></p>
サファイア・ネオ<p>Renunciation of property inheritance<br>As some of you may already know, vacant houses have become a social problem in Japan.</p><p><a href="https://www.pixiv.net/novel/show.php?id=23844384" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pixiv.net/novel/show.php?id=23</span><span class="invisible">844384</span></a></p><p>&lt;&gt;</p><p><a href="https://mastodon.social/tags/renunciation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>renunciation</span></a> <a href="https://mastodon.social/tags/property" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>property</span></a> <a href="https://mastodon.social/tags/inheritance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>inheritance</span></a> <a href="https://mastodon.social/tags/already" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>already</span></a> <a href="https://mastodon.social/tags/vacant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vacant</span></a> <a href="https://mastodon.social/tags/house" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>house</span></a> <a href="https://mastodon.social/tags/problem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>problem</span></a> <a href="https://mastodon.social/tags/Japan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Japan</span></a> <a href="https://mastodon.social/tags/abandoned" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>abandoned</span></a> <a href="https://mastodon.social/tags/across" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>across</span></a> <a href="https://mastodon.social/tags/country" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>country</span></a> <a href="https://mastodon.social/tags/unattended" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unattended</span></a> <a href="https://mastodon.social/tags/dangerous" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dangerous</span></a> <a href="https://mastodon.social/tags/demolished" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>demolished</span></a> <a href="https://mastodon.social/tags/responsibly" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>responsibly</span></a> <a href="https://mastodon.social/tags/situation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>situation</span></a> <a href="https://mastodon.social/tags/cases" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cases</span></a> <a href="https://mastodon.social/tags/people" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>people</span></a> <a href="https://mastodon.social/tags/excuses" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>excuses</span></a> <a href="https://mastodon.social/tags/enter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enter</span></a> <a href="https://mastodon.social/tags/permission" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>permission</span></a> <a href="https://mastodon.social/tags/ridiculous" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ridiculous</span></a> <a href="https://mastodon.social/tags/stories" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stories</span></a> <a href="https://mastodon.social/tags/ownership" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ownership</span></a> <a href="https://mastodon.social/tags/malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious</span></a> <a href="https://mastodon.social/tags/family" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>family</span></a> <a href="https://mastodon.social/tags/upervisory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>upervisory</span></a></p>
Pyrzout :vm:<p>Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets – Source:thehackernews.com <a href="https://ciso2ciso.com/over-40-malicious-firefox-extensions-target-cryptocurrency-wallets-stealing-user-assets-sourcethehackernews-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/over-40-maliciou</span><span class="invisible">s-firefox-extensions-target-cryptocurrency-wallets-stealing-user-assets-sourcethehackernews-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/TheHackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheHackerNews</span></a> <a href="https://social.skynetcloud.site/tags/Malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malicious</span></a></p>
ANY.RUN<p>🚨 Top 5 Remote Access Tools Exploited by Threat Actors in the First Half of 2025. <br>⚠️ While legitimate and widely used by IT teams, Remote Monitoring and Management tools are increasingly used by threat actors to establish persistence, bypass defenses, and exfiltrate data. </p><p>In the first half of 2025, <a href="https://infosec.exchange/tags/ANYRUN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ANYRUN</span></a> observed a significant number of <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> samples leveraging known RMM software for <a href="https://infosec.exchange/tags/malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious</span></a> access. Here are the 5 most frequently abused tools, along with analysis examples: <br>1️⃣ ScreenConnect – 3,829 sandbox sessions <br><a href="https://app.any.run/tasks/3aa42d2e-8b91-4b8c-8bbb-e2b733194294/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=top_rmm&amp;utm_term=020725&amp;utm_content=linktoservice" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">app.any.run/tasks/3aa42d2e-8b9</span><span class="invisible">1-4b8c-8bbb-e2b733194294/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=top_rmm&amp;utm_term=020725&amp;utm_content=linktoservice</span></a> </p><p>2️⃣ UltraVNC – 2,117 sandbox sessions<br><a href="https://app.any.run/tasks/1b7234a0-ab11-4301-a5e7-9e157acfad95/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=top_rmm&amp;utm_term=020725&amp;utm_content=linktoservice" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">app.any.run/tasks/1b7234a0-ab1</span><span class="invisible">1-4301-a5e7-9e157acfad95/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=top_rmm&amp;utm_term=020725&amp;utm_content=linktoservice</span></a> </p><p>3️⃣ NetSupport – 746 sandbox sessions<br><a href="https://app.any.run/tasks/6740b646-2763-4969-9afe-31104dff0d81/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=top_rmm&amp;utm_term=020725&amp;utm_content=linktoservice" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">app.any.run/tasks/6740b646-276</span><span class="invisible">3-4969-9afe-31104dff0d81/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=top_rmm&amp;utm_term=020725&amp;utm_content=linktoservice</span></a> </p><p>4️⃣ PDQ Connect – 230 sandbox sessions<br><a href="https://app.any.run/tasks/05948d1c-3128-4daa-97e5-60dd9991c115/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=top_rmm&amp;utm_term=020725&amp;utm_content=linktoservice" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">app.any.run/tasks/05948d1c-312</span><span class="invisible">8-4daa-97e5-60dd9991c115/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=top_rmm&amp;utm_term=020725&amp;utm_content=linktoservice</span></a> </p><p>5️⃣ Atera – 171 sandbox sessions<br><a href="https://app.any.run/tasks/61e01084-e442-4bb7-a725-1667128573ce/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=top_rmm&amp;utm_term=020725&amp;utm_content=linktoservice" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">app.any.run/tasks/61e01084-e44</span><span class="invisible">2-4bb7-a725-1667128573ce/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=top_rmm&amp;utm_term=020725&amp;utm_content=linktoservice</span></a> </p><p>👨‍💻 To support faster detection and investigation, we’ve added the rmm-tool tag in TI Lookup, making it easier for threat hunters and incident responders to track RMM-based intrusions. </p><p>🔍 Explore recent RMM abuse cases in the last 180 days:<br><a href="https://intelligence.any.run/analysis/lookup?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=top_rmm&amp;utm_content=linktoti&amp;utm_term=020725#%7B%2522query%2522:%2522threatName:%255C%2522rmm-tool%255C%2522%2522,%2522dateRange%2522:180%7D%20" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">intelligence.any.run/analysis/</span><span class="invisible">lookup?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=top_rmm&amp;utm_content=linktoti&amp;utm_term=020725#%7B%2522query%2522:%2522threatName:%255C%2522rmm-tool%255C%2522%2522,%2522dateRange%2522:180%7D%20</span></a> </p><p>Analyze latest malware and <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> threats with <a href="https://infosec.exchange/tags/ANYRUN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ANYRUN</span></a> 🚀 <a href="https://infosec.exchange/tags/ExploreWithANYRUN" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ExploreWithANYRUN</span></a></p>
Dendrobatus Azureus<p><a href="https://mastodon.bsd.cafe/@Dendrobatus_Azureus/114760984740433610" rel="nofollow noopener" target="_blank">https://mastodon.bsd.cafe/@Dendrobatus_Azureus/114760984740433610</a><br><br><a href="https://polymaths.social/tags/wtf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WTF</span></a> <a href="https://polymaths.social/tags/gsm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GSM</span></a> <a href="https://polymaths.social/tags/4g" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>4G</span></a> <a href="https://polymaths.social/tags/lte" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LTE</span></a> <a href="https://polymaths.social/tags/5g" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>5G</span></a> <a href="https://polymaths.social/tags/isp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISP</span></a> <a href="https://polymaths.social/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://polymaths.social/tags/malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious</span></a> <a href="https://polymaths.social/tags/dos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DOS</span></a></p>
Dendrobatus Azureus<p>As you can see this mobile provider is now running at the good 4G+ speed. It was quite low in the evening before, probably due to the fact that they have too many clients that are allowed to log in per Cell Tower </p><p><a href="https://mastodon.bsd.cafe/tags/WTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WTF</span></a> <a href="https://mastodon.bsd.cafe/tags/GSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GSM</span></a> <a href="https://mastodon.bsd.cafe/tags/4G" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>4G</span></a> <a href="https://mastodon.bsd.cafe/tags/LTE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LTE</span></a> <a href="https://mastodon.bsd.cafe/tags/5G" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>5G</span></a> <a href="https://mastodon.bsd.cafe/tags/ISP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISP</span></a> <a href="https://mastodon.bsd.cafe/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://mastodon.bsd.cafe/tags/malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious</span></a> <a href="https://mastodon.bsd.cafe/tags/DOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DOS</span></a></p>
Dendrobatus Azureus<p>I first need to refresh your memory with this post linked below</p><p>I have continued to research why one of my mobile data providers behaves in such a horrific manner where, even though nowhere in the table of service it has been written that a SIM card may not be used in a stationary or mobile Gateway or router, they still do a very very client on friendly denial of service where you are prohibited to use your sim card to consume the data in anything else than a phone which gets horrifically hot when it has to serve three to five different clients</p><p><strong>The mobile provider is bleeding clients to the competition.</strong></p><p>That is strange because this mobile provider does not only give 4G Plus but also 5G in selected areas of the city<br>They also give 100% more bandwidth per dollar than the competition.</p><p>The reason why they still bleed clients is manifest, when you see the denial of service, and when you take into account the <em>brutal manner</em> in which clients are processed who have both technical and financial problems regarding payment processing, in the sense of the latter that they <strong>want to pay</strong> the provider which also is a provider of obsolete xDSL technology, but there are horrific problems when it comes down to their accounting system, which refuses to accept payment due to heavy database errors introduced on their part, when they tried to change the stable accounting system, which has been running for more than two and a half decades.</p><p>The Denial Of Service, is stop gap measure because they want you to buy there low quality mobile router, which they want to tie into a SIM card, that <em>is allowed</em> to be used in that useless router, so that the provider can make money, on both selling you the router and selling you an extra SIM card and tying you into the system in the process.</p><p>It is quite clear that people would rather pay more money for bandwidth, to have the mobility and the freedom to use whatever advanced mobile Wi-Fi router they want.</p><p>The competition also gives you, on a regular basis, the possibility to buy bandwidth for <em>half the price</em><br>I'm speaking to you using such a package which gave me a number of days of bandwidth for 50% less.<br>De competition also has a lack off sustained high speeds. They often drop quite low on upload speed, which can only be corrected when you reboot your portable 4G+ 5G Wi-Fi routing device</p><p>Conclusion:<br>Denial of service from the mobile provider is because they bleed clients.<br>Competition is good; in the end the client can choose where they want to go even when there is significant enshittification</p><p>Note:<br>There are technical reasons on the server side {not errors} why I do not include any graphics from this account</p><p><a href="https://mastodon.bsd.cafe/@Dendrobatus_Azureus/114685559663478068" rel="nofollow noopener" target="_blank">https://mastodon.bsd.cafe/@Dendrobatus_Azureus/114685559663478068</a></p><p><a href="https://polymaths.social/tags/wtf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WTF</span></a> <a href="https://polymaths.social/tags/gsm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GSM</span></a> <a href="https://polymaths.social/tags/4g" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>4G</span></a> <a href="https://polymaths.social/tags/lte" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LTE</span></a> <a href="https://polymaths.social/tags/5g" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>5G</span></a> <a href="https://polymaths.social/tags/isp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ISP</span></a> <a href="https://polymaths.social/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://polymaths.social/tags/malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious</span></a> <a href="https://polymaths.social/tags/dos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DOS</span></a></p>
Zzyzx/P<p>I am really mad at everyone who voted for this <a href="https://mastodon.social/tags/egotistical" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>egotistical</span></a> <a href="https://mastodon.social/tags/idiot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>idiot</span></a>. Yes, I know, that probably means many of my neighbors and most of my state. But there's a limit to tolerating <a href="https://mastodon.social/tags/destructive" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>destructive</span></a> and <a href="https://mastodon.social/tags/malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious</span></a> behavior. </p><p><a href="https://mastodon.social/tags/economy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>economy</span></a> <a href="https://mastodon.social/tags/federalreserve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>federalreserve</span></a> <a href="https://mastodon.social/tags/USPolitics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USPolitics</span></a> <a href="https://mastodon.social/tags/government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>government</span></a> <a href="https://mastodon.social/tags/impeach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>impeach</span></a> </p><p><a href="https://www.bbc.com/news/articles/cjrlyve8dq8o" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bbc.com/news/articles/cjrlyve8</span><span class="invisible">dq8o</span></a></p>
Hacker News<p>VSCan - Detect Malicious VSCode Extensions</p><p><a href="https://vscan.dev/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">vscan.dev/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/VSCan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VSCan</span></a> <a href="https://mastodon.social/tags/Malicious" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malicious</span></a> <a href="https://mastodon.social/tags/Extensions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Extensions</span></a> <a href="https://mastodon.social/tags/VSCode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VSCode</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Developer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Developer</span></a> <a href="https://mastodon.social/tags/Tools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tools</span></a></p>

Via #LLRX - @psuPete Recommends – Weekly highlights on cyber security issues, June 15, 2025. llrx.com/2025/06/pete-recommen
Four highlights from this week: Protect Yourself #Online; Study: #OpenAI Has Been #Breached More Than 1000 Times; #Feds warn: Hang up on #phone #scammers pretending to be #borderpatrol agents; and #Cybercriminals Are Hiding #Malicious #Web Traffic in Plain Sight. #cybercrime #cybersecurity #breaches #internet #malicious

Replied in thread

@alexgreen @Timpostma

The only access I have to the WiFi router is that from an end user point of view.

I will first need to get command line access to it, or a Android tool, before I can change the TTL

I'm glad that there is a fix available.

The fact that you're able to use 25 GB instead of 5 GB by manipulating your TTL is quite incredible!

Now some detailed questions how did you change the TTL? Which brand device are you using?
Is there a tool somewhere in the open source world where I can change the TTL of my Android WiFi device?

I've read your tooth again
Your Franklin device is rooted and does have command Line Access

I have to note immediately that the 4G ISP in question, does not care that you hotspot your connection. I've hotspotted the phone in the afternoon to get the links browser for my live MX Linux distribution on an old notebook, without a boot device.

In fact I'm hot spotting the connection right now with two other devices

for some strange reason they just don't want the packets to get distributed through a mobile Wi-Fi router

#WTF#GSM#4G
Replied in thread

@Timpostma

I shall do the following. Get me some bandwidth 4G+ bandwith, from the other provider

Never ever get bandwith from this provider again when I want to use it on mobile WiFi router.

The reason for the stipulation is that their Network can reach 40 GB per second on 4G Plus. You're the provider gives you more bandwidth but they don't reach those speeds at all

#WTF#GSM#4G