Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

# ![@Threatlabz Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::775449576476057601.png) @Threatlabz Zscaler ThreatLabz

Zscaler ThreatLabz posts on X about $zs, microsoft, vulnerability, $googl the most. They currently have XXXXX followers and X posts still getting attention that total XXXXX engagements in the last XX hours.

### Engagements: XXXXX [#](/creator/twitter::775449576476057601/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::775449576476057601/c:line/m:interactions.svg)

- X Week XXXXX +487%
- X Month XXXXXX +21,523%
- X Months XXXXXXX +702%
- X Year XXXXXXX +29%

### Mentions: X [#](/creator/twitter::775449576476057601/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::775449576476057601/c:line/m:posts_active.svg)

- X Months XX +45%
- X Year XX +93%

### Followers: XXXXX [#](/creator/twitter::775449576476057601/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::775449576476057601/c:line/m:followers.svg)

- X Week XXXXX +0.51%
- X Month XXXXX +5%
- X Months XXXXX +15%
- X Year XXXXX +26%

### CreatorRank: XXXXXXXXX [#](/creator/twitter::775449576476057601/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::775449576476057601/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[stocks](/list/stocks)  XX% [technology brands](/list/technology-brands)  XX%

**Social topic influence**
[$zs](/topic/$zs) #3, [microsoft](/topic/microsoft) 20%, [vulnerability](/topic/vulnerability) 20%, [$googl](/topic/$googl) 20%, [android](/topic/android) XX%

**Top assets mentioned**
[Zscaler Inc (ZS)](/topic/$zs) [Microsoft Corp. (MSFT)](/topic/microsoft) [Alphabet Inc Class A (GOOGL)](/topic/$googl)
### Top Social Posts
Top posts by engagements in the last XX hours

"Zscaler ThreatLabz has discovered CVE-2025-50165 in the Microsoft Windows Graphics Component. With a CVSS score of XXX this vulnerability enables attackers to execute arbitrary code using a specially crafted JPEG image that can be triggered by any application that leverages the Windows Graphics library such as Microsoft Office documents. It is critical that Windows users update applications and install the patched versions in a timely manner. Read the full analysis here:"  
[X Link](https://x.com/Threatlabz/status/1991534221366907269)  2025-11-20T15:48Z 7899 followers, 74.1K engagements


"Zscaler ThreatLabz has published a technical analysis of Matanbuchus version XXX and has observed recent deployments consistent with hands-on-keyboard ransomware operations. This new version of Matanbuchus implements a number of obfuscation techniques to evade detection such as junk code encrypted strings and resolving Windows API functions by hash. Network communication occurs via HTTPS with Protocol Buffers that are encrypted with ChaCha20. Read our entire analysis here:"  
[X Link](https://x.com/Threatlabz/status/1995877218556449230)  2025-12-02T15:26Z 7900 followers, 9907 engagements


"⚠ThreatLabz has identified another malicious Android app in the Google Play Store that is still currently live with over 50K downloads. The app is disguised as a document reader / file manager but actually downloads the Anatsa trojan. The IOCs below can be used to identify this Anatsa malware campaign. Anatsa installer MD5: 98af36a2ef0b8f87076d1ff2f7dc9585 Anatsa payload MD5: da5e24b1a97faeacf7fb97dbb3a585af Anatsa download URL: https://quantumfilebreak.com/txt.txt Anatsa C2s: http: //185.215.113.108:85/api/ http: //193.24.123.18:85/api/ http: //162.252.173.37:85/api/ URL of the malicious app"  
[X Link](https://x.com/Threatlabz/status/1998072507883225180)  2025-12-08T16:49Z 7900 followers, 5247 engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@Threatlabz Avatar @Threatlabz Zscaler ThreatLabz

Zscaler ThreatLabz posts on X about $zs, microsoft, vulnerability, $googl the most. They currently have XXXXX followers and X posts still getting attention that total XXXXX engagements in the last XX hours.

Engagements: XXXXX #

Engagements Line Chart

  • X Week XXXXX +487%
  • X Month XXXXXX +21,523%
  • X Months XXXXXXX +702%
  • X Year XXXXXXX +29%

Mentions: X #

Mentions Line Chart

  • X Months XX +45%
  • X Year XX +93%

Followers: XXXXX #

Followers Line Chart

  • X Week XXXXX +0.51%
  • X Month XXXXX +5%
  • X Months XXXXX +15%
  • X Year XXXXX +26%

CreatorRank: XXXXXXXXX #

CreatorRank Line Chart

Social Influence

Social category influence stocks XX% technology brands XX%

Social topic influence $zs #3, microsoft 20%, vulnerability 20%, $googl 20%, android XX%

Top assets mentioned Zscaler Inc (ZS) Microsoft Corp. (MSFT) Alphabet Inc Class A (GOOGL)

Top Social Posts

Top posts by engagements in the last XX hours

"Zscaler ThreatLabz has discovered CVE-2025-50165 in the Microsoft Windows Graphics Component. With a CVSS score of XXX this vulnerability enables attackers to execute arbitrary code using a specially crafted JPEG image that can be triggered by any application that leverages the Windows Graphics library such as Microsoft Office documents. It is critical that Windows users update applications and install the patched versions in a timely manner. Read the full analysis here:"
X Link 2025-11-20T15:48Z 7899 followers, 74.1K engagements

"Zscaler ThreatLabz has published a technical analysis of Matanbuchus version XXX and has observed recent deployments consistent with hands-on-keyboard ransomware operations. This new version of Matanbuchus implements a number of obfuscation techniques to evade detection such as junk code encrypted strings and resolving Windows API functions by hash. Network communication occurs via HTTPS with Protocol Buffers that are encrypted with ChaCha20. Read our entire analysis here:"
X Link 2025-12-02T15:26Z 7900 followers, 9907 engagements

"⚠ThreatLabz has identified another malicious Android app in the Google Play Store that is still currently live with over 50K downloads. The app is disguised as a document reader / file manager but actually downloads the Anatsa trojan. The IOCs below can be used to identify this Anatsa malware campaign. Anatsa installer MD5: 98af36a2ef0b8f87076d1ff2f7dc9585 Anatsa payload MD5: da5e24b1a97faeacf7fb97dbb3a585af Anatsa download URL: https://quantumfilebreak.com/txt.txt Anatsa C2s: http: //185.215.113.108:85/api/ http: //193.24.123.18:85/api/ http: //162.252.173.37:85/api/ URL of the malicious app"
X Link 2025-12-08T16:49Z 7900 followers, 5247 engagements

@Threatlabz
/creator/twitter::Threatlabz