[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @virusbtn Virus Bulletin Virus Bulletin posts on X about networks, splunk, gaming, pakistan the most. They currently have XXXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours. ### Engagements: XXXXX [#](/creator/twitter::118059149/interactions)  - X Week XXXXXX +51% - X Month XXXXXX +32% - X Months XXXXXXX +5.30% - X Year XXXXXXX -XX% ### Mentions: XX [#](/creator/twitter::118059149/posts_active)  ### Followers: XXXXXX [#](/creator/twitter::118059149/followers)  - X Week XXXXXX +0.12% - X Month XXXXXX +0.28% - X Months XXXXXX +0.76% - X Year XXXXXX +1.20% ### CreatorRank: XXXXXXX [#](/creator/twitter::118059149/influencer_rank)  ### Social Influence [#](/creator/twitter::118059149/influence) --- **Social category influence** [stocks](/list/stocks) XXXXX% [technology brands](/list/technology-brands) XXXXX% [countries](/list/countries) XXXX% [travel destinations](/list/travel-destinations) XXXX% [finance](/list/finance) XXXX% **Social topic influence** [networks](/topic/networks) 10%, [splunk](/topic/splunk) 6.67%, [gaming](/topic/gaming) 3.33%, [pakistan](/topic/pakistan) 3.33%, [kong](/topic/kong) 3.33%, [hong kong](/topic/hong-kong) 3.33%, [china](/topic/china) 3.33%, [alto](/topic/alto) 3.33%, [takedown](/topic/takedown) 3.33%, [southeast asia](/topic/southeast-asia) XXXX% **Top accounts mentioned or mentioned by** [@philofishal](/creator/undefined) [@dineshdina04](/creator/undefined) [@txhaflaire](/creator/undefined) [@cyb3rjerry](/creator/undefined) [@jershmagersh](/creator/undefined) [@amazon](/creator/undefined) [@gendigitalinc](/creator/undefined) [@softwareclean](/creator/undefined) [@fortinet](/creator/undefined) [@totalavcom](/creator/undefined) **Top assets mentioned** [Reynolds Consumer Products Inc. Common Stock (REYN)](/topic/$reyn) ### Top Social Posts [#](/creator/twitter::118059149/posts) --- Top posts by engagements in the last XX hours "Fortinet's Vincent Li analyses RondoDox a new botnet campaign targeting Linux-based operating systems running on diverse architectures. RondoDox incorporates custom libraries and mimics traffic from gaming platforms or VPN servers to evade detection"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1941056496336617816) 2025-07-04 08:48:26 UTC 60K followers, 2242 engagements "Fortinet's Kuan-Yen Liu & Yen-Ting Lee examine NailaoLockers complete technical profile including its execution flow encryption and decryption routines and its use of SM2 cryptography"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1947211922505388156) 2025-07-21 08:27:54 UTC 60.1K followers, 3175 engagements "Palo Alto Networks' Rem Dudas & Noa Dekel share hunting tips & mitigation strategies for ClickFix campaigns and provide an inside view of some of the most prominent ClickFix campaigns they've seen so far in 2025"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1945057780211093925) 2025-07-15 09:48:06 UTC 60.1K followers, 2430 engagements "The Seqrite Labs APT-Team has identified and tracked a cluster of espionage-oriented operations conducting campaigns across multiple Asian jurisdictions including China Hong Kong & Pakistan. This threat entity usually deploys CV-themed decoy documents"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1945823563853828170) 2025-07-17 12:31:03 UTC 60.1K followers, 5616 engagements "Palo Alto Networks researchers explore the obfuscation techniques employed by the malware authors in the SLOW#TEMPEST campaign and highlight methods and code that can be used to detect and defeat these techniques"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1944697682758386058) 2025-07-14 09:57:12 UTC 60.1K followers, 6480 engagements "Trend Micro's Junestherry Dela Cruz shares the latest methods used in Lumma Stealer distribution. Lumma Stealer re-emerged shortly after its takedown; the group behind it appears to be intent on employing covert tactics while steadily expanding its reach"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1947947905488204159) 2025-07-23 09:12:26 UTC 60.1K followers, 1649 engagements "Palo Alto Networks' Lior Rochberger looks into a cluster of suspicious activity targeting governmental entities in Southeast Asia. The threat actors behind this campaign use the HazyBeacon backdoor which leverages AWS Lambda URLs as C2 infrastructure"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1945053450317803647) 2025-07-15 09:30:54 UTC 60.1K followers, 2128 engagements "Trustwave reseachers share key insights from the analysis of a KAWA4096 sample to uncover how the ransomware operates. This new threat features a leak site that follows the style of the Akira ransomware group & a ransom note format similar to that of Qilin"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1946153055029784844) 2025-07-18 10:20:20 UTC 60K followers, 1725 engagements "Splunk researchers analyse a malicious Inno Setup installer that leverages Inno Setup's Pascal scripting capabilities to retrieve and execute HijackLoader a known loader used to evade detection and deliver the final payload - in this case RedLine Stealer"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1942184655303626952) 2025-07-07 11:31:20 UTC 60K followers, 3644 engagements "Proofpoint Threat Research identified multiple China-aligned threat actors specifically targeting Taiwanese organizations within the semiconductor industry. In all cases the motive was most likely espionage"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1945812957968925171) 2025-07-17 11:48:55 UTC 60K followers, 3730 engagements "Splunk Threat Research Team takes a close look at recent XWorm malware samples spotted in the wild and shows how this threat uses a mix of different stagers and loaders to sneak past defences and carry out its attacks"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1941059443229429839) 2025-07-04 09:00:09 UTC 60K followers, 2308 engagements "Cedric Brisson (@cyb3rjerry) in collaboration with Invoke RE's Josh Reynolds (@JershMagersh) analysed the "Scavenger" malware distributed via a supply chain compromise involving popular NPM package es-lint-config-prettier"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1947592616863760812) 2025-07-22 09:40:39 UTC 60.1K followers, 1838 engagements "Welcome our newest #VB2025 partners: 🌟 @amazon (Gold Partner) 🥈 @GenDigitalInc (Silver Partner) 🥉 @SoftwareClean (CSA) @Fortinet & Varist (Bronze Partners) 🤝 @totalavcom (Getting Connected tier) Join them & showcase your brand in Berlin: 👉"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1948012383185543504) 2025-07-23 13:28:39 UTC 60.1K followers, XXX engagements "Cybereason Security Services investigates a BlackSuit ransomware attack leveraging tools like Cobalt Strike for command and control (C2) rclone for data exfiltration & BlackSuit ransomware for file encryption"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1944698418309247363) 2025-07-14 10:00:08 UTC 60.1K followers, 2752 engagements "FortiGuard Labs recently uncovered an active delivery site that hosts a weaponized HTA script and silently drops the infostealer NordDragonScan into victims environments"  [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1942515271614304402) 2025-07-08 09:25:05 UTC 60K followers, 2991 engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
Virus Bulletin posts on X about networks, splunk, gaming, pakistan the most. They currently have XXXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours.
Social category influence stocks XXXXX% technology brands XXXXX% countries XXXX% travel destinations XXXX% finance XXXX%
Social topic influence networks 10%, splunk 6.67%, gaming 3.33%, pakistan 3.33%, kong 3.33%, hong kong 3.33%, china 3.33%, alto 3.33%, takedown 3.33%, southeast asia XXXX%
Top accounts mentioned or mentioned by @philofishal @dineshdina04 @txhaflaire @cyb3rjerry @jershmagersh @amazon @gendigitalinc @softwareclean @fortinet @totalavcom
Top assets mentioned Reynolds Consumer Products Inc. Common Stock (REYN)
Top posts by engagements in the last XX hours
"Fortinet's Vincent Li analyses RondoDox a new botnet campaign targeting Linux-based operating systems running on diverse architectures. RondoDox incorporates custom libraries and mimics traffic from gaming platforms or VPN servers to evade detection" @virusbtn on X 2025-07-04 08:48:26 UTC 60K followers, 2242 engagements
"Fortinet's Kuan-Yen Liu & Yen-Ting Lee examine NailaoLockers complete technical profile including its execution flow encryption and decryption routines and its use of SM2 cryptography" @virusbtn on X 2025-07-21 08:27:54 UTC 60.1K followers, 3175 engagements
"Palo Alto Networks' Rem Dudas & Noa Dekel share hunting tips & mitigation strategies for ClickFix campaigns and provide an inside view of some of the most prominent ClickFix campaigns they've seen so far in 2025" @virusbtn on X 2025-07-15 09:48:06 UTC 60.1K followers, 2430 engagements
"The Seqrite Labs APT-Team has identified and tracked a cluster of espionage-oriented operations conducting campaigns across multiple Asian jurisdictions including China Hong Kong & Pakistan. This threat entity usually deploys CV-themed decoy documents" @virusbtn on X 2025-07-17 12:31:03 UTC 60.1K followers, 5616 engagements
"Palo Alto Networks researchers explore the obfuscation techniques employed by the malware authors in the SLOW#TEMPEST campaign and highlight methods and code that can be used to detect and defeat these techniques" @virusbtn on X 2025-07-14 09:57:12 UTC 60.1K followers, 6480 engagements
"Trend Micro's Junestherry Dela Cruz shares the latest methods used in Lumma Stealer distribution. Lumma Stealer re-emerged shortly after its takedown; the group behind it appears to be intent on employing covert tactics while steadily expanding its reach" @virusbtn on X 2025-07-23 09:12:26 UTC 60.1K followers, 1649 engagements
"Palo Alto Networks' Lior Rochberger looks into a cluster of suspicious activity targeting governmental entities in Southeast Asia. The threat actors behind this campaign use the HazyBeacon backdoor which leverages AWS Lambda URLs as C2 infrastructure" @virusbtn on X 2025-07-15 09:30:54 UTC 60.1K followers, 2128 engagements
"Trustwave reseachers share key insights from the analysis of a KAWA4096 sample to uncover how the ransomware operates. This new threat features a leak site that follows the style of the Akira ransomware group & a ransom note format similar to that of Qilin" @virusbtn on X 2025-07-18 10:20:20 UTC 60K followers, 1725 engagements
"Splunk researchers analyse a malicious Inno Setup installer that leverages Inno Setup's Pascal scripting capabilities to retrieve and execute HijackLoader a known loader used to evade detection and deliver the final payload - in this case RedLine Stealer" @virusbtn on X 2025-07-07 11:31:20 UTC 60K followers, 3644 engagements
"Proofpoint Threat Research identified multiple China-aligned threat actors specifically targeting Taiwanese organizations within the semiconductor industry. In all cases the motive was most likely espionage" @virusbtn on X 2025-07-17 11:48:55 UTC 60K followers, 3730 engagements
"Splunk Threat Research Team takes a close look at recent XWorm malware samples spotted in the wild and shows how this threat uses a mix of different stagers and loaders to sneak past defences and carry out its attacks" @virusbtn on X 2025-07-04 09:00:09 UTC 60K followers, 2308 engagements
"Cedric Brisson (@cyb3rjerry) in collaboration with Invoke RE's Josh Reynolds (@JershMagersh) analysed the "Scavenger" malware distributed via a supply chain compromise involving popular NPM package es-lint-config-prettier" @virusbtn on X 2025-07-22 09:40:39 UTC 60.1K followers, 1838 engagements
"Welcome our newest #VB2025 partners: 🌟 @amazon (Gold Partner) 🥈 @GenDigitalInc (Silver Partner) 🥉 @SoftwareClean (CSA) @Fortinet & Varist (Bronze Partners) 🤝 @totalavcom (Getting Connected tier) Join them & showcase your brand in Berlin: 👉" @virusbtn on X 2025-07-23 13:28:39 UTC 60.1K followers, XXX engagements
"Cybereason Security Services investigates a BlackSuit ransomware attack leveraging tools like Cobalt Strike for command and control (C2) rclone for data exfiltration & BlackSuit ransomware for file encryption" @virusbtn on X 2025-07-14 10:00:08 UTC 60.1K followers, 2752 engagements
"FortiGuard Labs recently uncovered an active delivery site that hosts a weaponized HTA script and silently drops the infostealer NordDragonScan into victims environments" @virusbtn on X 2025-07-08 09:25:05 UTC 60K followers, 2991 engagements
/creator/twitter::virusbtn