Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

# ![@virusbtn Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::118059149.png) @virusbtn Virus Bulletin

Virus Bulletin posts on X about networks, splunk, gaming, pakistan the most. They currently have XXXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours.

### Engagements: XXXXX [#](/creator/twitter::118059149/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::118059149/c:line/m:interactions.svg)

- X Week XXXXXX +51%
- X Month XXXXXX +32%
- X Months XXXXXXX +5.30%
- X Year XXXXXXX -XX%

### Mentions: XX [#](/creator/twitter::118059149/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::118059149/c:line/m:posts_active.svg)


### Followers: XXXXXX [#](/creator/twitter::118059149/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::118059149/c:line/m:followers.svg)

- X Week XXXXXX +0.12%
- X Month XXXXXX +0.28%
- X Months XXXXXX +0.76%
- X Year XXXXXX +1.20%

### CreatorRank: XXXXXXX [#](/creator/twitter::118059149/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::118059149/c:line/m:influencer_rank.svg)

### Social Influence [#](/creator/twitter::118059149/influence)
---

**Social category influence**
[stocks](/list/stocks)  XXXXX% [technology brands](/list/technology-brands)  XXXXX% [countries](/list/countries)  XXXX% [travel destinations](/list/travel-destinations)  XXXX% [finance](/list/finance)  XXXX%

**Social topic influence**
[networks](/topic/networks) 10%, [splunk](/topic/splunk) 6.67%, [gaming](/topic/gaming) 3.33%, [pakistan](/topic/pakistan) 3.33%, [kong](/topic/kong) 3.33%, [hong kong](/topic/hong-kong) 3.33%, [china](/topic/china) 3.33%, [alto](/topic/alto) 3.33%, [takedown](/topic/takedown) 3.33%, [southeast asia](/topic/southeast-asia) XXXX%

**Top accounts mentioned or mentioned by**
[@philofishal](/creator/undefined) [@dineshdina04](/creator/undefined) [@txhaflaire](/creator/undefined) [@cyb3rjerry](/creator/undefined) [@jershmagersh](/creator/undefined) [@amazon](/creator/undefined) [@gendigitalinc](/creator/undefined) [@softwareclean](/creator/undefined) [@fortinet](/creator/undefined) [@totalavcom](/creator/undefined)

**Top assets mentioned**
[Reynolds Consumer Products Inc. Common Stock (REYN)](/topic/$reyn)
### Top Social Posts [#](/creator/twitter::118059149/posts)
---
Top posts by engagements in the last XX hours

"Fortinet's Vincent Li analyses RondoDox a new botnet campaign targeting Linux-based operating systems running on diverse architectures. RondoDox incorporates custom libraries and mimics traffic from gaming platforms or VPN servers to evade detection"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1941056496336617816) 2025-07-04 08:48:26 UTC 60K followers, 2242 engagements


"Fortinet's Kuan-Yen Liu & Yen-Ting Lee examine NailaoLockers complete technical profile including its execution flow encryption and decryption routines and its use of SM2 cryptography"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1947211922505388156) 2025-07-21 08:27:54 UTC 60.1K followers, 3175 engagements


"Palo Alto Networks' Rem Dudas & Noa Dekel share hunting tips & mitigation strategies for ClickFix campaigns and provide an inside view of some of the most prominent ClickFix campaigns they've seen so far in 2025"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1945057780211093925) 2025-07-15 09:48:06 UTC 60.1K followers, 2430 engagements


"The Seqrite Labs APT-Team has identified and tracked a cluster of espionage-oriented operations conducting campaigns across multiple Asian jurisdictions including China Hong Kong & Pakistan. This threat entity usually deploys CV-themed decoy documents"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1945823563853828170) 2025-07-17 12:31:03 UTC 60.1K followers, 5616 engagements


"Palo Alto Networks researchers explore the obfuscation techniques employed by the malware authors in the SLOW#TEMPEST campaign and highlight methods and code that can be used to detect and defeat these techniques"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1944697682758386058) 2025-07-14 09:57:12 UTC 60.1K followers, 6480 engagements


"Trend Micro's Junestherry Dela Cruz shares the latest methods used in Lumma Stealer distribution. Lumma Stealer re-emerged shortly after its takedown; the group behind it appears to be intent on employing covert tactics while steadily expanding its reach"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1947947905488204159) 2025-07-23 09:12:26 UTC 60.1K followers, 1649 engagements


"Palo Alto Networks' Lior Rochberger looks into a cluster of suspicious activity targeting governmental entities in Southeast Asia. The threat actors behind this campaign use the HazyBeacon backdoor which leverages AWS Lambda URLs as C2 infrastructure"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1945053450317803647) 2025-07-15 09:30:54 UTC 60.1K followers, 2128 engagements


"Trustwave reseachers share key insights from the analysis of a KAWA4096 sample to uncover how the ransomware operates. This new threat features a leak site that follows the style of the Akira ransomware group & a ransom note format similar to that of Qilin"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1946153055029784844) 2025-07-18 10:20:20 UTC 60K followers, 1725 engagements


"Splunk researchers analyse a malicious Inno Setup installer that leverages Inno Setup's Pascal scripting capabilities to retrieve and execute HijackLoader a known loader used to evade detection and deliver the final payload - in this case RedLine Stealer"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1942184655303626952) 2025-07-07 11:31:20 UTC 60K followers, 3644 engagements


"Proofpoint Threat Research identified multiple China-aligned threat actors specifically targeting Taiwanese organizations within the semiconductor industry. In all cases the motive was most likely espionage"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1945812957968925171) 2025-07-17 11:48:55 UTC 60K followers, 3730 engagements


"Splunk Threat Research Team takes a close look at recent XWorm malware samples spotted in the wild and shows how this threat uses a mix of different stagers and loaders to sneak past defences and carry out its attacks"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1941059443229429839) 2025-07-04 09:00:09 UTC 60K followers, 2308 engagements


"Cedric Brisson (@cyb3rjerry) in collaboration with Invoke RE's Josh Reynolds (@JershMagersh) analysed the "Scavenger" malware distributed via a supply chain compromise involving popular NPM package es-lint-config-prettier"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1947592616863760812) 2025-07-22 09:40:39 UTC 60.1K followers, 1838 engagements


"Welcome our newest #VB2025 partners: 🌟 @amazon (Gold Partner) 🥈 @GenDigitalInc (Silver Partner) 🥉 @SoftwareClean (CSA) @Fortinet & Varist (Bronze Partners) 🤝 @totalavcom (Getting Connected tier) Join them & showcase your brand in Berlin: 👉"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1948012383185543504) 2025-07-23 13:28:39 UTC 60.1K followers, XXX engagements


"Cybereason Security Services investigates a BlackSuit ransomware attack leveraging tools like Cobalt Strike for command and control (C2) rclone for data exfiltration & BlackSuit ransomware for file encryption"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1944698418309247363) 2025-07-14 10:00:08 UTC 60.1K followers, 2752 engagements


"FortiGuard Labs recently uncovered an active delivery site that hosts a weaponized HTA script and silently drops the infostealer NordDragonScan into victims environments"  
![@virusbtn Avatar](https://lunarcrush.com/gi/w:16/cr:twitter::118059149.png) [@virusbtn](/creator/x/virusbtn) on [X](/post/tweet/1942515271614304402) 2025-07-08 09:25:05 UTC 60K followers, 2991 engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@virusbtn Avatar @virusbtn Virus Bulletin

Virus Bulletin posts on X about networks, splunk, gaming, pakistan the most. They currently have XXXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours.

Engagements: XXXXX #

Engagements Line Chart

  • X Week XXXXXX +51%
  • X Month XXXXXX +32%
  • X Months XXXXXXX +5.30%
  • X Year XXXXXXX -XX%

Mentions: XX #

Mentions Line Chart

Followers: XXXXXX #

Followers Line Chart

  • X Week XXXXXX +0.12%
  • X Month XXXXXX +0.28%
  • X Months XXXXXX +0.76%
  • X Year XXXXXX +1.20%

CreatorRank: XXXXXXX #

CreatorRank Line Chart

Social Influence #


Social category influence stocks XXXXX% technology brands XXXXX% countries XXXX% travel destinations XXXX% finance XXXX%

Social topic influence networks 10%, splunk 6.67%, gaming 3.33%, pakistan 3.33%, kong 3.33%, hong kong 3.33%, china 3.33%, alto 3.33%, takedown 3.33%, southeast asia XXXX%

Top accounts mentioned or mentioned by @philofishal @dineshdina04 @txhaflaire @cyb3rjerry @jershmagersh @amazon @gendigitalinc @softwareclean @fortinet @totalavcom

Top assets mentioned Reynolds Consumer Products Inc. Common Stock (REYN)

Top Social Posts #


Top posts by engagements in the last XX hours

"Fortinet's Vincent Li analyses RondoDox a new botnet campaign targeting Linux-based operating systems running on diverse architectures. RondoDox incorporates custom libraries and mimics traffic from gaming platforms or VPN servers to evade detection"
@virusbtn Avatar @virusbtn on X 2025-07-04 08:48:26 UTC 60K followers, 2242 engagements

"Fortinet's Kuan-Yen Liu & Yen-Ting Lee examine NailaoLockers complete technical profile including its execution flow encryption and decryption routines and its use of SM2 cryptography"
@virusbtn Avatar @virusbtn on X 2025-07-21 08:27:54 UTC 60.1K followers, 3175 engagements

"Palo Alto Networks' Rem Dudas & Noa Dekel share hunting tips & mitigation strategies for ClickFix campaigns and provide an inside view of some of the most prominent ClickFix campaigns they've seen so far in 2025"
@virusbtn Avatar @virusbtn on X 2025-07-15 09:48:06 UTC 60.1K followers, 2430 engagements

"The Seqrite Labs APT-Team has identified and tracked a cluster of espionage-oriented operations conducting campaigns across multiple Asian jurisdictions including China Hong Kong & Pakistan. This threat entity usually deploys CV-themed decoy documents"
@virusbtn Avatar @virusbtn on X 2025-07-17 12:31:03 UTC 60.1K followers, 5616 engagements

"Palo Alto Networks researchers explore the obfuscation techniques employed by the malware authors in the SLOW#TEMPEST campaign and highlight methods and code that can be used to detect and defeat these techniques"
@virusbtn Avatar @virusbtn on X 2025-07-14 09:57:12 UTC 60.1K followers, 6480 engagements

"Trend Micro's Junestherry Dela Cruz shares the latest methods used in Lumma Stealer distribution. Lumma Stealer re-emerged shortly after its takedown; the group behind it appears to be intent on employing covert tactics while steadily expanding its reach"
@virusbtn Avatar @virusbtn on X 2025-07-23 09:12:26 UTC 60.1K followers, 1649 engagements

"Palo Alto Networks' Lior Rochberger looks into a cluster of suspicious activity targeting governmental entities in Southeast Asia. The threat actors behind this campaign use the HazyBeacon backdoor which leverages AWS Lambda URLs as C2 infrastructure"
@virusbtn Avatar @virusbtn on X 2025-07-15 09:30:54 UTC 60.1K followers, 2128 engagements

"Trustwave reseachers share key insights from the analysis of a KAWA4096 sample to uncover how the ransomware operates. This new threat features a leak site that follows the style of the Akira ransomware group & a ransom note format similar to that of Qilin"
@virusbtn Avatar @virusbtn on X 2025-07-18 10:20:20 UTC 60K followers, 1725 engagements

"Splunk researchers analyse a malicious Inno Setup installer that leverages Inno Setup's Pascal scripting capabilities to retrieve and execute HijackLoader a known loader used to evade detection and deliver the final payload - in this case RedLine Stealer"
@virusbtn Avatar @virusbtn on X 2025-07-07 11:31:20 UTC 60K followers, 3644 engagements

"Proofpoint Threat Research identified multiple China-aligned threat actors specifically targeting Taiwanese organizations within the semiconductor industry. In all cases the motive was most likely espionage"
@virusbtn Avatar @virusbtn on X 2025-07-17 11:48:55 UTC 60K followers, 3730 engagements

"Splunk Threat Research Team takes a close look at recent XWorm malware samples spotted in the wild and shows how this threat uses a mix of different stagers and loaders to sneak past defences and carry out its attacks"
@virusbtn Avatar @virusbtn on X 2025-07-04 09:00:09 UTC 60K followers, 2308 engagements

"Cedric Brisson (@cyb3rjerry) in collaboration with Invoke RE's Josh Reynolds (@JershMagersh) analysed the "Scavenger" malware distributed via a supply chain compromise involving popular NPM package es-lint-config-prettier"
@virusbtn Avatar @virusbtn on X 2025-07-22 09:40:39 UTC 60.1K followers, 1838 engagements

"Welcome our newest #VB2025 partners: 🌟 @amazon (Gold Partner) 🥈 @GenDigitalInc (Silver Partner) 🥉 @SoftwareClean (CSA) @Fortinet & Varist (Bronze Partners) 🤝 @totalavcom (Getting Connected tier) Join them & showcase your brand in Berlin: 👉"
@virusbtn Avatar @virusbtn on X 2025-07-23 13:28:39 UTC 60.1K followers, XXX engagements

"Cybereason Security Services investigates a BlackSuit ransomware attack leveraging tools like Cobalt Strike for command and control (C2) rclone for data exfiltration & BlackSuit ransomware for file encryption"
@virusbtn Avatar @virusbtn on X 2025-07-14 10:00:08 UTC 60.1K followers, 2752 engagements

"FortiGuard Labs recently uncovered an active delivery site that hosts a weaponized HTA script and silently drops the infostealer NordDragonScan into victims environments"
@virusbtn Avatar @virusbtn on X 2025-07-08 09:25:05 UTC 60K followers, 2991 engagements

@virusbtn
/creator/twitter::virusbtn