[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @Unit42_Intel Unit XX Unit XX posts on X about microsoft, influencer, more info, cfg the most. They currently have XXXXXX followers and XXX posts still getting attention that total XXXXX engagements in the last XX hours. ### Engagements: XXXXX [#](/creator/twitter::4487645412/interactions)  - X Week XXXXXX +146% - X Month XXXXXXX +71% - X Months XXXXXXX +17% - X Year XXXXXXX +2.90% ### Mentions: X [#](/creator/twitter::4487645412/posts_active)  - X Months XX -XX% - X Year XX +21% ### Followers: XXXXXX [#](/creator/twitter::4487645412/followers)  - X Week XXXXXX +0.55% - X Month XXXXXX +1.30% - X Months XXXXXX +8% - X Year XXXXXX +16% ### CreatorRank: XXXXXXXXX [#](/creator/twitter::4487645412/influencer_rank)  ### Social Influence [#](/creator/twitter::4487645412/influence) --- **Social category influence** [technology brands](/list/technology-brands) [stocks](/list/stocks) **Social topic influence** [microsoft](/topic/microsoft), [influencer](/topic/influencer), [more info](/topic/more-info), [cfg](/topic/cfg) **Top assets mentioned** [Microsoft Corp. (MSFT)](/topic/microsoft) ### Top Social Posts [#](/creator/twitter::4487645412/posts) --- Top posts by engagements in the last XX hours "On July XX Microsoft issued guidance on CVE-2025-53770 a variant of CVE-2025-49706. At the time of posting a patch is not available. Learn more about Microsofts customer guidance as the situation evolves:"  [@Unit42_Intel](/creator/x/Unit42_Intel) on [X](/post/tweet/1946763492985348248) 2025-07-20 02:46:00 UTC 62K followers, 24.9K engagements "Threat group CL-STA-1020 targets Southeast Asian governments to gather covert intelligence. Tactics Unit XX has observed include deployment of the novel Windows backdoor we call HazyBeacon as well as exfiltration via legitimate cloud services. Details:"  [@Unit42_Intel](/creator/x/Unit42_Intel) on [X](/post/tweet/1948099072633577762) 2025-07-23 19:13:07 UTC 62K followers, 2590 engagements "A website impersonating a popular streaming service uses an "influencer collaboration" theme to trick viewers into running a malicious Windows shortcut for a multi-stage chain including a WebDAV server to push #Vidar #infostealer malware. Details at:"  [@Unit42_Intel](/creator/x/Unit42_Intel) on [X](/post/tweet/1948784902763151659) 2025-07-25 16:38:22 UTC 62K followers, 4411 engagements "Unit 42's threat brief details active exploitation of SharePoint vulnerabilities. Get actionable intelligence on the attack scope and telemetry-based insights to protect your systems:"  [@Unit42_Intel](/creator/x/Unit42_Intel) on [X](/post/tweet/1947487033212985688) 2025-07-22 02:41:05 UTC 62K followers, 9456 engagements "A backdoor through a side door Our latest threat research explains how we detected a cloud-based C2: Threat group CL-STA-1020 misused AWS Lambda URLs to mask malicious activity"  [@Unit42_Intel](/creator/x/Unit42_Intel) on [X](/post/tweet/1944817451595674000) 2025-07-14 17:53:08 UTC 62K followers, 4472 engagements "A 2025 version of #SoulStealer an #infostealer released for educational purposes is available featuring updated infrastructure and additional functionality compared to the 2024 version. More info at"  [@Unit42_Intel](/creator/x/Unit42_Intel) on [X](/post/tweet/1948028925457621404) 2025-07-23 14:34:23 UTC 62K followers, 4384 engagements "We are observing active global exploitation of critical Microsoft SharePoint vulns CVE-2025-49704 and CVE-2025-49706. Orgs worldwide are being targeted. Patch immediately. The exploits are real in-the-wild and pose a serious threat. IoCs we've seen:"  [@Unit42_Intel](/creator/x/Unit42_Intel) on [X](/post/tweet/1946654044316905883) 2025-07-19 19:31:05 UTC 62K followers, 67.9K engagements "This research has a laser focus on the following techniques used by the threat actors for a SLOW # TEMPEST campaign: control flow graph (CFG) obfuscation using dynamic jumps and obfuscated function calls. Benefit from our analysis methods:"  [@Unit42_Intel](/creator/x/Unit42_Intel) on [X](/post/tweet/1947717057421689224) 2025-07-22 17:55:07 UTC 62K followers, 2924 engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
Unit XX posts on X about microsoft, influencer, more info, cfg the most. They currently have XXXXXX followers and XXX posts still getting attention that total XXXXX engagements in the last XX hours.
Social category influence technology brands stocks
Social topic influence microsoft, influencer, more info, cfg
Top assets mentioned Microsoft Corp. (MSFT)
Top posts by engagements in the last XX hours
"On July XX Microsoft issued guidance on CVE-2025-53770 a variant of CVE-2025-49706. At the time of posting a patch is not available. Learn more about Microsofts customer guidance as the situation evolves:" @Unit42_Intel on X 2025-07-20 02:46:00 UTC 62K followers, 24.9K engagements
"Threat group CL-STA-1020 targets Southeast Asian governments to gather covert intelligence. Tactics Unit XX has observed include deployment of the novel Windows backdoor we call HazyBeacon as well as exfiltration via legitimate cloud services. Details:" @Unit42_Intel on X 2025-07-23 19:13:07 UTC 62K followers, 2590 engagements
"A website impersonating a popular streaming service uses an "influencer collaboration" theme to trick viewers into running a malicious Windows shortcut for a multi-stage chain including a WebDAV server to push #Vidar #infostealer malware. Details at:" @Unit42_Intel on X 2025-07-25 16:38:22 UTC 62K followers, 4411 engagements
"Unit 42's threat brief details active exploitation of SharePoint vulnerabilities. Get actionable intelligence on the attack scope and telemetry-based insights to protect your systems:" @Unit42_Intel on X 2025-07-22 02:41:05 UTC 62K followers, 9456 engagements
"A backdoor through a side door Our latest threat research explains how we detected a cloud-based C2: Threat group CL-STA-1020 misused AWS Lambda URLs to mask malicious activity" @Unit42_Intel on X 2025-07-14 17:53:08 UTC 62K followers, 4472 engagements
"A 2025 version of #SoulStealer an #infostealer released for educational purposes is available featuring updated infrastructure and additional functionality compared to the 2024 version. More info at" @Unit42_Intel on X 2025-07-23 14:34:23 UTC 62K followers, 4384 engagements
"We are observing active global exploitation of critical Microsoft SharePoint vulns CVE-2025-49704 and CVE-2025-49706. Orgs worldwide are being targeted. Patch immediately. The exploits are real in-the-wild and pose a serious threat. IoCs we've seen:" @Unit42_Intel on X 2025-07-19 19:31:05 UTC 62K followers, 67.9K engagements
"This research has a laser focus on the following techniques used by the threat actors for a SLOW # TEMPEST campaign: control flow graph (CFG) obfuscation using dynamic jumps and obfuscated function calls. Benefit from our analysis methods:" @Unit42_Intel on X 2025-07-22 17:55:07 UTC 62K followers, 2924 engagements
/creator/x::Unit42_Intel