December 28, 2025
React2Shell
or
Sometimes That Scanner Will Actually Do Something
This is my React story. Within the cacophony of screaming, you will easily be able to find adequate explanations as to what the vulnerability is, that is not the purpose of these notes. The two central points we are conveying is that this was a vulnerability that allows an application to be weaponized to allow for remote code execution, the second is to show simply what happens when you leave the door open to the house at night when the lights are on. This is a story from beginning to end. A separate analysis of the ntpclient which is a proxy as well as the Go Lang binary follows the walkthrough. As always I have left the verbose technical notes intact so the reader can get a full picture.
November 29, 2025
Akira Binary Reverse Analysis
or
How the Deviant Child Grew Up
The purpose — to understand and to build good indicators to account for when the EDR fails us.
October 13, 2025
Brazil-Focused Multi-Stage Campaign: VBS → PowerShell → WhatsApp Web Automation
or
Gossip in the Time of Mardi Gras
May 23, 2021
Ransomware Demystified
or
You are not serious about cybersecurity and you got what was coming to you.
or
How to fool people and keep your job
January 11, 2021
SolarWinds DLL Short Overview
Excerpts from the DLL are decoded, IP addresses for C2 are listed. Decoded with de4dot and dnSpy.
August 16, 2020
The Deception of Privacy in Telemedicine by Some Apps
or
HIPPA Be Damned
August 12, 2020
How Your Phone Betrays You
or
How You Have Betrayed Your Phone – This Relationship is Dysfunctional
July 15, 2020
Phishing in the month of July while forgetting your bank login
or
How To Fool a Legal Professional and Laugh your Way Home
March 26, 2020
Tupperware Vulnerabilities
As reported on SC Magazine, the Tupperware site was breached with malicious code that activated a fraudulent payment form during the checkout. Suffice to say this could be described as skimming. We sent word to Tupperware but received no response. Now that the news is public we are posting our findings. Click here to read it.
We also sent them a Level 3 Footprint of their presence which had the Russian domain that was doing the skimming. It was ignored as well. Click here to see it. As always be leery of the sites you give your information to because they will not be quick to help you when your identity or financial information is stolen.
It is amazing how cybersecurity at the corporate level is an after-thought and they continue practicing the same lax procedures regurgitating the same tired rhetoric that simply does not work, who suffers - the customer
March 15, 2020
Covid-19 Cyber Infection
or
The Illness Dwells Inside you
December 19, 2019
The Evolution of the Phishing Email
or
Corporate Espionage Evolved
October 2, 2019
The Emissary Panda
or
How To Fool Your Database Admin While They Are Unaware of Your Shenanigans
August 22, 2019
This Week’s Asinine Idiosyncrasy Demystified
or
Texas Ransomware and the Big Lie
As you may or may not be aware of, this week it has been reported that twenty-two Texas towns were hit with a Ransomware attack. For those who are not aware of this, click here to go to the NPR site where the story is discussed. There is an issue that we at Cybercrypto have with how the news is reporting these attacks. We find it to be deceptive and we wish to at a minimum reiterate something we need people to know.
August 15, 2019
Lokibot – Gutter Thief in the Night
June 25, 2019
Let's Have An Honest Discussion About Ransomware
Part Two
April 23, 2019
Malware and Behavior Analysis - Series Three
A Worm in My Garden
April 2, 2019
Malware and Behavior Analysis - Series Two
The Rat Likes to Gossip
November 9, 2018
Malware and Behavior Analysis - Series One