shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

240
active users

#trickbot

0 posts0 participants0 posts today
Xavier «X» Santolaria :verified_paw: :donor:<p>🔥 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> list of resources for week #23/2025 is out!</p><p>It includes the following and much more:</p><p>🇫🇷 Cartier announced a <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a>;</p><p>🫱🏻‍🫲🏼 Microsoft and CrowdStrike are working together to connect the different names used for hacking groups;</p><p>🇩🇪 German authorities have identified Vitaly Nikolaevich Kovalev as the leader of the <a href="https://infosec.exchange/tags/TrickBot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TrickBot</span></a> cybercrime gang;</p><p>🩹 🐛 Over 30 <a href="https://infosec.exchange/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> Patched in <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a>;</p><p>🇪🇺 Microsoft has launched a free European Security Program to enhance cybersecurity for <a href="https://infosec.exchange/tags/EU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EU</span></a> governments;</p><p>🇮🇳 <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> Helps India CBI Dismantle Indian Call Centers;</p><p>📨 Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-23-2025" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/infosec-mashup-23-2025</span></a></p>
PrivacyDigest<p>Cops in <a href="https://mas.to/tags/Germany" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Germany</span></a> Claim They've ID'd the Mysterious <a href="https://mas.to/tags/Trickbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trickbot</span></a> <a href="https://mas.to/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> Kingpin </p><p>The elusive boss of the Trickbot and Conti <a href="https://mas.to/tags/cybercriminal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercriminal</span></a> groups has been known only as “Stern.” Now, <a href="https://mas.to/tags/German" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>German</span></a> law enforcement has published his alleged identity—and it’s a familiar face.</p><p><a href="https://www.wired.com/story/stern-trickbot-identified-germany-bka/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/stern-trickbot</span><span class="invisible">-identified-germany-bka/</span></a></p>
IT News<p>Ransomware kingpin “Stern” apparently IDed by German law enforcement - For years, members of the Russian cybercrime cartel Trickbot... - <a href="https://arstechnica.com/security/2025/05/german-police-say-theyve-identified-trickbot-ransomware-kingpin/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">05/german-police-say-theyve-identified-trickbot-ransomware-kingpin/</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/syndicated" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>syndicated</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/trickbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trickbot</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/conti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conti</span></a> <a href="https://schleuss.online/tags/stern" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stern</span></a></p>
The Spamhaus Project<p>🔥 Operation Endgame is BACK! This time targeting <a href="https://infosec.exchange/tags/BumbleBee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BumbleBee</span></a>, <a href="https://infosec.exchange/tags/Latrodectus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Latrodectus</span></a>, <a href="https://infosec.exchange/tags/DanaBot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DanaBot</span></a>, <a href="https://infosec.exchange/tags/WarmCookie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WarmCookie</span></a>, <a href="https://infosec.exchange/tags/Qakbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qakbot</span></a> and <a href="https://infosec.exchange/tags/Trickbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trickbot</span></a>!</p><p>Once again this is a HUGE win, with a truly international effort! 💪 </p><p>As with phase one of <a href="https://infosec.exchange/tags/OperationEndgame" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationEndgame</span></a>, Spamhaus are providing remediation support - those affected will be contacted in due course with steps to take. </p><p>For more information, read our write-up here:<br>👉 <a href="https://www.spamhaus.org/resource-hub/malware/botnets-disrupted-worldwide-operation-endgame-is-back/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spamhaus.org/resource-hub/malw</span><span class="invisible">are/botnets-disrupted-worldwide-operation-endgame-is-back/</span></a></p>
Threat Insight<p>Today we celebrate a major cybersecurity victory. 👏 Operation Endgame, a global law enforcement effort supported by insights from experts at Proofpoint and other industry vendors, resulted in:<br> <br>• The disruption of major botnets<br>• Four arrests<br>• Over 100 servers taken down across 10 countries<br>• Over 2,000 domains brought under the control of law enforcement<br>• Illegal assets frozen<br> <br>Proofpoint’s mission is to provide the best human-centric protection for our customers against advanced threats. Whenever possible and appropriate to do so, Proofpoint uses its team’s knowledge and skills to help protect a wider audience against widespread malware threats.<br> <br>For <a href="https://infosec.exchange/tags/OperationEndgame" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationEndgame</span></a>, Proofpoint threat researchers lent their expertise in reverse engineering malware, botnet infrastructure, and identifying patterns in how the threat actors set up their servers to help authorities understand the malware and safely remediate the bot clients.</p><p>Proofpoint’s unmatched threat telemetry and researcher knowledge played a crucial role in the operation, providing key insights in identifying the new botnets that are most likely to grow and become the dominant threats affecting the most number of people around the world.<br> <br>More information on the takedown and Proofpoint’s involvement can be found in our blog: <a href="https://www.proofpoint.com/us/blog/threat-insight/major-botnets-disrupted-global-law-enforcement-takedown" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">proofpoint.com/us/blog/threat-</span><span class="invisible">insight/major-botnets-disrupted-global-law-enforcement-takedown</span></a>.</p><p><a href="https://infosec.exchange/tags/IcedID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IcedID</span></a> <a href="https://infosec.exchange/tags/SystemBC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SystemBC</span></a> <a href="https://infosec.exchange/tags/Pikabot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pikabot</span></a> <a href="https://infosec.exchange/tags/SmokeLoader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SmokeLoader</span></a> <a href="https://infosec.exchange/tags/Bumblebee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bumblebee</span></a> <a href="https://infosec.exchange/tags/Trickbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trickbot</span></a> <a href="https://infosec.exchange/tags/Europol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europol</span></a></p>
Brett Callow<p>Russian <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> group hit with new sanctions. <a href="https://infosec.exchange/tags/conti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conti</span></a> <a href="https://infosec.exchange/tags/trickbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trickbot</span></a></p><p><a href="https://www.nationalcrimeagency.gov.uk/news/russian-ransomware-group-hit-with-new-sanctions" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nationalcrimeagency.gov.uk/new</span><span class="invisible">s/russian-ransomware-group-hit-with-new-sanctions</span></a></p>
Brett Callow<p>United States and United Kingdom Sanction Additional Members of the Russia-Based <a href="https://infosec.exchange/tags/Trickbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trickbot</span></a> Cybercrime Gang. <a href="https://infosec.exchange/tags/conti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conti</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/ofac" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ofac</span></a> </p><p><a href="https://home.treasury.gov/news/press-releases/jy1714" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">home.treasury.gov/news/press-r</span><span class="invisible">eleases/jy1714</span></a></p>
Violet Blue<p>New roundup: </p><p>Scientology fights "right to repair" while Russia hijacks UN cybercrime treaty, a privacy research paper on the visually impaired, thoughts (and details) on Jill Biden's 2nd covid infection while the White House insists "we're in a better place," and more.</p><p><a href="https://www.patreon.com/posts/cybersecurity-5-88790622" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">patreon.com/posts/cybersecurit</span><span class="invisible">y-5-88790622</span></a></p><p><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/covid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>covid</span></a> <a href="https://mastodon.social/tags/covidisntover" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>covidisntover</span></a> <a href="https://mastodon.social/tags/maskup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>maskup</span></a> <a href="https://mastodon.social/tags/firstlady" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firstlady</span></a> <a href="https://mastodon.social/tags/biden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biden</span></a> <a href="https://mastodon.social/tags/jillbiden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jillbiden</span></a> <a href="https://mastodon.social/tags/scientology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>scientology</span></a> <a href="https://mastodon.social/tags/righttorepair" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>righttorepair</span></a> <a href="https://mastodon.social/tags/mastercard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mastercard</span></a> <a href="https://mastodon.social/tags/trickbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trickbot</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p>