<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Posts on tavares.re</title>
    <link>https://tavares.re/posts/</link>
    <description>Recent content in Posts on tavares.re</description>
    <image>
      <title>tavares.re</title>
      <url>https://tavares.re/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</url>
      <link>https://tavares.re/%3Clink%20or%20path%20of%20image%20for%20opengraph,%20twitter-cards%3E</link>
    </image>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <lastBuildDate>Fri, 14 Nov 2025 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://tavares.re/posts/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Into the Vo1d: Hunting a Botnet Hidden in TV boxes</title>
      <link>https://tavares.re/into-the-vo1d-hunting-a-botnet-hidden-in-tv-boxes/</link>
      <pubDate>Fri, 14 Nov 2025 00:00:00 +0000</pubDate>
      <guid>https://tavares.re/into-the-vo1d-hunting-a-botnet-hidden-in-tv-boxes/</guid>
      <description>&amp;#39;Into the Vo1d&amp;#39; is both a deep dive into a resilient IoT botnet and a broader lesson in threat hunting.</description>
    </item>
    <item>
      <title>Exfiltration over Telegram Bots: Skidding Infostealer Logs</title>
      <link>https://tavares.re/exfiltration-over-telegram-bots-skidding-infostealer-logs/</link>
      <pubDate>Wed, 16 Oct 2024 00:00:00 +0000</pubDate>
      <guid>https://tavares.re/exfiltration-over-telegram-bots-skidding-infostealer-logs/</guid>
      <description>This blog post focuses on analyzing logs exfiltrated by infostealers, specifically to Telegram, through their Bot API.</description>
    </item>
    <item>
      <title>Hunting PrivateLoader: The malware behind InstallsKey PPI service</title>
      <link>https://tavares.re/hunting-privateloader-malware-behind-installskey-ppi-service/</link>
      <pubDate>Tue, 27 Feb 2024 00:00:00 +0000</pubDate>
      <guid>https://tavares.re/hunting-privateloader-malware-behind-installskey-ppi-service/</guid>
      <description>This widespread malware had some important updates recently and has been infecting 5000 systems daily.</description>
    </item>
    <item>
      <title>Data Insights on AgentTesla and OriginLogger Victims</title>
      <link>https://tavares.re/data-insights-agenttesla-and-originlogger-victims/</link>
      <pubDate>Tue, 09 Jan 2024 00:00:00 +0000</pubDate>
      <guid>https://tavares.re/data-insights-agenttesla-and-originlogger-victims/</guid>
      <description>AgentTesla remains a prevalent commodity stealer, mainly distributed via email attachments.</description>
    </item>
    <item>
      <title>Tofsee Botnet: Proxying and Mining</title>
      <link>https://tavares.re/tofsee-botnet-proxying-and-mining/</link>
      <pubDate>Tue, 28 Mar 2023 00:00:00 +0000</pubDate>
      <guid>https://tavares.re/tofsee-botnet-proxying-and-mining/</guid>
      <description>An overview of current activities of the Tofsee botnet.</description>
    </item>
    <item>
      <title>Unpacking Colibri Loader: A Russian APT linked Campaign</title>
      <link>https://tavares.re/unpacking-colibri-loader-russian-apt-linked-campaign/</link>
      <pubDate>Wed, 30 Nov 2022 00:00:00 +0000</pubDate>
      <guid>https://tavares.re/unpacking-colibri-loader-russian-apt-linked-campaign/</guid>
      <description>Unpacking of a recent ColibriLoader campaign along with some YARA rules to detect it.</description>
    </item>
    <item>
      <title>Tracking PrivateLoader: Malware Distribution Service</title>
      <link>https://tavares.re/tracking-privateloader-malware-distribution-service/</link>
      <pubDate>Wed, 31 Aug 2022 00:00:00 +0000</pubDate>
      <guid>https://tavares.re/tracking-privateloader-malware-distribution-service/</guid>
      <description>We identified 30 malware families distributed by PrivateLoader.</description>
    </item>
    <item>
      <title>Decrypting and Hunting PrivateLoader</title>
      <link>https://tavares.re/hunting-privateloader-pay-per-install-service/</link>
      <pubDate>Mon, 06 Jun 2022 00:00:00 +0000</pubDate>
      <guid>https://tavares.re/hunting-privateloader-pay-per-install-service/</guid>
      <description>The malware&amp;#39;s uncommon string decryption technique enable us to write a Yara rule for detection and hunting purposes.</description>
    </item>
    <item>
      <title>FluBot Persists: Infecting Europe and Australia</title>
      <link>https://tavares.re/flubot-persists-infecting-europe-and-australia/</link>
      <pubDate>Fri, 04 Feb 2022 00:00:00 +0000</pubDate>
      <guid>https://tavares.re/flubot-persists-infecting-europe-and-australia/</guid>
      <description>This Android banker commonly spreads via SMS messages to the contacts on an infected device.</description>
    </item>
    <item>
      <title>Backdoors Pre-Installed on Cheap Android Devices</title>
      <link>https://tavares.re/suspicious-apps-pre-installed-on-cheap-android-devices/</link>
      <pubDate>Tue, 28 Apr 2020 00:00:00 +0000</pubDate>
      <guid>https://tavares.re/suspicious-apps-pre-installed-on-cheap-android-devices/</guid>
      <description>BitSight’s sinkhole data shows that Brazil is the most affected country, followed by Russia and India.</description>
    </item>
    <item>
      <title>Fraudulent Ads SDK Installed On 15 Million Android Devices</title>
      <link>https://tavares.re/fraudulent-ads-sdk-installed-on-15-million-android-devices/</link>
      <pubDate>Fri, 08 Mar 2019 00:00:00 +0000</pubDate>
      <guid>https://tavares.re/fraudulent-ads-sdk-installed-on-15-million-android-devices/</guid>
      <description>By using these SDKs, app developers are often unknowingly placing their users at risk and facilitating advertising fraud.</description>
    </item>
  </channel>
</rss>
