intelligence briefs header

Analytic Briefs, Published Research, Opinion

Every once in awhile we are able to publish our findings. This is few and far between just due to the nature of our contracts with clients. We do release some findings usually found on The Cyber Shafarat (www.cybershafarat.com). The information link on this page represent those documents.

Our customers benefit from 17 years of cyber intelligence experience combined with years of boots-on-the-ground collection and analysis. Enhance your cyber and threat intelligence program with Treadstone 71.

Cobalt Strike 4.0

558f61bfab60ef5e6bec15c8a6434e94249621f53e7838868cdb3206168a0937 *cobaltstrike.jar # Cobalt Strike 4.0 (December 5, 2019) 558f61bfab60ef5e6bec15c8a6434e94249621f53e7838868cdb3206168a0937 Cobalt Strike 4.0 Licensed (cobaltstrike.jar) Tested (On Windows with JRE 1.8) : – Hook.jar is clean (It hooks Authorization method providing the correct informations to validate license etc.) no Funky piece of code found – CobaltStrike.jar Hash : Ok – Lauching TeamServer : Ok –Continue reading "Cobalt Strike 4.0"

The post Cobalt Strike 4.0 appeared first on The Cyber Shafarat - Treadstone 71.

Read more: Cobalt Strike 4.0

High Level Benefits of the Cyber and Threat Intelligence Program Build Service

Our training examines Sherman Kent's Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students are able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course and, use of our advisory services.

Download Brief

Please provide a valid email address to access your download.

Continue... ×

Islamic Azad University DB For Sale 5M Records

5 million Database of Islamic Azad University  (WTIAU | iauctb | iau-tnb,…) of Iran Includes information for students, staff and professors Students: Username = StudentID Birth Date Natinoal card = Password Major & Section And … ———————————————————- Staff: Username & Password Phone Number Natinoal card First name and last name Birth Date And … ———————————————————-Continue reading "Islamic Azad University DB For Sale 5M Records"

The post Islamic Azad University DB For Sale 5M Records appeared first on The Cyber Shafarat - Treadstone 71.

Read more: Islamic Azad University DB For Sale 5M Records

OpenBullet Configuration Listings

File: OpenBullet Configs by @ iMR_H.rar 2364 configurations for OpenBullet, all of them tested at least once Previous post on OpenBullet settings – https://cybershafarat.com/2020/01/11/dorksearcher/ 8/31/2019 12:41 PM 2,213 (PATCHED)Gamestop config(proxyless).loli 06/30/2019 03:07 AM 1,800 (UPDATED AND FASTER) Reddit.com Captures PostComment Karma, Suspended Requires proxies.loli 05/02/2019 10:22 AM 2,792 000.loli 04/26/2019 09:00 PM 2,118 0day.today.loli 05/13/2019Continue reading "OpenBullet Configuration Listings"

The post OpenBullet Configuration Listings appeared first on The Cyber Shafarat - Treadstone 71.

Read more: OpenBullet Configuration Listings

The Treadstone 71 Difference

What you receive from Treadstone 71 is detailed information and intelligence on your adversary that far surpasses the technical realm. Where Treadstone 71 service excels is in the ability to provide you with techniques, methods, capabilities, functions, strategies, and programs to not only build a fully functional intelligence capability, but a sustainable program directly aligned with stakeholder requirements.

Download Brief

Please provide a valid email address to access your download.

Continue... ×

Iranian Iatva Air Database for sale

It is comprised of Flight Data, credentials such as user, email & password, personal information such as IP, address, phone number etc, pilots information including full name, address, etc, aircraft/airport information, training data, customer booking data and much more. iatvair_vamDB vam_live_flights va_parameters v_flights_counter vamevents va_finances user_types reserves pilot_warning country_t routes v_total_data_flight v_top_flights reports award_pilots v_top_departure jumpsContinue reading "Iranian Iatva Air Database for sale"

The post Iranian Iatva Air Database for sale appeared first on The Cyber Shafarat - Treadstone 71.

Read more: Iranian Iatva Air Database for sale

What Intelligence Can and Cannot Do

This intelligence brief explains the intricacies as well as cans and cannots with repect to the capabilities of cyber intelligence.

Download Brief

Please provide a valid email address to access your download.

Continue... ×

Remember, remember 2009 November in Iran

Protests in November 2009 Khamenei’s approved policy of legalizing the killing of protesters led to six months of protests in November 2009 in which hundreds of people were killed, and not a single case has been filed to identify the perpetrators and bring them to justice, based on information gathered from the families of 48Continue reading "Remember, remember 2009 November in Iran"

The post Remember, remember 2009 November in Iran appeared first on The Cyber Shafarat - Treadstone 71.

Read more: Remember, remember 2009 November in Iran

Stakeholder Analysis

Understanding your stakeholders and what they need to help make decisions is more than half the battle. This brief covers the old adage “Know your professor, get an A."

Download Brief

Please provide a valid email address to access your download.

Continue... ×
النسخة العربية

Please provide a valid email address to access your download.

Continue... ×

China continues to help North Korea circumvent sanctions

The United Nations has said in a statement that North Korea is using Chinese ships to circumvent sanctions. Despite UN sanctions, North Korea was able to boost its trade in coal and petroleum products last year with the help of China’s shipping fleet and circumvent sanctions, the UN Security Council’s Sanctions Committee said in aContinue reading "China continues to help North Korea circumvent sanctions"

The post China continues to help North Korea circumvent sanctions appeared first on The Cyber Shafarat - Treadstone 71.

Read more: China continues to help North Korea circumvent sanctions

Hackers hit Parand and Arak, Iran

Hacker claimed to have infiltrated the regional power systems of #Qom province and shared some examples with the general public. These examples include testing open ports as well as entering the FTP server and several other system models. Several published photos are related to #Arak Heavy Water Location and also entering the industrial devices ofContinue reading "Hackers hit Parand and Arak, Iran"

The post Hackers hit Parand and Arak, Iran appeared first on The Cyber Shafarat - Treadstone 71.

Read more: Hackers hit Parand and Arak, Iran

Bulletproof Vests – Make them yourself

Syrian violations of sanctions with Russian FSB assistance to manufacture ballistic vests – Not discovered by any organization other than Treadstone 71 - No sensors, no aggregation of thousands of taps – Just hard-nosed open-source collection and analysis, and an interesting read of false identities, dispersed purchasing, and deceit.

Download Brief

Please provide a valid email address to access your download.

Continue... ×

Full Islamic Republic of Iran Navy – Islamic Republic of Iran Navy (NEDAJA) Full Database

April 12, 2020 at 01:29 PM Full Islamic Republic of Iran Navy (NEDAJA , Niroye-entezami and IRGC) Database !!!! ~390K Records Database!! Price : 10BTC Contact Email : This email address is being protected from spambots. You need JavaScript enabled to view it. Database Columns : KodeSaiiad KartDaria Sodoor Enteha Name Family Pedar Shomare Shenasname Tarikh Tavalod Mahal Sodoor Mahal tavalod Iran Navy 1 Iran Navy 2 Iran NavyContinue reading "Full Islamic Republic of Iran Navy – Islamic Republic of Iran Navy (NEDAJA) Full Database"

The post Full Islamic Republic of Iran Navy – Islamic Republic of Iran Navy (NEDAJA) Full Database appeared first on The Cyber Shafarat - Treadstone 71.

Read more: Full Islamic Republic of Iran Navy – Islamic Republic of Iran Navy (NEDAJA) Full Database

Github Hacking Tools – Iran

❇️ Pish web tool ❇️ MITM attack tool ❇️ kill shot pentesting framework ❇️ Facebook Tool Links ❇️ Facebook information gathering ❇️ Facebook Toolkit + bots,  dump private data ❇️ Facebook cracking tool Fcrack.py ❇️ Facebook and yahoo account cloner ❇️ Facebook report tool ❇️ Facebook BruteFoRce Tool ❇️ Facebook hacking ASU ❇️ Facebook DownloaderContinue reading "Github Hacking Tools – Iran"

The post Github Hacking Tools – Iran appeared first on The Cyber Shafarat - Treadstone 71.

Read more: Github Hacking Tools – Iran

Middle Eastern Cyber Domain

Middle Eastern Cyber Domain – Iran/Syria/Israel

An academic review of these nation-states and their work to achieve cyber operations dominance.

Download Brief

Please provide a valid email address to access your download.

Continue... ×
النسخة العربية

Please provide a valid email address to access your download.

Continue... ×

WH Rat – Windows + Android RAT Spy Tool

Spy: File Manager SMS Manager Calls Manager Contacts Manager Location Manager Account Manager Camera Manager Shell Terminal Applications MicroPhone Keylogger Link: https://www13.zippyshare.com/v/BOF4n55U/file.html VirusTotal Link: https://www.virustotal.com/gui/url/e2031c859cfc491cb92e7196e796bc24212ce89c46a874ef9a8baf683f3f16c6/detection Spy – File Manager, Camera, Accounts And Many More https://cybershafarat.com/2020/05/12/farzin-karimi/

The post WH Rat – Windows + Android RAT Spy Tool appeared first on The Cyber Shafarat - Treadstone 71.

Read more: WH Rat – Windows + Android RAT Spy Tool

Mahan Air – Blamed for COVID-19 in Iran

Information of Mahan Air – Iran The same company that transmitted the corona virus to Iran Data ::: 5.000 Files Price: 250$ ID Telegram:Masterpublic Original File – PDF CFP INPUT MESSAGE DATE TIME REF 051202 سامانه Mahan Air Flight Planning System با آدرس https://preflight.ir هک شده و ۵ هزار نامه این سامانه در حال فروشهContinue reading "Mahan Air – Blamed for COVID-19 in Iran"

The post Mahan Air – Blamed for COVID-19 in Iran appeared first on The Cyber Shafarat - Treadstone 71.

Read more: Mahan Air – Blamed for COVID-19 in Iran

Intelligence Games in the Power Grid

Intelligence Games in the Power Grid – Russian Cyber and Kinetic Actions Causing Risk

Unusual purchasing patterns from a Russian firm selling PLCs from a Taiwanese company with massive holes in its product software download site. What could go wrong?

Download Brief

Please provide a valid email address to access your download.

Continue... ×

Iranian incitement of hate against the State of Israel

All students, university professors, international activists and other experts are invited to submit their ideas and suggestions on the occasion of World Al-Quds Day in light of the current situation (the spread of #Coronavirus) and as alternatives to the march, by contacting the following IDs Deadline for submission of suggestions and ideas: 17 to 26Continue reading "Iranian incitement of hate against the State of Israel"

The post Iranian incitement of hate against the State of Israel appeared first on The Cyber Shafarat - Treadstone 71.

Read more: Iranian incitement of hate against the State of Israel

Mr.Tekide Baseball Card

Much has been written about Mr.Tekide and his crypters used by APT34 (OilRig) and others. Other

organizations have documented information about Mr.Tekide's tools in 'celebrated' cyber attacks against Fortune 500 institutions, governments, educational organizations, and critical infrastructure entities.

Identification

However, identifying Mr.Tekide, his background, locations, and his own words has never been openly accomplished. Many believe that following an individual does not pay dividends. Treadstone 71 demonstrates the alignment of Mr.Tekide to the Iranian government through years of support using crypters such as the iloveyoucrypter, qazacrypter, and njRAT.

Download Brief

Please provide a valid email address to access your download.

Continue... ×

Statement of Cyber Counterintelligence

Statement of Cyber Counterintelligence The 10 Commandments for Cyber CounterIntel

Thou shall and thou shalt not. Own the cyber street while building creds. Follow these rules and maybe you will survive the onslaught.

Download Brief

Please provide a valid email address to access your download.

Continue... ×

Russian radar system discovered near Israeli border:

A Russian publication reported this week that the Russian Armed Forces have deployed their Resonance radar system in an area near the Israeli border.According to the NZIV publication, the Russian Resonance radar was identified in two locations in the eastern Mediterranean region, including an area along the Israeli-Egyptian border.The technical capabilities of the Resonance-N radarContinue reading "Russian radar system discovered near Israeli border:"

The post Russian radar system discovered near Israeli border: appeared first on The Cyber Shafarat - Treadstone 71.

Read more: Russian radar system discovered near Israeli border:

Link Analysis of Iranian Cyber Actors

Treadstone 71 Link Analysis of Various Iranian Cyber Operators, Academics, and Cyber Security Professionals. From indictments and commercial organizations to academics. This report demonstrates the depth of Iranian penetration into US academic institutions, information security conferences, and certification bodies. 

Actions by current Iranian academics working at US universities likely threaten sensitive information in science, technology, engineering and math (STEM) fields of study. The sharing of advancements in STEM such as artificial intelligence, unmanned aerial vehicles, unmanned aircraft systems, and offensive and defensive cybersecurity likely occur.

Download Brief

Please provide a valid email address to access your download.

Continue... ×

Fallacies in Threat Intelligence

Fallacies in Threat Intelligence Lead to Fault Lines in Organizational Security Postures

This brief covers some general taxonomy along with a review of common mistakes concerning cyber and threat intelligence and how possible to not fall into these traps while knowing how to dig out if you do.

Download Brief

Please provide a valid email address to access your download.

Continue... ×
النسخة العربية

Please provide a valid email address to access your download.

Continue... ×

مهاجر ۶ Read the Ministry of Defense Feature Sheet Mohajer 6

The official catalog of the Ministry of Defense of the Islamic Republic of Iran about the migrant drone 6 and some of its features In our region, Iran and Turkey offer very diverse UAV products. According to the request of the members of the channel to compare Turkish UAVs with Iran, we will summarize oneContinue reading "مهاجر ۶ Read the Ministry of Defense Feature Sheet Mohajer 6"

The post مهاجر ۶ Read the Ministry of Defense Feature Sheet Mohajer 6 appeared first on The Cyber Shafarat - Treadstone 71.

Read more: مهاجر ۶ Read the Ministry of Defense Feature Sheet Mohajer 6

Cyber Intelligence Request for Information (RFI)

Request for Information (RFI) – Cyber Threat Intelligence

The RFI process includes any specific time-sensitive ad hoc requirement for intelligence information or products to support an ongoing event or incident not necessarily related to standing requirements or scheduled intelligence production. When the Cyber Threat Intelligence Center (CTIC) submits an RFI to internal groups, there is a series of standard requirements for the context and quality of the data requested.

Download Brief

Please provide a valid email address to access your download.

Continue... ×

Contact Treadstone 71 Today for all your Cyber Intelligence needs.

CONTACT US TODAY