<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>ZoqueLabs</title>
        <description>ZoqueLabs.xyz feed</description>
        <link>https://zoquelabs.xyz/</link>
        <atom:link href="https://zoquelabs.xyz/feed.rbloggers.xml" rel="self" type="application/rss+xml"/>
        <pubDate>Fri, 06 Mar 2026 22:19:29 +0000</pubDate>
        <lastBuildDate>Fri, 06 Mar 2026 22:19:29 +0000</lastBuildDate>
        <generator>Jekyll v3.10.0</generator>
        
            <item>
                <title>Anomaly #3</title>
                <author>ZoqueLabs</author>
                <description>Anomaly &amp;#35;3 - March 6, 2026 - Zoquelabs Threat Intelligence Bulletin &amp;#129413;</description>
                <pubDate>Fri, 06 Mar 2026 15:00:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/anomaly/2026/03/06/Anomaly-3.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/anomaly/2026/03/06/Anomaly-3.html</guid>
                
                <category>threat</category>
                
                <category>intelligence,</category>
                
                <category>spyware,</category>
                
                <category>platforms,</category>
                
                <category>security,</category>
                
                <category>surveillance,</category>
                
                <category>leaks</category>
                
                
                <category>Anomaly</category>
                
            </item>
        
            <item>
                <title>Anomalía #3</title>
                <author>ZoqueLabs</author>
                <description>Anomalía &amp;#35;3 - 6 de Marzo 2026 - Boletín de inteligencia de amenazas de Zoquelabs &amp;#129413;</description>
                <pubDate>Fri, 06 Mar 2026 15:00:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/anomalia/2026/03/06/Anomalia-3.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/anomalia/2026/03/06/Anomalia-3.html</guid>
                
                <category>inteligencia</category>
                
                <category>de</category>
                
                <category>amenazas,</category>
                
                <category>spyware,</category>
                
                <category>plataformas,</category>
                
                <category>seguridad,</category>
                
                <category>vigilancia,</category>
                
                <category>filtraciones</category>
                
                
                <category>Anomalia</category>
                
            </item>
        
            <item>
                <title>Experimento 0x03: Los Diarios de Blind Eagle (parte 1): Analizando SVGs Maliciosos</title>
                <author>ZoqueLabs</author>
                <description>Primera entrega de un serie de articulos sobre Blind Eagle, un APT colombiano conocido por aprovechar infraestructura debil de entidades gubernamentales para engañar personas y hacerlas instalar malware. En esta ocación analizamos un nuevo vector de ataque de este grupo usando imagenes .SVG.</description>
                <pubDate>Sat, 28 Feb 2026 05:00:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/experimento/2026/02/28/diarios-de-blind-eagle-1.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/experimento/2026/02/28/diarios-de-blind-eagle-1.html</guid>
                
                <category>inteligencia</category>
                
                <category>de</category>
                
                <category>amenazas,</category>
                
                <category>blind</category>
                
                <category>eagle,</category>
                
                <category>svg,</category>
                
                <category>forence,</category>
                
                <category>apt</category>
                
                
                <category>experimento</category>
                
            </item>
        
            <item>
                <title>Experiment 0x03: The Blind Eagle Diaries (part 1): Analyzing Malicious SVGs</title>
                <author>ZoqueLabs</author>
                <description>First installment in a series of articles about Blind Eagle, a Colombian APT known for taking advantage of weak infrastructure of government entities to trick people into installing malware. This time we analyze a new attack vector of this group using images -.SVG.</description>
                <pubDate>Sat, 28 Feb 2026 05:00:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/experiment/2026/02/28/blind-eagle-diaries-1.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/experiment/2026/02/28/blind-eagle-diaries-1.html</guid>
                
                <category>threat</category>
                
                <category>intelligence,</category>
                
                <category>blind</category>
                
                <category>eagle,</category>
                
                <category>svg,</category>
                
                <category>forensics,</category>
                
                <category>apt</category>
                
                
                <category>experiment</category>
                
            </item>
        
            <item>
                <title>Anomalía #2</title>
                <author>ZoqueLabs</author>
                <description>Anomalía &amp;#35;2 February 2026 - Zoquelabs Threat Intelligence Bulletin &amp;#129413;</description>
                <pubDate>Fri, 20 Feb 2026 19:00:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/anomaly/2026/02/20/Anomaly-2.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/anomaly/2026/02/20/Anomaly-2.html</guid>
                
                <category>threat</category>
                
                <category>intelligence,</category>
                
                <category>spyware,</category>
                
                <category>crashes,</category>
                
                <category>crashes,</category>
                
                <category>platforms,</category>
                
                <category>security,</category>
                
                <category>surveillance,</category>
                
                <category>leaks</category>
                
                
                <category>Anomaly</category>
                
            </item>
        
            <item>
                <title>Anomalía #2</title>
                <author>ZoqueLabs</author>
                <description>Anomalía &amp;#35;2 Febrero 2026 - Boletín de inteligencia de amenazas de Zoquelabs &amp;#129413;</description>
                <pubDate>Fri, 20 Feb 2026 19:00:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/anomalia/2026/02/20/Anomalia-2.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/anomalia/2026/02/20/Anomalia-2.html</guid>
                
                <category>inteligencia</category>
                
                <category>de</category>
                
                <category>amenazas,</category>
                
                <category>spyware,</category>
                
                <category>caídas,</category>
                
                <category>bloqueos,</category>
                
                <category>plataformas,</category>
                
                <category>seguridad,</category>
                
                <category>vigilancia,</category>
                
                <category>filtraciones</category>
                
                
                <category>Anomalia</category>
                
            </item>
        
            <item>
                <title>Anomalía #1</title>
                <author>ZoqueLabs</author>
                <description>Anomalía &amp;#35;1 February 2026 - Zoquelabs Threat Intelligence Bulletin &amp;#129413;</description>
                <pubDate>Fri, 06 Feb 2026 05:00:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/anomaly/2026/02/06/Anomaly-1.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/anomaly/2026/02/06/Anomaly-1.html</guid>
                
                <category>threat</category>
                
                <category>intelligence,</category>
                
                <category>spyware,</category>
                
                <category>crashes,</category>
                
                <category>platforms,</category>
                
                <category>security,</category>
                
                <category>surveillance,</category>
                
                <category>leaks</category>
                
                
                <category>Anomaly</category>
                
            </item>
        
            <item>
                <title>Anomalía #1</title>
                <author>ZoqueLabs</author>
                <description>Anomalía &amp;#35;1 Febrero 2026 - Boletín de inteligencia de amenazas de Zoquelabs &amp;#129413;</description>
                <pubDate>Fri, 06 Feb 2026 05:00:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/anomalia/2026/02/06/Anomalia-1.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/anomalia/2026/02/06/Anomalia-1.html</guid>
                
                <category>inteligencia</category>
                
                <category>de</category>
                
                <category>amenazas,</category>
                
                <category>spyware,</category>
                
                <category>caídas,</category>
                
                <category>bloqueos,</category>
                
                <category>plataformas,</category>
                
                <category>seguridad,</category>
                
                <category>vigilancia,</category>
                
                <category>filtraciones</category>
                
                
                <category>Anomalia</category>
                
            </item>
        
            <item>
                <title>About ZOLIM</title>
                <author>ZoqueLabs</author>
                <description>¿Què es ZOLIM? (Zoque-Observatorio Latinoamericano de Infraestructura Maliciosa)</description>
                <pubDate>Thu, 05 Feb 2026 05:00:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/zolim/2026/02/05/acerca-de-zolim.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/zolim/2026/02/05/acerca-de-zolim.html</guid>
                
                <category>inteligencia</category>
                
                <category>de</category>
                
                <category>amenazas,</category>
                
                <category>spyware,</category>
                
                <category>c2</category>
                
                
                <category>zolim</category>
                
            </item>
        
            <item>
                <title>About ZOLIM</title>
                <author>ZoqueLabs</author>
                <description>¿Què es ZOLIM? (Zoque-Observatorio Latinoamericano de Infraestructura Maliciosa)</description>
                <pubDate>Thu, 05 Feb 2026 05:00:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/zolim/2026/02/05/about-zolim.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/zolim/2026/02/05/about-zolim.html</guid>
                
                <category>inteligencia</category>
                
                <category>de</category>
                
                <category>amenazas,</category>
                
                <category>spyware,</category>
                
                <category>c2</category>
                
                
                <category>zolim</category>
                
            </item>
        
            <item>
                <title>Anomalía #0</title>
                <author>ZoqueLabs</author>
                <description>Anomalía &amp;#35;0 January 2026 - Zoquelabs Threat Intelligence Bulletin &amp;#129413;</description>
                <pubDate>Tue, 20 Jan 2026 05:00:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/anomaly/2026/01/20/Anomaly-0.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/anomaly/2026/01/20/Anomaly-0.html</guid>
                
                <category>threat</category>
                
                <category>intelligence,</category>
                
                <category>spyware,</category>
                
                <category>outages,</category>
                
                <category>blocks,</category>
                
                <category>platforms,</category>
                
                <category>security,</category>
                
                <category>surveillance,</category>
                
                <category>leaks</category>
                
                
                <category>Anomaly</category>
                
            </item>
        
            <item>
                <title>Anomalía #0</title>
                <author>ZoqueLabs</author>
                <description>Anomalía &amp;#35;0 Enero 2026 - Boletín de inteligencia de amenazas de Zoquelabs &amp;#129413;</description>
                <pubDate>Tue, 20 Jan 2026 05:00:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/anomalia/2026/01/20/Anomalia-0.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/anomalia/2026/01/20/Anomalia-0.html</guid>
                
                <category>inteligencia</category>
                
                <category>de</category>
                
                <category>amenazas,</category>
                
                <category>spyware,</category>
                
                <category>caídas,</category>
                
                <category>bloqueos,</category>
                
                <category>plataformas,</category>
                
                <category>seguridad,</category>
                
                <category>vigilancia,</category>
                
                <category>filtraciones</category>
                
                
                <category>Anomalia</category>
                
            </item>
        
            <item>
                <title>Experimento 0x02: Inteligencia de amenazas: Buscando Seeker</title>
                <author>ZoqueLabs</author>
                <description>En este write-up exploramos el uso de Censys y Shodan para encontrar infraestructura maliciosa. Nos concentramos en un programa llamado Seeker que usa phishing para capturar la localización de dispositivos (y de las personas que los poseen). Luego organizamos todo en colander y exportamos reglas STIX2 con los IOCs recolectados y los usamos en MVT.</description>
                <pubDate>Fri, 26 Sep 2025 15:40:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/threat_intel/2025/09/26/Experimento-0x02-Buscando-Seeker.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/threat_intel/2025/09/26/Experimento-0x02-Buscando-Seeker.html</guid>
                
                <category>seeker</category>
                
                <category>censys</category>
                
                <category>shodan</category>
                
                <category>segfault</category>
                
                <category>opsec</category>
                
                <category>hacking</category>
                
                <category>colander</category>
                
                <category>mvt</category>
                
                <category>stix2</category>
                
                
                <category>threat_intel</category>
                
            </item>
        
            <item>
                <title>Experiment 0x02: Threat Intelligence: Seeking Seeker</title>
                <author>ZoqueLabs</author>
                <description>In this write-up we explore the use of Censys and Shodan to find malicious infrastructure. We focus on a program called Seeker that uses phishing to capture the location of devices (and the people who own them). Then we organize everything in colander and export STIX2 rules with the collected IOCs and use them in MVT.</description>
                <pubDate>Fri, 26 Sep 2025 15:38:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/threat_intel/2025/09/26/Experiment-0x02-Seeking-Seeker.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/threat_intel/2025/09/26/Experiment-0x02-Seeking-Seeker.html</guid>
                
                <category>seeker</category>
                
                <category>censys</category>
                
                <category>shodan</category>
                
                <category>segfault</category>
                
                <category>opsec</category>
                
                <category>hacking</category>
                
                <category>colander</category>
                
                <category>mvt</category>
                
                <category>stix2</category>
                
                
                <category>threat_intel</category>
                
            </item>
        
            <item>
                <title>Verifying Android apps in VirusTotal with their hashes</title>
                <author>ZoqueLabs</author>
                <description>Mini-tutorial to investigate lists of app hashes in Virus Total</description>
                <pubDate>Tue, 10 Jun 2025 00:00:00 +0000</pubDate>
                <link>https://zoquelabs.xyz/android/forensics/2025/06/10/Verifying-lists-of-hash-apps.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/android/forensics/2025/06/10/Verifying-lists-of-hash-apps.html</guid>
                
                <category>android</category>
                
                <category>forensics</category>
                
                <category>virustotal</category>
                
                <category>vt</category>
                
                <category>hash</category>
                
                <category>collections</category>
                
                <category>collections</category>
                
                <category>malware</category>
                
                
                <category>android</category>
                
                <category>forensics</category>
                
            </item>
        
            <item>
                <title>Verificando apps de Android en VirusTotal con sus hashes</title>
                <author>ZoqueLabs</author>
                <description>Mini-tutorial para investigar listas de hashes de apps en Virus Total</description>
                <pubDate>Tue, 10 Jun 2025 00:00:00 +0000</pubDate>
                <link>https://zoquelabs.xyz/android/forense/2025/06/10/Verificando-listas-hash-apps.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/android/forense/2025/06/10/Verificando-listas-hash-apps.html</guid>
                
                <category>android</category>
                
                <category>forense</category>
                
                <category>virustotal</category>
                
                <category>vt</category>
                
                <category>hash</category>
                
                <category>colecciones</category>
                
                <category>collections</category>
                
                <category>malware</category>
                
                
                <category>android</category>
                
                <category>forense</category>
                
            </item>
        
            <item>
                <title>Experiment 0x01: Write an exploit for Android (CVE-2024-31317) and try to detect it </title>
                <author>ZoqueLabs</author>
                <description>In this write-up we write an exploit for Android 11, 12, 13 and 14 that exploits a _command injection_ in Zygote. Then, we try to find indicators that give away the exploit and we will do an MVT module test.</description>
                <pubDate>Fri, 06 Jun 2025 00:00:00 +0000</pubDate>
                <link>https://zoquelabs.xyz/android/forense/exploit/2025/06/06/Write-an-exploit-Android-MVT.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/android/forense/exploit/2025/06/06/Write-an-exploit-Android-MVT.html</guid>
                
                <category>cve-2024-31317</category>
                
                <category>android</category>
                
                <category>adb</category>
                
                <category>mvt</category>
                
                <category>zygote</category>
                
                
                <category>android</category>
                
                <category>forense</category>
                
                <category>exploit</category>
                
            </item>
        
            <item>
                <title>Experimento 0x01: Escribir un exploit para Android (CVE-2024-31317) e intentar detectarlo</title>
                <author>ZoqueLabs</author>
                <description>En este write-up escribimos un exploit para Android 11, 12, 13 y 14 que explota un _command injection_ en Zygote. Luego, intentamos encontrar indicadores que delaten la explotación y haremos una ptueba de módulo de MVT.</description>
                <pubDate>Thu, 05 Jun 2025 00:00:00 +0000</pubDate>
                <link>https://zoquelabs.xyz/android/forense/exploit/2025/06/05/Escribiendo-exploit-Android-MVT.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/android/forense/exploit/2025/06/05/Escribiendo-exploit-Android-MVT.html</guid>
                
                <category>cve-2024-0044</category>
                
                <category>run-as</category>
                
                <category>adb</category>
                
                <category>mvt</category>
                
                <category>zygote</category>
                
                
                <category>android</category>
                
                <category>forense</category>
                
                <category>exploit</category>
                
            </item>
        
            <item>
                <title>Experiment 0x00 - Exploring CVE-2024-0044 Traces</title>
                <author>ZoqueLabs</author>
                <description>In this write-up we do our first exploration into Android exploitation using the CVE-2024-0044 vulnerability (a rare bypass of a command called run-as) and how to detect such exploitation.</description>
                <pubDate>Sat, 31 May 2025 18:12:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/android/forensics/exploit/2025/05/31/Exploiting_CVE-2024-0044.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/android/forensics/exploit/2025/05/31/Exploiting_CVE-2024-0044.html</guid>
                
                <category>android</category>
                
                <category>forensics</category>
                
                <category>exploit</category>
                
                <category>cve-2024-0044</category>
                
                <category>run-as</category>
                
                <category>adb</category>
                
                
                <category>android</category>
                
                <category>forensics</category>
                
                <category>exploit</category>
                
            </item>
        
            <item>
                <title>Experimento 0x00 - Explorando los rastros CVE-2024-0044</title>
                <author>ZoqueLabs</author>
                <description>En este write-up hacemos nuestra primera exploración sobre explotación de Android usando la vulnerabilidad CVE-2024-0044 (un raro bypass de un comando llamado run-as) y sobre como detectar dicha explotación.</description>
                <pubDate>Sat, 31 May 2025 18:12:45 +0000</pubDate>
                <link>https://zoquelabs.xyz/android/forense/exploit/2025/05/31/Explotando-CVE-2024-0044.html</link>
                <guid isPermaLink="true">https://zoquelabs.xyz/android/forense/exploit/2025/05/31/Explotando-CVE-2024-0044.html</guid>
                
                <category>android</category>
                
                <category>exploit</category>
                
                <category>forense</category>
                
                <category>cve-2024-0044</category>
                
                <category>run-as</category>
                
                <category>adb</category>
                
                
                <category>android</category>
                
                <category>forense</category>
                
                <category>exploit</category>
                
            </item>
        
    </channel>
</rss>
