Event JSON
{
"id": "912e163e8afc3c9472dedb5382b6bee7f6c79a09ab7e645e1d4cb700a862133f",
"pubkey": "e02f87c179ca500e3d3960d8167c39e3477e059e5178346e55071581c423b6f0",
"created_at": 1693339228,
"kind": 1,
"tags": [
[
"p",
"f7d0478e54eaa6e0cc98adf81d712148bce169a2c21b1c0f7a4ed446c6adc09e",
"wss://relay.mostr.pub"
],
[
"p",
"f6870afcde4480ec8508f50304859e14a51309ff24ab3f0f862c52bdc4af8747",
"wss://relay.mostr.pub"
],
[
"e",
"62bd210bf83b2c011a00db7587fb3aabc6e9557522bc63b2f71ef40bb6dff320",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/Xaikhal/statuses/110974679689751070",
"activitypub"
]
],
"content": "nostr:npub17lgy0rj5a2nwpnyc4hup6ufpfz7wz6dzcgd3crm6fm2yd34dcz0qlk9uux It was interesting watching Emotet, Trickbot, and QBot evolve from standard banking trojans to some of the most popular, versatile droppers used by threat actors.",
"sig": "be6cbdae434bd4cecb2bbc5d32b6f051b104c6c3995bf43091f3f7b29abfc740b143bc12f12935d7f59af9568989d33b8d91d2e72b802b97c14cf7a6d607008b"
}