ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage", "Hashtag": "as:Hashtag" } ], "id": "https://infosec.exchange/users/beyondmachines1/statuses/114591011309873041", "type": "Note", "summary": null, "inReplyTo": null, "published": "2025-05-29T12:01:10Z", "url": "https://infosec.exchange/@beyondmachines1/114591011309873041", "attributedTo": "https://infosec.exchange/users/beyondmachines1", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/beyondmachines1/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/beyondmachines1/statuses/114591011309873041", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2025-05-29:objectId=275883999:objectType=Conversation", "content": "<p>DragonForce ransomware exploits SimpleHelp vulnerabilities in MSP supply chain attack</p><p>Sophos reported a supply chain attack by the DragonForce ransomware group that compromised an unidentified Managed Service Provider through a chain of three critical SimpleHelp RMM vulnerabilities (CVE-2024-57726, CVE-2024-57727, CVE-2024-57728), allowing attackers to use the MSP&#39;s own infrastructure to deploy ransomware and steal data from multiple downstream customers.</p><p>**A compromise of a trusted vendor has terrible and far reaching consequences. There isn&#39;t an obvious solution. You need to do a lot of little things and do them consistently - vendor assessment and questionnaires putting formal pressure, isolation and access restrictions adding a layer of prevention and patching and intrusion detection as an internal layer of defense.**<br /><a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/knowledge\" class=\"mention hashtag\" rel=\"tag\">#<span>knowledge</span></a> <a href=\"https://infosec.exchange/tags/awareness\" class=\"mention hashtag\" rel=\"tag\">#<span>awareness</span></a><br /><a href=\"https://beyondmachines.net/event_details/dragonforce-ransomware-exploits-simplehelp-vulnerabilities-in-msp-supply-chain-attack-6-8-2-z-t/gD2P6Ple2L\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">beyondmachines.net/event_detai</span><span class=\"invisible\">ls/dragonforce-ransomware-exploits-simplehelp-vulnerabilities-in-msp-supply-chain-attack-6-8-2-z-t/gD2P6Ple2L</span></a></p>", "contentMap": { "en": "<p>DragonForce ransomware exploits SimpleHelp vulnerabilities in MSP supply chain attack</p><p>Sophos reported a supply chain attack by the DragonForce ransomware group that compromised an unidentified Managed Service Provider through a chain of three critical SimpleHelp RMM vulnerabilities (CVE-2024-57726, CVE-2024-57727, CVE-2024-57728), allowing attackers to use the MSP&#39;s own infrastructure to deploy ransomware and steal data from multiple downstream customers.</p><p>**A compromise of a trusted vendor has terrible and far reaching consequences. There isn&#39;t an obvious solution. You need to do a lot of little things and do them consistently - vendor assessment and questionnaires putting formal pressure, isolation and access restrictions adding a layer of prevention and patching and intrusion detection as an internal layer of defense.**<br /><a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/knowledge\" class=\"mention hashtag\" rel=\"tag\">#<span>knowledge</span></a> <a href=\"https://infosec.exchange/tags/awareness\" class=\"mention hashtag\" rel=\"tag\">#<span>awareness</span></a><br /><a href=\"https://beyondmachines.net/event_details/dragonforce-ransomware-exploits-simplehelp-vulnerabilities-in-msp-supply-chain-attack-6-8-2-z-t/gD2P6Ple2L\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">beyondmachines.net/event_detai</span><span class=\"invisible\">ls/dragonforce-ransomware-exploits-simplehelp-vulnerabilities-in-msp-supply-chain-attack-6-8-2-z-t/gD2P6Ple2L</span></a></p>" }, "attachment": [], "tag": [ { "type": "Hashtag", "href": "https://infosec.exchange/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/infosec", "name": "#infosec" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/knowledge", "name": "#knowledge" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/awareness", "name": "#awareness" } ], "replies": { "id": "https://infosec.exchange/users/beyondmachines1/statuses/114591011309873041/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/beyondmachines1/statuses/114591011309873041/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/beyondmachines1/statuses/114591011309873041/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/beyondmachines1/statuses/114591011309873041/likes", "type": "Collection", "totalItems": 0 }, "shares": { "id": "https://infosec.exchange/users/beyondmachines1/statuses/114591011309873041/shares", "type": "Collection", "totalItems": 1 } }